A Taxonomy of Cyber-Harms: Defining The Impacts of Cyber-Attacks and Understanding How They Propagate
A Taxonomy of Cyber-Harms: Defining The Impacts of Cyber-Attacks and Understanding How They Propagate
A Taxonomy of Cyber-Harms: Defining The Impacts of Cyber-Attacks and Understanding How They Propagate
doi: 10.1093/cybsec/tyy006
Review article
Review article
Abstract
Technological advances have resulted in organizations digitalizing many parts of their operations.
The threat landscape of cyberattacks is rapidly changing and the potential impact of such attacks is
uncertain, because there is a lack of effective metrics, tools and frameworks to understand and as-
sess the harm organizations face from cyber-attacks. In this article, we reflect on the literature on
harm, and how it has been conceptualized in disciplines such as criminology and economics, and
investigate how other notions such as risk and impact relate to harm. Based on an extensive litera-
ture survey and on reviewing news articles and databases reporting cyber-incidents, cybercrimes,
hacks and other attacks, we identify various types of harm and create a taxonomy of cyber-harms
encountered by organizations. This taxonomy comprises five broad themes: physical or digital
harm; economic harm; psychological harm; reputational harm; and social and societal harm. In
each of these themes, we present several cyber-harms that can result from cyber-attacks. To pro-
vide initial indications about how these different types of harm are connected and how cyber-harm
in general may propagate, this article also analyses and draws insight from four real-world case
studies, involving Sony (2011 and 2014), JPMorgan and Ashley Madison. We conclude by arguing
for the need for analytical tools for organizational cyber-harm, which can be based on a taxonomy
such as the one we propose here. These would allow organizations to identify corporate assets,
link these to different types of cyber-harm, measure those harms and, finally, consider the security
controls needed for the treatment of harm.
Key words: cybersecurity; risk; cyber-attack impacts; harm; organisational security; information systems
that are perpetrated and can all result in harm to an enterprise which of the harm, which might result from cyber-attacks. It is this lack of
is dependent on digital technologies to conduct their business, and knowledge that may result in the deployment of controls incapable
which are often custodians of people’s data and metadata about of mitigating the overall harm. Such limitations may prevent us
people. We initially define cyber-harm as the damage that arises as a from identifying and understanding all the potential harms that can
direct result of an attack conducted wholly or partially via digital result and the relationships that might exist between them.
infrastructures, and the information, devices and software applica- Essentially, we may be selecting our risk treatments and controls
tions that these infrastructures are composed of. Understanding the based on knowledge that does not fully take account of the ways in
nature of such cyber-harm is critical to ensure that the controls and which harm can emerge, nor of the breadth of harms that can result
methods of mitigation we deploy are effective and proportionate to from a single cyber-attack. If one simply takes each risk and treats it
the risks. This article surveys the literature with a view to elucidate in isolation, one may not see the connection between various risks
the nature of cyber-harm and to underpin further research aimed at and the cascade of harms that can result.
analytical frameworks for reasoning about such harm.
ascribing to the principle of non-maleficence, i.e. literally doing no nature’ . The second transformation, namely the end of tradition,
harm [5]. describes ‘a process of individualisation’ [16], where people question
Kleinig provides one of the more critical and philosophical dis- traditions, institutions and old societal norms.
cussions on harm, and synthesizes traditional definitions as well as A risk society that has experienced these two transformations
existing research from several disciplines including law, ethics, experiences ‘uncontrollable risk’ because the risks are now
health and philosophy [6]. Based on his comprehensive reflection, he ‘manufactured, second-ordered and unnatural’ [17]. Unanticipated
suggests that harm may be understood as the impairment of the wel- advances in technology can increase the gap between actual and per-
fare interests of a being, with welfare interests regarded as those ne- ceived risks, transform visible risks to invisible to virtual and render
cessary to the functioning of individuals as purposeful, self-reflective these risks borderless—a concept described by Giddens as the ‘scien-
and responsible agents. This description is insightful for at least two tization of nature’, ‘the colonization of nature’ or ‘the end of nature’
reasons. First, it highlights the conventional use of harm to define a [16]. Therefore, the traditional concept of risk perceived as the prob-
negative consequence (as a result of some action), and secondly, it ability of an adverse event multiplied by the magnitude of impact
centres on beings or individuals as the typical subject of harm. This must be expanded. In order to expand our understanding of risk,
harms at the top, ‘one-off’ victims who suffered severe losses in the others, to provide a holistic understanding on the economics of in-
middle and victims who are unaware of the fraud, or have incurred formation security [25].
small costs, at the bottom. Secondary effects of harm are also con- In a similar vein, Moore highlights further challenges in the field
sidered, with the authors suggesting that these relate to victims who of economics of cybersecurity [26]. Drawing from concepts from the
experience great losses or suffer psychological effects. field of economics, Moore identifies challenges, inter alia, mis-
Furthermore, Van Slyke’s study considers harms that may relate aligned incentives such as the natural tension between efficiency and
not only to individuals but also to other stakeholders, such as com- resilience in IT systems, information asymmetries and externalities.
