1. Introduction
Today, cybercrime extends beyond mere technical threats; it frequently exploits the human element. Social engineering techniques, including phishing, deceive individuals into compromising their own systems, thereby increasing the effectiveness and prevalence of such attacks. It is estimated that over 90% of cyberattacks rely on social engineering to circumvent security defenses, rather than solely on technical vulnerabilities [
1].
Ransomware persistently represents a significant and evolving threat to public sector organizations, particularly as cyberattacks targeting their digital infrastructure grow more sophisticated. A recent study [
2] specifically investigated Clop ransomware and emphasized that Active Directory administrator accounts are often primary vectors for exploitation, especially within non-IT environments, leading to considerable operational disruptions. By concentrating on the socio-organizational aspects of vulnerability and resilience, this article investigates the nexus between human behavior and institutional procedures, along with their influence on municipal susceptibility to ransomware and socially engineered attacks. A rapid literature review published in [
3] indicates that cybercrime mitigation within e-government services predominantly emphasizes technical and managerial considerations, while often overlooking behavioral aspects. This oversight highlights the necessity of adopting a socio-organizational perspective to formulate comprehensive and contextually suitable cybersecurity strategies.
Ransomware has emerged as one of the most disruptive forms of cybercrime, with a growing impact across diverse sectors and regions [
4]. While considerable attention has been directed towards its effects on critical infrastructure and private corporations [
5], public institutions, particularly in developing nations, have become increasingly vulnerable targets [
6]. A substantial proportion of local governments, in particular, frequently lack the technical, financial, and human resources required to effectively counteract sophisticated social engineering tactics that often serve as entry points for ransomware attacks [
7].
In this context, the human factor manifests as both a significant vulnerability and a potential source of resilience. The awareness, attitudes, and behaviors of public officials are pivotal in determining how institutions address threats [
8]. Nevertheless, numerous cybersecurity strategies within the public sector persist in prioritizing technological solutions, thereby neglecting the socio-organizational dynamics that impact actual vulnerabilities [
9].
While recent studies have underscored the importance of human-centered and context-aware approaches [
10], there remains limited empirical evidence exploring these dimensions within the local governments of developing nations [
11]. This research aims to bridge this gap by analyzing the perceptions and experiences of cybersecurity professionals in Ecuadorian municipalities, with the objective of identifying patterns of human vulnerability and institutional resilience in response to ransomware threats.
Within this context, empirical knowledge on cyber risk in the public sector is limited, making it difficult to design effective and sustainable local policies. This gap is revealed in the interaction between human, institutional, and technological factors that determine exposure to ransomware in local governments (
Figure 1). This socio-technical perspective aligns with recent work by Vestad [
7], which argues that sustainable cybersecurity requires integrating technology, people, and organizational frameworks beyond mere regulatory compliance.
Furthermore, Mushtaq Y Shah [
9] demonstrates that numerous e-Government initiatives undervalue behavioral factors; rather, our model emphasizes the human element as a dual core: a source of vulnerability and a catalyst for resilience.
In accordance with the framework proposed by Safitra [
12], which integrates technology, processes, and human factors to enhance resilience and adaptability to threats, the “Emergent Resilience” section of the diagram emphasizes the significance of informal practices, engagement, and contextual knowledge as essential components in addressing cyber crises.
This study aims to identify and understand the contextual factors contributing to unequal exposure to ransomware within local governments, as well as the organizational conditions that either facilitate or hinder the development of institutional resilience against such threats.
To accomplish this objective, the research seeks to address the following questions.
RQ1. What are the most common human vulnerabilities to ransomware generated by social engineering techniques in local governments?
RQ2. Which human vulnerabilities to ransomware attacks generated by social engineering techniques generate the greatest negative impact on local governments? And how?
RQ3. What solutions exist to manage human vulnerabilities to ransomware attacks generated by social engineering techniques?
RQ4. How can Artificial Intelligence help reduce human vulnerabilities to ransomware generated by social engineering techniques in local governments?
These research questions serve as the analytical backbone of this study, linking the objectives, methodological design, and interpretation of findings. Each subsequent section systematically addresses one or more of these questions to ensure conceptual coherence between the problem statement, data analysis, and conclusions.
