When Data Breaches Happen, Where Does the Buck Stop ... and Where Should it Stop?

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Abstract

A digital-first society requires its citizens to carry out essential activities online e.g., applying for a passport, managing pension funds or scheduling medical appointments. Sensitive and personal information is requested and provided in the hope that the confidentiality, integrity and availability thereof will be preserved. In reality, data breaches occur with distressing regularity. When this occurs, ‘second’ victims are created: the customers whose data has been leaked. In many cases, service providers demonstrate very little care or concern for these victims, responsibilizing instead of supporting them. We surveyed 175 respondents, including second victims, non-victims and managers. It becomes clear that a ‘feudal security’ paradigm informs organisations’ responses to data breaches. Indeed, the buck seems to stop with second victims, instead of with the breached service provider. We propose an ‘Ethical Responsibilization’ paradigm which would see second victims treated more equitably and fairly.
Original languageEnglish
Title of host publication NSPW '24: Proceedings of the New Security Paradigms Workshop
PublisherAssociation for Computing Machinery (ACM)
Pages106-125
Number of pages20
ISBN (Electronic)9798400711282
ISBN (Print)9798400711282
DOIs
Publication statusPublished - 16 Jan 2025
EventNSPW '24 New Security Paradigms Workshop 2024 - Omni Bedford Springs Resort & Spa, Bedford , United States
Duration: 16 Sept 202419 Nov 2024
https://www.nspw.org/2024

Conference

ConferenceNSPW '24 New Security Paradigms Workshop 2024
Abbreviated titleNSPW '24
Country/TerritoryUnited States
CityBedford
Period16/09/2419/11/24
Internet address

Bibliographical note

Publisher Copyright:
Copyright © 2024 held by the owner/author(s).

Fingerprint

Dive into the research topics of 'When Data Breaches Happen, Where Does the Buck Stop ... and Where Should it Stop?'. Together they form a unique fingerprint.
  • Equitable Privacy

    Rashid, A. (Principal Investigator), Liveley, G. (Principal Investigator), Ramokapane, M. (Co-Investigator), Ajmeri, N. (Co-Investigator), Coles-Kemp, L. (Co-Investigator), Huan, R. (Researcher) & Patnaik, N. (Researcher)

    1/09/2228/02/26

    Project: Research, Parent

Cite this