munities, neighbourhoods, governments and society at large. He suggests that to overcome these challenges regulatory interven-
Specific focus is also given to calculating the costs of crime, with the tion is necessary. Moore further identifies online identity theft, in-
authors arguing for three types of costs, those incurred in anticipa- dustrial cyber-espionage, critical infrastructure protection and
tion of a crime, those incurred as a consequence of it and those in botnets as the most persistent threats in cybersecurity and proposes
responding to it. They suggest two approaches to calculating these a series of regulatory solution options.
costs: ‘bottom-up’ based on surveying crime cases and estimating in- Other efforts focus on the evolution of risk frameworks, model-
highlight the problem of moral hazard in Critical National software-development companies and report that on average ven-
Infrastructure (CNI) and propose the regulation of best practice dors lose 0.6% of their market value when software vulnerabilities
approaches to cybersecurity for these stakeholders. are exposed. Regarding exposure or leakage of customer data,
Focusing on the incentives for CNI and regulatory approaches, Acquisti et al. [37] provide significant statistical evidence that there
Laube et al. examine the economics of mandatory security-breech is a negative short-term impact on the value of stocks, but this effect
reporting to authorities [31]. They design a principal-agent model decreases rapidly over time. Further evidence of the negative effects
able to describe conflicts of interest between regulators and organ- on the market value of an organization that may arise from a cyber-
izations. Their model considers security investment and firms’ inter- breach once it is made public is presented by Cavusoglu, Mishra and
dependence, mandatory security-breach reporting and security Raghunathan [38]. More recently, there have been concerns regard-
audits. They conclude that laws, which enforce mandatory security- ing associating fluctuations in stock prices with cyber-incidents and,
breach reporting are essential for high-security interdependent firms in particular, with data breaches [39].
with the premise that disclosure costs are low. There are types of attacks, however, that do not seem to have
Kshetri attempts to define a cost-benefit calculus using a similar an impact on the value of the stock of organizations, such as DoS
costs, business interruption costs and reputational damage, even There have been several attacks that have exemplified the physic-
bankruptcy if the attack is persistent for a certain number of days. al reality of cyber-harm. Two of the most prominent are the recent
It is evident that models reasoning about harm are scarce and are Ukrainian blackout [50], where malware facilitated the shut down
either based on fictional scenarios or try to reason about harms of a power plant and prevented essential systems from rebooting;
based on statistical data about costs. However, the quantification of and the remote hijacking of the Jeep Cherokee, where white hat
harm is still an unsolved problem for organizations. Most hackers obtained full control of the vehicle, resulting in car manu-
approaches have focused on insight from stock-market prices; how- facturer Chrysler recalling 1.4 million vehicles before any malicious
ever, they fall short in estimating the harm related to cyber-attacks attack was attempted [51]. The Chrysler attack drew the attention
and incidents. This is because usually drops in stock-market prices of the automotive industry to the risks that Internet-of-Things (IoT)
are brief [40, 41], while costs that relate to other types of harm such may pose to all manufacturers. These add to the other better-known
as physical damages or incident response costs are neglected. Cyber- impacts of attacks including damaged corporate reputation, loss of
VaR is promising but much more needs to be done before this customers and business partners, and (financial) compensation to
becomes a viable option for organizations. affected parties; as witnessed by Sony, Target and Ashley Madison
basis. The same rationale as that applied with the VCDB regarding • Psychological harm (i.e. harm which focuses on an individual
extracting relevant incidents was followed here, and we again and their mental well-being and psyche)
focused on contemporary reports. • Reputational harm (i.e. harm pertaining to the general opinion
We then applied content analysis [58] to process the sources in held about an entity)
our dataset. Content analysis is a qualitative data analysis technique, • Social and Societal harm (i.e. a capture of harms that may result
aiming to identify key ‘themes’ in documents. There are three in a social context or society more broadly) [2, 61, 62].
