Comments from Prof: You have got to begin chapter 2 with your theory and then bring in ransomware.  You need to discuss each construct in detail for your deterrence theory and Protection Motivation theory and then relate to ransomware.  Comments marked in redtati10.03.21.docx