Examining Phishing Attempts on Data Breach Victims

  • Abstract
  • Literature Map
  • Similar Papers
Abstract
Translate article icon Translate Article Star icon
Take notes icon Take Notes

Data breaches are an everyday occurrence, exposing the personal details of millions globally. The victim impacts of data breaches can be considerable, including a range of financial harms such as fraud and identity crime, as well as non-financial harms, such as declines in emotional and psychological wellbeing. While these harms are documented, there is less research exploring how data breaches in particular expose victims to further victimisation, specifically through phishing attacks by offenders. Using survey data from 2,019 victims of the Optus and Medibank/AHM data breaches in Australia in 2022, this article examines factors which relate to phishing attempts on these individuals. Results indicate limited factors in predicting those targeted by phishing attempts. This highlights the opportunistic nature of phishing attacks in the aftermath of these two data breaches and a more generalised approach taken by offenders to gain additional details. It also demonstrates a need for continued community education and awareness to protect further personal information from being accessed by offenders into the future.

Similar Papers
  • Research Article
  • 10.17781/p001334
The Significance of Mandatory Data Breach Warnings to Identity Crime
  • Jan 1, 2014
  • International Journal of Cyber-Security and Digital Forensics
  • Eric Holm

The relationship between data breaches and identity crime has been scarcely explored in current literature. However, there is an important relationship between the misuse of personal identification information and identity crime as the former is in many respects the catalyst for the latter. Data breaches are one of the ways in which this personal identification information is obtained by identity criminals, and thereby any response to data breaches is likely to impact the incidence of identity crime. Initiatives around data breach notification have become increasingly prevalent and are now seen in many State legislatures in the United States and overseas. The Australian Government is currently in the process of introducing mandatory data breach notification laws. This paper explores the introduction of mandatory data breach notification in Australia, and lessons learned from the experience in the US, particularly noting the link between data breaches and identity crime. The paper proposes that through the introduction of such laws, identity crimes are likely to be reduced. Keywords—identity crime; data breaches; mandatory breach reporting; privacy

  • Conference Article
  • 10.1109/csci46756.2018.00063
Weapons-of-Choice for Identity Crimes
  • Dec 1, 2018
  • Joshua Mannings + 2 more

Over the past decade, formal and anecdotal reports claim that pirated software spreads malware, malware can be used to steal personal and financial information, and organized crime groups may be exploiting these activities to help carry out and finance their operations. This study looked at trends in secondary data regarding malware distribution, pirated software, data breaches and the commission of identity crimes. Analyzing authoritative data from 2013 to 2016 shows: the correlation between pirated software and the number of records exposed in data breaches is statistically insignificant; the number of data breaches cannot be used confidently to predict increases or decreases in identity crimes; so pirated software and data breaches cannot be definitively established as root causes of identity crime. The specifics of organized criminal involvement in pirated software distribution and identity crimes merits further research since those activities could only be inferred from the literature used in this study.

  • Research Article
  • 10.1089/pmr.2024.0060
Levels of Competence and Need for Continuing Education in Nonspecialist Palliative Care Settings—A Qualitative Study of Views from Finnish Health Care Professionals
  • Jul 1, 2024
  • Palliative Medicine Reports
  • Hanna Hävölä + 6 more

Background:The need for palliative care (PC) is increasing due to the growing number of chronic diseases and an aging population. As such, the requirement to ensure the provision of PC is evident. This calls for PC competence for nurses working in nonspecialist PC settings.Objective:The aim was to describe the views of Finnish health care professionals relating to PC competencies and the development needs for continuing education in nonspecialist PC settings.Design:A qualitative study design.Setting/subjects:The data were compiled via an e-survey from health care professionals working in nonspecialist PC settings in Finland; 281 participants answered the open question: “Tell us what you think about the competencies in palliative care.”Measurements:The data were analyzed using inductive content analysis.Results:The description of PC competence was categorized into four main categories, including 64 subcategories. The main category containing the largest number of reduced expressions (f = 303) was “Perceived level of PC competence and development needs.” The competence in PC was also identified as “Perceived need for continuing education in different palliative care competencies” (f = 243), “Building the foundations of one’s own competence” (f = 133), and “Factors related to the work organization and connected to the competence enhancement” (f = 84).Conclusion:The health care professionals in nonspecialist PC settings recognize the importance of ensuring competence and the need for continuous and regular education. The results of this study can be utilized in the planning of continuing education and in targeting it correctly.

