Amplifying victim vulnerability: Unanticipated harm and consequence in data breach notification policy
Loss of control over one’s identity through identity usurpation, or identity theft, results in victimization characterized by multiple species of harm: material harms such as financial loss; medical harms such as psychological distress and consequential physiological illness; and moral harms such as...
Authors: | ; |
---|---|
Format: | Electronic Article |
Language: | English |
Published: |
2023
|
In: |
International review of victimology
Year: 2023, Volume: 29, Issue: 3, Pages: 341-365 |
Online Access: |
Volltext (lizenzpflichtig) |
Journals Online & Print: | |
Check availability: | HBZ Gateway |
Keywords: |
MARC
LEADER | 00000caa a22000002 4500 | ||
---|---|---|---|
001 | 185762789X | ||
003 | DE-627 | ||
005 | 20230824035939.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230823s2023 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1177/02697580221107683 |2 doi | |
035 | |a (DE-627)185762789X | ||
035 | |a (DE-599)KXP185762789X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
084 | |a 2,1 |2 ssgn | ||
100 | 1 | |a Gibson, Dennis |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Amplifying victim vulnerability: Unanticipated harm and consequence in data breach notification policy |
264 | 1 | |c 2023 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Loss of control over one’s identity through identity usurpation, or identity theft, results in victimization characterized by multiple species of harm: material harms such as financial loss; medical harms such as psychological distress and consequential physiological illness; and moral harms such as infringement of autonomy. Digital data breaches are a common means by which identity can be usurped and laws have been enacted requiring data-holders to notify data subjects when their personal information held on digital databases has been compromised. The intention is that victims should then be able to undertake their own mitigation measures. This paper explores the efficacy of this approach as a solution and argues that this policy – particularly in the light of new digital criminal methodologies – creates a conflict of victims’ interests. It is an unintended outcome of policy that exacerbates, rather than resolves, identity usurpation and associated victimization in the digital environment. | ||
650 | 4 | |a ransomware | |
650 | 4 | |a Policy | |
650 | 4 | |a harm mitigation | |
650 | 4 | |a digital victimization | |
650 | 4 | |a Data breach notification | |
700 | 1 | |a Harfield, Clive |e VerfasserIn |0 (DE-588)1226252443 |0 (DE-627)1747192368 |4 aut | |
773 | 0 | 8 | |i Enthalten in |t International review of victimology |d Los Angeles, Calif. [u.a.] : Sage, 1989 |g 29(2023), 3, Seite 341-365 |h Online-Ressource |w (DE-627)573752672 |w (DE-600)2442080-3 |w (DE-576)309208572 |x 2047-9433 |7 nnns |
773 | 1 | 8 | |g volume:29 |g year:2023 |g number:3 |g pages:341-365 |
856 | 4 | 0 | |u https://doi.org/10.1177/02697580221107683 |x Resolving-System |z lizenzpflichtig |3 Volltext |
935 | |a mkri | ||
951 | |a AR | ||
ELC | |a 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 4369532752 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 185762789X | ||
LOK | |0 005 20230823043607 | ||
LOK | |0 008 230823||||||||||||||||ger||||||| | ||
LOK | |0 035 |a (DE-2619)KrimDok#2023-08-22#6AF059D19001CA54F73F258405ED32DAED71FA22 | ||
LOK | |0 040 |a DE-2619 |c DE-627 |d DE-2619 | ||
LOK | |0 092 |o n | ||
LOK | |0 852 |a DE-2619 | ||
LOK | |0 852 1 |9 00 | ||
LOK | |0 935 |a zota | ||
ORI | |a SA-MARC-krimdoka001.raw |