Amplifying victim vulnerability: Unanticipated harm and consequence in data breach notification policy

Loss of control over one’s identity through identity usurpation, or identity theft, results in victimization characterized by multiple species of harm: material harms such as financial loss; medical harms such as psychological distress and consequential physiological illness; and moral harms such as...

Descripción completa

Guardado en:  
Detalles Bibliográficos
Autor principal: Gibson, Dennis (Autor)
Otros Autores: Harfield, Clive
Tipo de documento: Electrónico Artículo
Lenguaje:Inglés
Publicado: 2023
En: International review of victimology
Año: 2023, Volumen: 29, Número: 3, Páginas: 341-365
Acceso en línea: Volltext (lizenzpflichtig)
Journals Online & Print:
Gargar...
Verificar disponibilidad: HBZ Gateway
Palabras clave:

MARC

LEADER 00000caa a22000002c 4500
001 185762789X
003 DE-627
005 20230824035939.0
007 cr uuu---uuuuu
008 230823s2023 xx |||||o 00| ||eng c
024 7 |a 10.1177/02697580221107683  |2 doi 
035 |a (DE-627)185762789X 
035 |a (DE-599)KXP185762789X 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Gibson, Dennis  |e VerfasserIn  |4 aut 
245 1 0 |a Amplifying victim vulnerability: Unanticipated harm and consequence in data breach notification policy 
264 1 |c 2023 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Loss of control over one’s identity through identity usurpation, or identity theft, results in victimization characterized by multiple species of harm: material harms such as financial loss; medical harms such as psychological distress and consequential physiological illness; and moral harms such as infringement of autonomy. Digital data breaches are a common means by which identity can be usurped and laws have been enacted requiring data-holders to notify data subjects when their personal information held on digital databases has been compromised. The intention is that victims should then be able to undertake their own mitigation measures. This paper explores the efficacy of this approach as a solution and argues that this policy – particularly in the light of new digital criminal methodologies – creates a conflict of victims’ interests. It is an unintended outcome of policy that exacerbates, rather than resolves, identity usurpation and associated victimization in the digital environment. 
650 4 |a ransomware 
650 4 |a Policy 
650 4 |a harm mitigation 
650 4 |a digital victimization 
650 4 |a Data breach notification 
700 1 |a Harfield, Clive  |e VerfasserIn  |0 (DE-588)1226252443  |0 (DE-627)1747192368  |4 aut 
773 0 8 |i Enthalten in  |t International review of victimology  |d Los Angeles, Calif. [u.a.] : Sage, 1989  |g 29(2023), 3, Seite 341-365  |h Online-Ressource  |w (DE-627)573752672  |w (DE-600)2442080-3  |w (DE-576)309208572  |x 2047-9433  |7 nnas 
773 1 8 |g volume:29  |g year:2023  |g number:3  |g pages:341-365 
856 4 0 |u https://doi.org/10.1177/02697580221107683  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
935 |a mkri 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4369532752 
LOK |0 003 DE-627 
LOK |0 004 185762789X 
LOK |0 005 20230823043607 
LOK |0 008 230823||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)KrimDok#2023-08-22#6AF059D19001CA54F73F258405ED32DAED71FA22 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a zota 
ORI |a SA-MARC-krimdoka001.raw