  • Research Article
  • Cite Count Icon 2
  • 10.1093/eurpub/ckz186.164
Sexual behaviour and attitudes among university students in Zagreb
  • Nov 1, 2019
  • European Journal of Public Health
  • M Majer + 5 more

Background Sexual behaviour of youth could have reproductive health outcomes with an impact on individual and general population health. The aim of this study was to determine sexual behaviour and attitudes among first year university students in city of Zagreb, Croatia. Methods Study included 298 first year students (61% of females) of Medical School University of Zagreb and 124 students (75% of females) of Catholic University of Zagreb in academic year 2017/2018. Data were collected by anonymous questionnaire School Health Survey, and analysed by descriptive statistics. Results Significantly higher proportion of Catholic University students have had sexual intercourse comparing to medical students of University of Zagreb (48% vs. 36%, P = 0.019). The age of first sexual intercourse for the most of students was from 16-18 years (73% of Catholic University students, and 79% of medical students). Contraception was always used among 54% of Catholic University students, and 67% of medical students, and never used among 11% and 4% of them respectively. Most of the students have gained information about human sexuality from the internet (26% of Catholic University students, and 30% of medical students), followed by friends (18%) and parents (11%) for Catholic University students, and television (25%) and friends (14%) for medical students. Most students expressed the attitude that sex education should be introduced in secondary schools (31% and 36%, respectively), followed by both, in primary and secondary schools (21%, and 30% respectively). Fourteen percent of Catholic University students and 7% of medical students thought that sex education should not be introduced to schools. Conclusions Results showed risky sexual behaviour of university students, especially Catholic University students, indicating the need of continuous education on reproductive health among youth. Key messages Results indicate the need of intervention and continuous education on reproductive health among university students in Zagreb, Croatia. Results showed insufficient use of contraception especially among Catholic University students indicating the need of education on reproductive health among medical and nonmedical students.

  • Research Article
  • 10.62383/pk.v2i3.1019
Tinjauan Yuridis Undang-Undang Perlindungan Data Pribadi Tahun 2022 dalam Menangani Kebocoran Data Pelanggan E-Commerce
  • Jul 28, 2025
  • Pemuliaan Keadilan
  • Lingga Syailendra Arief + 1 more

In the rapidly evolving digital era, data breaches have emerged as a serious threat, particularly in the e-commerce sector which handles vast amounts of customers’ personal data. The protection of personal data has therefore become a crucial issue, requiring effective regulation to ensure digital privacy. In response to this growing concern, Indonesia enacted the Personal Data Protection Law (UU PDP) in 2022 as a significant step toward strengthening digital privacy and security. This study aims to evaluate the effectiveness of the 2022 PDP Law in addressing customer data breach incidents on e-commerce platforms in Indonesia. Using a qualitative approach and case study method, this research analyzes several high-profile data breach cases involving major e-commerce companies in the country. The findings indicate that, although the PDP Law has established a clear legal framework regarding the obligations of reporting and managing data breaches, its implementation still faces multiple challenges. Some companies have not fully complied with the legal timeframes for notifying users, and there is a general lack of transparency in how data breach incidents are managed. These shortcomings reveal a gap between the regulatory framework and practical enforcement in the field. Furthermore, the study highlights the limited public awareness and the insufficient preparedness of some companies in responding to data security incidents in accordance with the law. As a result, the rights of consumers to be informed and protected are not always upheld effectively. This research recommends stronger supervision by relevant authorities to ensure stricter enforcement of the PDP Law. It also underscores the need for ongoing education and intensive training for e-commerce companies to enhance their capacity to prevent, detect, and respond to data breaches in compliance with the legal standards. By reinforcing regulatory implementation and organizational readiness, Indonesia can better safeguard digital consumer rights in the growing e-commerce landscape.

  • Research Article
  • Cite Count Icon 2
  • 10.3233/shti190732
Result and Effectiveness of Malicious E-mail Response Training in a Hospital.
  • Jan 1, 2019
  • Studies in health technology and informatics
  • Lee Hye Sook + 8 more

Malicious e-mails sent intentionally to institutions have caused an increase in data breaches. Measures against these methods must be taken by healthcare institutions to prevent leakage of sensitive personal medical information. As a form of training, we conducted a phishing simulation to gauge the response of the hospital staff to similar email attacks, and to raise awareness about information security protocols.