The remainder of this article is organized as follows.
Section 2 reviews related works on ransomware, cybersecurity resilience, and socio-technical approaches.
Section 3 describes the research methodology, including the interview design and the weighted average model.
Section 4 presents the results of the thematic analysis, supported by quotes from local government officials.
Section 5 discusses the findings in relation to existing literature and highlights the methodological contribution.
Section 6 concludes the paper with implications for policy and practice, as well as directions for future research.
2. Related Works
Ransomware has emerged as one of the most persistent and disruptive cyber threats over the past decade [
13], impacting both private and public institutions [
14]. Its technological advancements, coupled with the strategic deployment of social engineering techniques, have enhanced its ability to penetrate systems, especially in environments where organizational and human defenses are deficient [
15]. Although cybersecurity scholarship has extensively examined critical sectors such as finance and healthcare, the domain of local government, particularly in developing nations, remains understudied. Hossain and colleagues [
4] emphasize that “very little research on cybersecurity issues from the local government perspective” exists, and that information concerning the complex and multifaceted nature of municipal cybersecurity is “scattered and fragmented”.
Numerous studies highlight the fact that cyber resilience cannot be comprehensively understood solely from a technological perspective [
16]. “Cybersecurity has traditionally been regarded as a technological challenge; however, increasing evidence underscores the vital importance of human behavior, decision-making, and organizational culture. The IEEE-supported study [
17] emphasizes how these human factors, particularly in the context of insider threats, are central to understanding and mitigating cybersecurity risks.” Human-related factors such as risk awareness, daily practices, institutional perceptions, and organizational culture play a decisive role in the capacity to respond to cyber incidents [
18]. In municipal settings, where organizational structures tend to be more streamlined and resources more limited, these factors become even more critical [
19]. Recent work by [
7,
12] highlights the importance of socio-technical approaches in understanding how dynamics of vulnerability or resilience emerge in response to threats such as ransomware.
The literature further indicates a persistent disparity between developed and developing nations in cybersecurity capabilities, regulatory frameworks, organizational culture, and incident reporting [
20]. The Global Cybersecurity Index 2024 highlights a notable cyber capacity gap among numerous countries, acknowledging that although efforts are underway to bolster cybersecurity, these nations face significant resource limitations [
20]. Similarly, research on the digital divide highlights that disparities in developmental progress hinder effective threat mitigation, with less developed countries facing distinct cybersecurity challenges [
21]. Mugari and Kunambura [
22] argue that, in African nations, diminished levels of formal digitalization do not necessarily denote reduced exposure; rather, they indicate decreased visibility of cyberattacks. Although these insights are valuable, the institutional and human factors influencing ransomware exposure variability are insufficiently analyzed empirically, especially at the local government level. As Harry [
23] notes, researchers have identified a widespread deficiency in cybersecurity preparedness, awareness, training, and adequate funding within local government contexts; nonetheless, empirical investigations into these institutional and human factors remain notably limited. This survey uncovers ongoing deficiencies, including the underrepresentation of marginalized communities, limited investigation into non-digital social engineering, and unresolved ethical issues associated with AI-driven cybersecurity tools. Furthermore, current frameworks frequently lack a standardized, practical approach for evaluating cybersecurity culture [
16].
This limitation underscores the importance of employing qualitative methodologies to investigate institutional perceptions, behaviors, and capabilities within real-world contexts. Consequently, the current study aims to address this gap through a thematic analysis of interviews with cybersecurity professionals from Ecuadorian local governments, with the objective of identifying the human, institutional, and technological factors influencing exposure to ransomware and examining the conditions that either reinforce or weaken organizational resilience.
Compared to existing studies, prior research on ransomware and human factors has predominantly relied on large-scale surveys, experimental phishing simulations, or quantitative risk models. While these approaches provide statistical generalizability, they often lack the contextual depth required to understand organizational and behavioral dynamics within local governments. In contrast, the present study adopts a qualitative expert-driven methodology, prioritizing interpretative depth over sample breadth. This design complements prior quantitative work by offering insight into decision-making practices, institutional constraints, and human vulnerabilities that are difficult to capture through large-N approaches.
