Amplifying victim vulnerability: Unanticipated harm and consequence in data breach notification policy

Author:

Gibson Dennis1,Harfield Clive2ORCID

Affiliation:

1. The University of Queensland, Australia

2. Australian Catholic University, Australia

Abstract

Loss of control over one’s identity through identity usurpation, or identity theft, results in victimization characterized by multiple species of harm: material harms such as financial loss; medical harms such as psychological distress and consequential physiological illness; and moral harms such as infringement of autonomy. Digital data breaches are a common means by which identity can be usurped and laws have been enacted requiring data-holders to notify data subjects when their personal information held on digital databases has been compromised. The intention is that victims should then be able to undertake their own mitigation measures. This paper explores the efficacy of this approach as a solution and argues that this policy – particularly in the light of new digital criminal methodologies – creates a conflict of victims’ interests. It is an unintended outcome of policy that exacerbates, rather than resolves, identity usurpation and associated victimization in the digital environment.

Publisher

SAGE Publications

Subject

Law,Sociology and Political Science

Reference92 articles.

1. Accenture (2021) 2021 cyber threat intelligence report. Available at: https://www.accenture.com/us-en/insights/security/cyber-threat-intelligence-report-2021 (accessed 15 July 2021).

2. A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate

3. Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions

4. Regulatory Sanctions and Reputational Damage in Financial Markets

5. Australian Cyber Security Centre (2021) Ransomware. Available at: https://www.cyber.gov.au/ransomware (accessed 3 July 2022).

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Risk Assessment and Mitigation With Generative AI Models;Advances in Digital Crime, Forensics, and Cyber Terrorism;2024-09-13

2. An Exploratory Case Study on Data Breach Journalism;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30

3. Ethics and Transparency in Secure Web Model Generation;Advances in Information Security, Privacy, and Ethics;2024-07-26

4. Privacy Essentials;Electronics;2024-06-09

5. Blockchain assisted blind signature algorithm with data integrity verification scheme;Concurrency and Computation: Practice and Experience;2024-03-10

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3