  • Research Article
  • Cite Count Icon 1
  • 10.1080/0735648x.2025.2535007
Beyond fraud and identity theft: assessing the impact of data breaches on individual victims
  • Jul 20, 2025
  • Journal of Crime and Justice
  • Cassandra Cross + 1 more

Data breaches, or the unauthorised access of personal information, are increasing globally as are the number of victims affected. Existing studies restrict their focus on fraud and identity theft as principal consequences of data breaches for individuals, limiting our knowledge of the extent of other harms associated with victimisation. This article assesses the impacts of third-party data breaches within a sample of 552 Australian victims. The findings note specific behavioural factors and data losses were associated with emotional, health, relationship, and financial harms. This article advocates recognition of data breach impacts beyond the financial losses of fraud and identity crime, and expanding support offered to victims in response to such incidents.

  • Research Article
  • Cite Count Icon 7
  • 10.1080/19361610.2012.686098
Determinants of Data Breaches: A Categorization-Based Empirical Investigation
  • Jul 1, 2012
  • Journal of Applied Security Research
  • Manish Gupta + 1 more

Data security breaches involving personal and sensitive information have significantly grown over the last few years. The stolen personal information—which includes social security number (SSN), medical records, date of birth, etc.—has been used to launch fraud against individuals and organizations. It already costs billions of dollars in the United States to detect and remediate consequences of security breaches which include identity theft frauds and lawsuits. It is estimated that on an average a company spends $2 million per data breach. With the increase in the rate of breaches, it has become equally important for organizations and individuals to understand the risks and take measures to safeguard personal information. This article investigates data security breaches, which accounted for about 26 million compromised records of personal information in the United States, to present the trends and risks that characterize the security breaches. The article categorizes the incident and loss trends into different dimensions including the industry, victim type, data type, and threats such as stolen computer, hacking and unauthorized access. The research can aid individuals and organizations understand the data breach, trends and evaluate their own risks in handling personal information, which will help them to make better and informed decisions to protect against data breaches.

  • Research Article
  • 10.3126/prashasan.v57i1.80668
Enacting Data Protection Law in Nepal
  • Jun 26, 2025
  • Prashasan: The Nepalese Journal of Public Administration
  • Newal Chaudhary

In today's interconnected world, digital transactions and online activities have become indispensable facets of daily life, revolutionizing the way we communicate, conduct business, and access information. However, this rapid digitalization has also raised a critical concern, the protection of personal and sensitive data. As individuals and organizations increasingly rely on digital platforms and services, the risk of unauthorized access, disclosure, or theft of confidential information has escalated significantly. Data breaches, which involve the unauthorized acquisition of sensitive data, pose grave risks to both individuals and organizations. For individuals, a data breach can lead to identity theft, financial fraud, and misuse of personal information, potentially causing long-lasting harm and financial losses. Organizations, on the other hand, may face severe reputational damage, loss of customer trust, legal liabilities, and substantial financial consequences resulting from data breaches. Nepal, like many other nations, has witnessed a surge in data breach incidents in recent years, exposing vulnerabilities in its digital landscape and highlighting the pressing need for a comprehensive legal framework to address this critical issue. High-profile cases, such as the breach of the Ramailo app database in 2023 and the Vianet data breach in 2020, have underscored the urgency of implementing robust measures to safeguard the privacy and security of individuals' personal information. This article explores the current legislative landscape in Nepal by examining existing laws and policies related to cybersecurity and data protection. It critically evaluates the gaps and shortcomings in the current legal framework, highlighting the lack of specific provisions and enforcement mechanisms needed to effectively address the complexities of data breaches. Through comprehensive analysis, the article advocates for the enactment of a dedicated data protection law in Nepal. Such a law would encompass key aspects like mandatory breach notification requirements, stringent data protection standards, and effective enforcement mechanisms. By addressing these crucial elements, a robust data protection law can safeguard the rights and interests of Nepali citizens, fostering a secure and trusted digital environment that promotes economic growth, innovation, and public confidence in the digital ecosystem. This article emphasizes the importance of a comprehensive legal framework that aligns with international best practices and facilitates cross-border cooperation in combating the global threat of data breaches. By establishing clear guidelines, accountability measures, and consumer protections, a dedicated data protection law can empower individuals, organizations, and regulatory bodies to proactively address data breaches, mitigate potential risks, and uphold the principles of privacy and data security in the digital age.