3. Materials and Methods
This study employs a qualitative methodology rooted in Braun and Clarke’s thematic analysis. Semi-structured interviews are conducted with key stakeholders within local governments. The data were transcribed and systematically coded, adhering to the six phases outlined by the authors: familiarization, generation of initial codes, theme search, theme review, definition and naming, and report writing. This process facilitates the identification of patterns and categories that accurately reflect perceptions of cybersecurity risks and practices within the studied context. The results are compared with relevant regulatory frameworks and international best practices to validate the final proposal.
The data were transcribed verbatim and subsequently analyzed utilizing ATLAS.ti (version 23), a qualitative analysis software that facilitated systematic coding, categorization, and visualization of emerging patterns. The analytical procedure adhered to Braun and Clarke’s six-phase thematic analysis framework, encompassing familiarization with the data, generation of initial codes, theme search, theme review, theme definition and naming, and report composition. The use of ATLAS.ti facilitated the development of a systematic codebook aligned with the tripartite conceptual model of human, institutional, and technological factors, thereby guaranteeing analytical consistency and traceability throughout the research process.
3.2. Participants and Context
The research was conducted within the framework of local governments in Ecuador, specifically at the cantonal level. Participants were chosen in accordance with their roles pertaining to technical and strategic responsibilities related to information technology, cybersecurity, or digital transformation. The profiles included information security officers, technology directors, infrastructure coordinators, and systems specialists.
The selection process employed purposive sampling, prioritizing individuals with demonstrable experience in incident management, technology policy development, or cyber-risk assessment. A total of ten professionals from municipalities across the Coast, Sierra, and Amazon regions participated, thereby ensuring substantial territorial diversity and aggregating both technical and organizational insights pertinent to the study.
It is important to clarify that the qualitative thematic analysis strictly relied on interviews with ten expert participants occupying technical and strategic roles in municipal cybersecurity. The inclusion of non-technical end users was designed as a complementary component for triangulation purposes and was not part of the formal thematic coding process.
The sample size was determined through an iterative process rather than solely relying on statistical representativeness. Following multiple rounds of interview coding and review, it was observed that further interviews predominantly produced redundant information and did not contribute significantly to new thematic codes. This operational saturation, in conjunction with the high level of domain expertise among informants, substantiates the adequacy of the sample according to contemporary qualitative standards, where depth and relevance of cases can justify a smaller yet analytically comprehensive dataset.
The procedure followed is summarized in
Figure 2, which schematically presents the methodological design adopted in this research.
To enhance robustness and credibility, the qualitative findings were fortified through the implementation of methodological safeguards, including transparent coding procedures, triangulation with documentary sources, and inter-coder verification. All fieldwork adhered to standard ethical protocols, including informed consent and data protection measures. Limitations regarding statistical generalizability are acknowledged, and it is recommended that larger-scale quantitative validation be conducted as a follow-up to further extend and test these findings.
The institutional context is characterized by limited budgets, fragile governance frameworks, and emerging levels of cybersecurity maturity. This aligns with evidence indicating that numerous local governments lack comprehensive regulatory frameworks consistent with standards such as NIST, thereby resulting in substantial operational deficiencies in addressing cyber threats [
4].
According to Hossain et al. [
4], local governments face increased risks due to emerging digitalization when there is a lack of comprehensive regulatory or technical support.
Conversely, risk management within public environments necessitates a systemic approach that accounts for resources, processes, and human capabilities, as demonstrated by studies on digital governance in municipalities with budgetary constraints [
24].
4. Results of the Thematic Analysis on Ransomware Vulnerability
It is important to clarify that the qualitative thematic analysis presented in
Section 4.1,
Section 4.2,
Section 4.3,
Section 4.4,
Section 4.5,
Section 4.6,
Section 4.7,
Section 4.8,
Section 4.9 and
Section 4.10 is based exclusively on interviews with ten expert participants (directors, coordinators, and information security specialists). This expert-focused corpus was intentionally selected to ensure analytical depth, interpretative consistency, and methodological rigor. Data collected from 30 non-technical municipal employees were obtained through a separate process and were used solely for triangulation and contextual validation, rather than for primary thematic extraction.
