Amplifying victim vulnerability: Unanticipated harm and consequence in data breach notification policy

Loss of control over one’s identity through identity usurpation, or identity theft, results in victimization characterized by multiple species of harm: material harms such as financial loss; medical harms such as psychological distress and consequential physiological illness; and moral harms such as...

Full description

Saved in:  
Bibliographic Details
Authors: Gibson, Dennis (Author) ; Harfield, Clive (Author)
Format: Electronic Article
Language:English
Published: 2023
In: International review of victimology
Year: 2023, Volume: 29, Issue: 3, Pages: 341-365
Online Access: Volltext (lizenzpflichtig)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:

MARC

LEADER 00000caa a22000002 4500
001 185762789X
003 DE-627
005 20230824035939.0
007 cr uuu---uuuuu
008 230823s2023 xx |||||o 00| ||eng c
024 7 |a 10.1177/02697580221107683  |2 doi 
035 |a (DE-627)185762789X 
035 |a (DE-599)KXP185762789X 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Gibson, Dennis  |e VerfasserIn  |4 aut 
245 1 0 |a Amplifying victim vulnerability: Unanticipated harm and consequence in data breach notification policy 
264 1 |c 2023 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Loss of control over one’s identity through identity usurpation, or identity theft, results in victimization characterized by multiple species of harm: material harms such as financial loss; medical harms such as psychological distress and consequential physiological illness; and moral harms such as infringement of autonomy. Digital data breaches are a common means by which identity can be usurped and laws have been enacted requiring data-holders to notify data subjects when their personal information held on digital databases has been compromised. The intention is that victims should then be able to undertake their own mitigation measures. This paper explores the efficacy of this approach as a solution and argues that this policy – particularly in the light of new digital criminal methodologies – creates a conflict of victims’ interests. It is an unintended outcome of policy that exacerbates, rather than resolves, identity usurpation and associated victimization in the digital environment. 
650 4 |a ransomware 
650 4 |a Policy 
650 4 |a harm mitigation 
650 4 |a digital victimization 
650 4 |a Data breach notification 
700 1 |a Harfield, Clive  |e VerfasserIn  |0 (DE-588)1226252443  |0 (DE-627)1747192368  |4 aut 
773 0 8 |i Enthalten in  |t International review of victimology  |d Los Angeles, Calif. [u.a.] : Sage, 1989  |g 29(2023), 3, Seite 341-365  |h Online-Ressource  |w (DE-627)573752672  |w (DE-600)2442080-3  |w (DE-576)309208572  |x 2047-9433  |7 nnns 
773 1 8 |g volume:29  |g year:2023  |g number:3  |g pages:341-365 
856 4 0 |u https://doi.org/10.1177/02697580221107683  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
935 |a mkri 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4369532752 
LOK |0 003 DE-627 
LOK |0 004 185762789X 
LOK |0 005 20230823043607 
LOK |0 008 230823||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)KrimDok#2023-08-22#6AF059D19001CA54F73F258405ED32DAED71FA22 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a zota 
ORI |a SA-MARC-krimdoka001.raw