  • Research Article
  • 10.47065/josh.v6i3.5876
Pemodelan Attack Tree Pada Spear Phishing Attack di Instansi Publik dengan Metrik Granularitas Data
  • Apr 6, 2025
  • Journal of Information System Research (JOSH)
  • Anisa Wahyu Pratiwi + 2 more

Data security is important to protect personal and sensitive information. Data leakage cases that have occurred in Indonesia have recorded that 80% of Indonesian citizens' data is sold on dark forums (dark web), this will certainly cause losses to individuals and organizations. Factors that cause data leaks can be the lack of security protocols, direct attacks, or phishing attacks. One type of phishing attack that targets more specific individuals is called a spear phishing attack. This research aims to identify potential data leakage from public data in public institutions by formulating an attack tree based on the Data Flow Diagram (DFD) of a spear phishing attack using data granularity metrics with a combination of attacks from Open Source Intelligence (OSINT) tools, social engineering tools, and email spoofing. This research generates and compares four attack tree models with no attack launching or exploitation. First OSINT TheHarvester, social engineering SEToolkit, and email spoofing. Second OSINT Metagoofil, social engineering ZPhisher, and email spoofing. Third OSINT Recon-ng, social engineering SEToolkit, and email spoofing. The fourth OSINT Snov.io, social engineering ZPhisher, and email spoofing. Spear phishing attack using OSINT Snov.io is the best attack combination because it has varied data details, namely getting five types of data and a high level of data granularity with a total of 367 data so that there are more opportunities to carry out attack planning and security analysis.

  • PDF Download Icon
  • Research Article
  • 10.52214/vib.v10i.12505
Protecting Confidentiality in the Digital Ecosystem of Humanitarian Aid
  • Mar 12, 2024
  • Voices in Bioethics
  • Cara Lewis

Protecting Confidentiality in the Digital Ecosystem of Humanitarian Aid

  • Book Chapter
  • 10.4018/979-8-3693-3703-5.ch010
The Challenges for E-Commerce Using AI Applications
  • Sep 27, 2024
  • Imdad Ali Shah + 1 more

The primary objective of this chapter is to exhaustive analysis of the constantly changing security and privacy issues and important factors in e-commerce. The need to protect sensitive data and guarantee user privacy has increased with the growth of the digital economy. This chapter examines many security concerns, such as phishing attacks, data breaches, and payment gateway vulnerabilities, and highlights the possible consequences for both consumers and organisations. It explores cutting-edge technology and creative fixes meant to strengthen e-commerce platforms against dynamic cyberattacks. In addition to pointing out the vulnerabilities that now exist, the study suggests preventative measures as well as future lines of inquiry and application. We look at biometric authentication, and privacy-preserving technologies as possible ways to improve the security of e-commerce platforms. The data that is being presented highlights how important it is for technology, legislation, and user awareness to come together to provide a safe and reliable online purchasing environment. To strengthen the digital marketplace against the challenges presented by a constantly changing cyber landscape, in competitive markets, businesses try to increase their profit margins without sacrificing the quality of their products. Conversely, customers successfully fulfil their needs and desires at home. AI provides answers for a wide range of issues that both consumers and business owners face. Computer-based information can benefit economic growth, organizations, managers, and buyers. Without a doubt, AI improves human lives. Artificial intelligence has the potential to improve economic growth and raise everyone's standard of living. People and businesses everywhere are eager to invest in human resources, and e-business is crucial to continuously providing customers with the easiest way to purchase goods and services. Moreover, the emergence of an AI-ready business does not translate into a rise in the need for mechanical expertise. The use of electronic commerce has made life better. We focused on phishing attacks, data breaches, blockchain payment gateway, Ransomware attacks, Cloud-based and cyber attacks in E-commerce.

  • Research Article
  • Cite Count Icon 3
  • 10.2139/ssrn.3785734
Psychological Data Breach Harms
  • Mar 23, 2021
  • SSRN Electronic Journal
  • Ido Kilovaty