The analysis conformed to the six-phase framework proposed by Braun and Clarke, which enabled the identification of recurring patterns and the classification of results into six principal categories: ransomware perception; human factors and social engineering; training and organizational culture; structural limitations of local governments; resilience mechanisms; and future perspectives.
Before presenting the thematic narratives,
Table 2 summarizes the six thematic categories identified through the analysis, together with their key findings and representative quotations. Subsequently,
Table 3 provides explicit traceability between coded segments, thematic categories, and participant coverage, showing analytical density and recurrence between participants to ensure that the results are grounded in repeated patterns rather than isolated statements.
Section 4.1,
Section 4.2,
Section 4.3,
Section 4.4,
Section 4.5,
Section 4.6,
Section 4.7,
Section 4.8,
Section 4.9 and
Section 4.10 report exclusively the results of this qualitative thematic analysis based on ten expert participants, as described in
Table 1. The interviews conducted with thirty non-technical municipal employees were analyzed separately and are incorporated only for triangulation purposes, which are presented in
Section 4.11. These end-user data were not subjected to thematic coding and do not alter the qualitative results reported in this section.
The presentation of results is organized in accordance with the four research questions introduced in
Section 1.
Section 4.1,
Section 4.2,
Section 4.3,
Section 4.4,
Section 4.5 and
Section 4.6 address RQ1–RQ3 by evaluating the most prevalent human vulnerabilities to ransomware, their implications for municipal operations, and the strategies presently implemented to mitigate these issues risks.
Section 4.9 and
Section 4.10 concentrate on RQ4, examining how Artificial Intelligence can assist in mitigating human vulnerabilities and fortifying institutional resilience via predictive and adaptive mechanisms. Collectively, these aspects offer a comprehensive view of human vulnerability to ransomware attacks and the development of emerging strategies to improve cybersecurity within municipal contexts.
4.8. Pareto Analysis of Interview Keywords—Prioritizing Human Risk Factors for Ransomware
Figure 4 presents a Pareto analysis of the interview keywords, where the bars represent absolute frequencies and the red line illustrates the cumulative percentage. The six dominant terms—Ransomware (76), Phishing (25), Weak Passwords (13), Spam (11), Resilience (11), and Ecuador (10)—collectively exceed 80% of all coded mentions, evidencing that a small set of concepts concentrates the majority of the discourse.
It is worth noting that only the term “ransomware” appears above the dashed reference line of approximately 80%. This result does not imply that the threshold is too high; rather, it reflects the overwhelming prominence of ransomware as a central concept organizing participants’ narratives. Since the remaining terms represent secondary but complementary aspects, such as entry vectors (phishing), human weaknesses (passwords), and contextual constraints (institutional resilience), their frequencies are naturally lower and thus fall below the high consensus threshold.
The approximately 80% threshold serves as an analytical reference point to distinguish concepts that generate very strong consensus from those that, while relevant, do not dominate the discourse with the same intensity. In qualitative risk analysis, these high thresholds help identify the most relevant factors perceived by stakeholders, which in this case indicates that ransomware overwhelmingly influences the way municipal officials conceptualize cyber risk.
The Pareto curve reinforces the principle that a limited number of factors drive most vulnerability perceptions. Practically, this supports prioritizing resources toward the small set of themes with the largest relative impact: AI-assisted detection mechanisms, targeted anti-phishing strategies, and improved password management policies.
Overall, the chart quantitatively substantiates the qualitative finding that ransomware functions as the primary cognitive and operational concern among local government IT officials, whereas the remaining high-frequency terms represent the underlying human and institutional contributors to exposure.
Table 2 reinforces the patterns delineated in
Section 4, emphasizing ransomware as a prominent threat, the persistent presence of human vulnerabilities such as phishing and weak passwords, the fragmented status of cybersecurity training, the structural disparities between large and small municipalities, the emerging resilience strategies, and the elevated expectations attributed to artificial intelligence as a crucial component for future prevention.
The categories, findings, and quotations presented in
Table 2 were derived through the six-step thematic analysis described in
Section 3. After transcribing the interviews, all statements were coded in ATLAS.ti, generating an initial set of semantic and latent codes. These codes were iteratively grouped into broader themes during the theme-search and theme-review phases. For each theme, the research team synthesized the meaning of the underlying coded segments into a concise key finding. Representative quotations were selected based on their clarity in illustrating the core idea of the theme and their recurrence across multiple interviewees, ensuring they reflected shared perceptions rather than isolated comments. Thus,
Table 2 constitutes a structured synthesis of the qualitative evidence rather than a numerical calculation, summarizing how repeated patterns in the data were organized into coherent thematic categories.
4.9. A Weighted Average Model for Cyber Exposure
The incorporation of a weighted average model within this study functions as an exploratory quantitative supplement to the thematic analysis. While the primary methodology was based on semi-structured interviews and Braun and Clarke’s qualitative framework, the identification of three predominant dimensions—human, institutional, and technological prompted the development of an integrative index. The aim of this formulation is not to supplant qualitative evidence but to synthesize it into a singular, interpretable indicator of exposure that reflects the relative significance attributed by interviewees to each dimension.
The values of the human factor (
Fh), institutional factor (
Fi), and technological factor (
Ft) used in Equation (
1) were derived directly from the thematic coding process conducted in ATLAS.ti. After completing the six phases of Braun and Clarke’s thematic analysis, each coded segment was assigned to one of the three dimensions of the conceptual model.
For each dimension, we calculated the proportion of coded segments associated with that category relative to the total number of analytical codes generated in the dataset. For instance, all coded references linked to weak password practices, phishing susceptibility, risk perception, and unsafe behaviors were grouped under the human factor (). Codes related to governance, policies, training continuity, and organizational processes were grouped under the institutional factor (), while codes representing infrastructure obsolescence, detection capabilities, and technological constraints were grouped under the technological factor ().
These proportions were then normalized to the interval [0, 1] using a min–max scaling procedure, allowing the three dimensions to be comparable and suitable for integration in the weighted average model. The resulting normalized values represent the relative prominence of each dimension in the interview data, based on the frequency and salience of coded segments associated with each factor.
Thus, (
), (
), and (
) are not arbitrary values, but reflect the empirical distribution of human, institutional, and technology related vulnerabilities as expressed by the interviewees. Their normalized proportions provide the basis for the composite exposure index presented in Equation (
1).
Accordingly, the study employs the weighted average technique, a standard method for constructing composite indices, which is adapted herein to assess the vulnerability of local governments to ransomware. The resulting Cyber Exposure Index (
E) integrates the three complementary dimensions: the human factor (
), the institutional factor (
), and the technological factor (
), thereby providing a context-specific quantitative representation of the overall exposure in the Equation (
1),
where
are the weights assigned to each dimension according to their relative importance. Each component is normalized to
prior to aggregation. Interview evidence indicates that human error is the predominant vulnerability in local governments, which motivates assigning a larger weight to
. Sensitivity analyses on the weights and validation against historical incidents were performed to support threshold selection and operational recommendations.
Each component (, , ) was derived from the thematic categories previously identified in the analysis. The human factor () aggregates themes such as weak password practices, low risk awareness, and exposure to phishing; the institutional factor () encompasses governance, policy enforcement, and continuity of training programs; and the technological factor () includes infrastructure obsolescence and detection capabilities. The relative weights (, , ) were determined through proportional reasoning based on the frequency and salience of these themes in the coded data. Specifically, human-related codes accounted for approximately 50% of all coded segments, institutional codes for 30%, and technological codes for 20%. These proportions were normalized to produce the final weights applied in the equation ( = 0.5, = 0.3, = 0.2), aligning the model’s quantitative structure with the empirical prominence observed in the interviews.
This weighting approach accurately represents the empirical significance and perceived importance of each dimension within participants’ narratives, rather than relying on external presumptions, thereby ensuring that the model remains entirely anchored in qualitative evidence.