Cybersecurity law, both in statutory and case law, is primarily based on the premise that data breaches result exclusively in financial harms. Intuitively, legal scholarship has largely been focused on financial harms to the exclusion of non-financial harms—emotional and mental—that also arise from data breaches. A critical mass of research in psychology, psychiatry, and internet studies shows that consumers whose information has been compromised suffer from serious emotional and mental conditions as a result. This Article seeks to evaluate cybersecurity law in light of this reality and proposes a framework to address these psychological data breach harms. Psychological data breach harms raise significant challenges for which the law does not adequately account. Consumers suffering these harms are unlikely to pursue litigation and, even if consumers do pursue litigation, are unlikely to prevail because of both standing and cause of action reasons. In a similar vein, different cybersecurity law frameworks, such as the Computer Fraud and Abuse Act, data security laws, data breach notification laws, and Federal Trade Commission enforcement, do not generally recognize any harms that are non-monetary in nature. Moreover, companies suffering data breaches are not legally required to offer any assistance or mitigation response for consumers who may suffer psychological harms. Contributing to these challenges is the fact that breached companies are often not even required to disclose breaches that are unlikely to cause future financial harm. Cybersecurity law currently overlooks a conceptual framework for psychological data breach harms; this Article offers that framework. First, this Article argues for the recognition of psychological data breach harms in the context of cybersecurity, from the very outset. Second, this Article makes concrete recommendations on how psychological data breach harms ought to be addressed, both by regulators and breached entities, as well as the appropriate remedies. Finally, this Article calls for a reconsideration of what we mean by “personal information” and for the expansion of information categories that cybersecurity law should protect.

  • Research Article
  • 10.1016/j.carage.2015.05.008
Health Data Breaches Compromised 29 Million Patient Records in 2010–2013
  • Jun 1, 2015
  • Caring for the Ages
  • Jennie Smith

Health Data Breaches Compromised 29 Million Patient Records in 2010–2013

  • PDF Download Icon
  • Research Article
  • 10.47760/cognizance.2024.v04i12.041
Hacking Incidents and their Long-Term Implications for User Privacy and Trust
  • Dec 30, 2024
  • Cognizance Journal of Multidisciplinary Studies
  • Nur Sharief J Abubakar + 11 more

In an era characterized by rapid technological advancement and increasing digital interconnectivity, the prevalence of hacking incidents has emerged as a critical concern for individuals, businesses, and policymakers alike. This research paper explores the multifaceted implications of cyberattacks, focusing on data breaches and ransomware incidents and their long-term effects on user privacy and trust. As organizations increasingly rely on digital platforms for operations and customer engagement, the security of sensitive data has become paramount. The findings reveal that hacking incidents compromise personal information and lead to significant reputational damage and financial repercussions for organizations. Through a comprehensive analysis of high-profile case studies, including the breaches at Equifax, Target, and Facebook, this research highlights the immediate and enduring consequences of these incidents. The Equifax breach, which exposed the personal information of approximately 147 million consumers, serves as a stark reminder of the vulnerabilities inherent in data management systems. Following this incident, consumer trust in Equifax plummeted, resulting in a substantial loss of business and long-term reputational harm. Similarly, the Target data breach, which compromised credit card information for millions of customers during the holiday shopping season, illustrates how timing can exacerbate the fallout from cyberattacks. The study demonstrates that consumers are increasingly likely to sever ties with organizations that fail to protect their data, with surveys indicating that nearly 30% of consumers would stop doing business with companies after a breach. Moreover, this research delves into the evolving legal and regulatory landscape surrounding data protection in response to rising cyber threats. Legislation such as the General Data Protection Regulation (GDPR) in Europe and the California Consumer Privacy Act (CCPA) in the United States has established stricter requirements for organizations regarding data handling and breach notification. These regulations reflect a growing recognition of the need to protect consumer rights in an increasingly digital economy. Organizations that fail to comply with these regulations not only face significant fines but also risk further damaging their reputation in the eyes of consumers who are becoming more discerning about how their data is managed. The psychological impact of hacking incidents on consumers is another critical aspect explored in this paper. The fear of identity theft or fraud can lead individuals to alter their online behaviors significantly. Many consumers may choose to limit the amount of personal information they share or avoid certain platforms altogether due to concerns about data security. This shift in behavior poses challenges for businesses striving to engage customers effectively in an increasingly competitive digital marketplace. Ultimately, this research underscores the necessity for organizations to adopt robust cybersecurity measures and foster a culture of transparency and accountability to rebuild trust among consumers. By understanding the complex relationship between hacking incidents and their implications for user privacy and trust, businesses can better navigate the challenges posed by cyber threats. This study aims to provide valuable insights for organizational leaders, cybersecurity professionals, and policymakers as they work to enhance resilience against cyberattacks while safeguarding user privacy in an era marked by digital vulnerability.

Save Icon
Up Arrow
Open/Close
  • Ask R Discovery Star icon
  • Chat PDF Star icon

AI summaries and top papers from 250M+ research sources.