5. Discussion
This discussion is organized in direct relation to the four research questions. The empirical evidence collected through thematic analysis addresses RQ1 and RQ2 by identifying phishing, weak password practices, and limited awareness as the most prevalent human vulnerabilities, with significant operational and reputational impacts. RQ3 is addressed through the emergence of institutional resilience mechanisms such as awareness campaigns, security committees, and procedural reforms. Finally, RQ4 is explored through the integration of Artificial Intelligence as an enabling factor for proactive monitoring, adaptive training, and the design of data-driven mitigation policies.
As evidenced in
Table 3, human-related vulnerabilities exhibit the highest analytical density (42 coded segments) and appear in 9 out of 10 expert interviews. This concentration empirically supports the conclusion that human factors constitute the dominant source of ransomware exposure in local governments, rather than being anecdotal or context-specific observations.
The analysis emphasizes ransomware as a significant threat within local governments, with human error acknowledged as the primary vulnerability. This observation corroborates prior research emphasizing the critical role of human factors in cybersecurity. For instance, Khadka and Ullah [
16] assert that cybersecurity should no longer be regarded solely as a technological issue, highlighting the critical influence of human behavior, decision-making, and organizational culture. Our research further extends this perspective by providing empirical evidence from municipalities in Ecuador, illustrating how inadequate password practices, susceptibility to phishing, and insufficient awareness initiatives persist in undermining resilience in practical implementations.
Pollini et al. [
26] proposed a comprehensive Human Factors framework in which individual, organizational, and technological dimensions collectively influence cybersecurity outcomes. While their findings underscore the importance of organizational culture, our interviews have indicated that institutional policies, in isolation, are insufficient. Respondents noted that written regulations and committees lack effectiveness unless they are supported by consistent awareness initiatives and continuous training. This indicates that culture is not solely a structural determinant; rather, it must be cultivated through sustained human-centered investment.
The literature further documents disparities between developed and developing contexts regarding capabilities, regulatory frameworks, and incident reporting, as noted by the International Telecommunication Union (ITU) [
27]. Hossain [
4] emphasizes that local governments remain particularly vulnerable due to limited budgets, shortage of specialized personnel, and insufficient prioritization authorities. Our findings substantiate this perspective: smaller municipalities in Ecuador were heavily dependent on external support and encountered difficulties in implementing fundamental security measures. This exemplifies the paradox identified by Mugari and Kunambura [
22] in African contexts: diminished formal digitalization does not necessarily imply reduced exposure, but rather limited visibility of incidents.
In this study, the integration of qualitative and quantitative evidence strengthens these observations and provides a more granular understanding of how such vulnerabilities manifest in day-to-day municipal operations. The triangulated findings show that the human-driven weaknesses reported by technical personnel are not only perceived risks but measurable behaviors among non-technical staff. For example, while IT personnel consistently identified unsafe clicking, password reuse, and credential sharing as recurrent causes of incidents, quantitative data revealed that 33.3% of municipal employees admitted to clicking on unverified links and 26.7% reported sharing their credentials. These patterns empirically confirm that behavioral vulnerabilities are widespread and persist despite existing institutional controls.
The triangulation further illustrates that risk perception is unevenly distributed across the organizational hierarchy. Technical staff described ransomware as a severe and systemic threat, whereas end users perceived it as only moderately concerning. This misalignment between expert assessment and everyday user awareness reflects a critical gap that undermines organizational readiness. While 90% of surveyed users claimed to verify email senders before opening messages, one third still engaged in unsafe clicking behavior, revealing a disconnect between security awareness and actual security practices.
Moreover, both data sources converge in highlighting the weakness of the institutional security culture. Interviewees emphasized that policies and committees have limited impact without continuous human-centered investment, a finding reinforced by quantitative data showing that 67% of users had not received cybersecurity training in the last two years, and that perceptions of policy clarity and IT communication remained moderate. These gaps suggest that municipalities are working within structurally constrained environments where technological solutions alone cannot mitigate risk.
The triangulated model also reinforces the role of inequality in shaping vulnerability. While larger municipalities had access to firewalls, AI-based email filtering, and trained personnel, smaller ones relied on outdated equipment or external support, increasing the reliance on risky behaviors such as accessing systems through personal devices or unsecured networks. Quantitative evidence supports this: 33% of employees reported using personal devices for institutional work, and 93% accessed systems remotely, expanding the attack surface.
Taken together, these integrated findings underscore that vulnerability to ransomware in local governments is fundamentally a human problem, determined by behaviors, perceptions, organizational culture, and structural inequalities.
A limitation of this study is the relatively small number of expert participants (n = 10), which constrains statistical generalization. However, this sample size is consistent with qualitative research practices that prioritize analytical depth and thematic saturation over representativeness. Future research could enhance external validity by extending the study to larger and more diverse samples across regions, combining expert interviews with large-scale surveys of non-technical users or controlled phishing simulations, while preserving the interpretative rigor achieved in this work.
6. Conclusions
The research revealed that susceptibility to ransomware within local governments is not solely attributable to technological deficiencies, but is also significantly influenced by human factors. The interviews revealed that social engineering, inadequate password security, and unsafe operational practices remain primary vectors for attacks, underscoring the need to prioritize training and awareness initiatives as strategic imperatives.
These conclusions are directly supported by the empirical traceability presented in
Table 3, which demonstrates that human vulnerabilities recur consistently across the majority of expert interviews and account for the highest proportion of coded qualitative evidence. The expert-based qualitative focus does not exclude non-technical users; rather, it allows their perspectives to be incorporated through triangulation without diluting the analytical coherence of the thematic framework.
The study also provides concrete evidence of emergent resilience practices within Ecuadorian municipalities. These include the establishment of cybersecurity committees, continuous micro-training routines, internal reporting channels for suspicious activity, and the progressive incorporation of AI-assisted monitoring tools. Although informal and unevenly implemented, these practices show that local governments can generate adaptive, human-centered responses to ransomware threats even when technological infrastructure is limited.
The findings also emphasized a notable disparity between large and small municipalities. While certain municipalities are capable of implementing advanced detection and monitoring tools, others depend predominantly on national support or complimentary solutions. AI-supported filtering and anomaly-detection tools were also mentioned as emergent practices, although their adoption remains uneven.
This disparity undermines organizational resilience and underscores the necessity for public policies tailored to enhance municipalities with limited resources. The application of a weighted average to evaluate exposure yielded a more precise depiction of the relative significance of each dimension, assigning greater importance to the human factor in accordance with the collected testimonies. Ultimately, respondents uniformly recognized artificial intelligence as an essential resource for developing digital resilience, both in early anomaly detection and in customizing cybersecurity training.
These findings offer practical implications for local governments in developing contexts, where human-centered investment is as vital as technological acquisition. Simultaneously, this study is constrained by the sample size (10 participants) and its focus on Ecuadorian municipalities, which may limit the generalizability of the results. Nevertheless, the depth of qualitative insights provides valuable transferability to similar contexts within developing countries.
Building on these findings, the proposed future work directly addresses the patterns of human vulnerability and institutional limitations identified throughout the thematic analysis. Because the interviews consistently highlighted phishing susceptibility, limited awareness, and inconsistent governance practices as the predominant factors shaping ransomware exposure, a structured validation mechanism becomes necessary to operationalize the Exposure Index model developed in this study. For this reason, we outline a pilot methodology that integrates controlled phishing simulations and standardized institutional indicators to empirically test and calibrate the model in real municipal environments.
This future phase does not constitute a disconnected research avenue; rather, it represents the logical continuation of the present work. The qualitative results demonstrated the central role of human behavior and organizational culture in shaping cyber-risk exposure, and the weighted-average model translates these qualitative insights into a measurable framework. The proposed pilot study will therefore allow the Exposure Index (E) to evolve from a conceptual formulation into a validated, actionable tool for local governments, completing the methodological progression initiated in this article.
Overall, the study provides coherent and evidence based responses to the four research questions. The results confirm that human factors constitute the primary source of vulnerability within local governments but also represent the foundation for resilience when effectively managed through institutional commitment and technological support. Artificial Intelligence emerges as a strategic catalyst that can translate these findings into operational prevention frameworks, thus closing the conceptual loop between the research questions, the empirical evidence, and the future development of explainable AI models for cybersecurity training.