approaches to content analysis: the first is the inductive approach
For each one of these types, we identified several sub-types that
that is based on ‘open coding’, meaning that the categories or
characterized that harm in further detail. In Tables 1–5 below, we
themes are freely created by the researcher. In open coding, headings
present and describe the main sub-types as well as including appro-
and notes are written in the transcripts while reading them and dif-
priate references to articles that exemplify them. Harm types are
ferent categories are created to include similar notes that capture the
designed to be distinctive, however, all types may be attempted to be
same aspect of the phenomenon under study. The second approach
interpreted in economic terms. Thus, economic harm may overlap
is deductive content analysis that requires the prior existence of a
completely avoid the company. Social-media platforms such as real-world attacks, which provide initial insights into how our tax-
Twitter can exacerbate this harm due to the great visibility they give onomy can be used to identify propagation sequences of different
to customers and the public [35]. This highlights a subset of the types of cyber-harm, thus illustrating how cyber-harm can emerge
wide span of consequential harms, captured in the taxonomy, that and cascade. The four case studies were chosen based on the detailed
result from cyber-incidents. accounts of the impact of cyber-attacks in the organizations that
was publicly available, and because of the long-lasting effects of
these attacks. Using the harms in our taxonomy shown in Fig. 1, we
The propagation of cyber-harm identify the assets that were targeted in the case studies, which types
As the literature from criminology and cyber-economics suggests of harm occurred first and how these harms in turn triggered differ-
[18, 19, 24, 25], harm has interesting characteristics that relate to ent types of harm. Our aim is to explore common sequences of
cascading effects. In this section, we consider four case studies of harms, which may be likely to result given that an initial harm has
Journal of Cybersecurity, 2018, Vol. 0, No. 0 9
Table 1. Defining elements in the taxonomy for the physical or digital harm type
Physical or digital Damaged or unavailable – The asset has been physically or digitally affected to the point where it is not available to fulfil
its intended purpose [57]
Destroyed – The asset has been physically or digitally ruined [12]
Theft – The asset has been physically or digitally stolen [63]
Compromised – The asset has been physically or digitally affected [63]
Infected – The asset has been physically or digitally contaminated [50]
Exposed or leaked – The asset has been physically or digitally disclosed [64]
Corrupted – The asset has been physically or digitally debased or its integrity affected [50]
Reduced performance – The asset has had its ability to function lowered [57]
Bodily injury – The body of the human asset has been wounded [12]
Pain – The human asset has experienced agony [12]
Table 2. Defining elements in the taxonomy for the economic harm type
Economic Disrupted operations – The operational assets (e.g. processes) are not functioning as expected [12]
Disrupted sales or turnover – The amount of sales or turnover of the organization has been reduced [52]
Reduced customers – The number of customers of the organization has dropped [52]
Reduced profits – The profits of the organization have dropped [52, 68]
Reduced growth – The growth of the organization has dropped [68]
Reduced investments – The investments made by external parties into the organization have dropped [67]
Fall in stock price – The stock price of the organization has dropped [67]
Theft of finances – Finances of the organization have been stolen [69]
Loss of finances or capital – Finances or capital have been diminished [67]
Regulatory fines – Fines levied by regulatory bodies that the organization is liable to pay [12]
Investigation costs – The fees payable by the organization for investigating an incident [67]
PR response costs – The fees payable by the organization for engaging a public relations after an incident [67]
Compensation payments – The costs that the organization has had to pay as compensation to those affected by the incident [70]
Extortion payments – The costs that the organization has had to pay to continue its operations (e.g. after ransom-related incidents)
[65]
Loss of jobs – The organization has had to reduce its number of employees [12]
Scam victims – The organization or its stakeholders have been conned [65]
Table 3. Defining elements in the taxonomy for the psychological harm type
occurred. We perform this analysis here in order to demonstrate The Sony cases
that the taxonomy can adequately characterize harms arising in such In April 2011, amid unstable economic conditions, Sony announced
scenarios. This could, however, also be used in gaining a better that personal information for 77 million PlayStation Network (PSN)
understanding of the broader risk facing the organization along the subscribers as well as 24.6 million Sony Online Entertainment
dimensions proposed by Beck and Giddens [15–17]. accounts had been exposed due to an external breach [64]. The data
10 Journal of Cybersecurity, 2018, Vol. 0, No. 0
Table 4. Defining elements in the taxonomy for the reputational harm type
Reputational Damaged public perception – An adverse change in how the public regards the organization [12]
Reduced corporate goodwill – A negative change in the established reputation of an organization [67]
Damaged relationship with customers – An adverse change in relationship between the organization and its customers [67]
Damaged relationship with suppliers – An adverse change in relationship between the organization and its suppliers [62]
Reduced business opportunities – A negative change in the chances for organizational expansion and growth [67]
Inability to recruit desired staff – Difficulty to attract and recruit appropriate employees for roles within the organization [73]
Media scrutiny – Media outlets continuously examining the organization [12]
Loss of key staff – Key employees within the organization have either been let go, reassigned, or have resigned [74]
Loss or suspension of accreditation or certifications – The organization has had its accreditation or certifications removed tempor-
arily or permanently [12]
Reduced credit scores – Stakeholders associated with the organization have had or are at risk of having their credit scores negative-
Table 5. Defining elements in the taxonomy for the social and societal harm type
Social and societal Negative changes in public perception – An adverse change in how society generally regards the organization [52]
Disruption in daily life activities – Daily life activities and services in a society not functioning as expected [68]
Negative impact on nation – An adverse impact on how a nation (including its services, etc.) functions [50]
Drop in internal organization morale – A reduction how employees within the organization perceive that organization [57, 66]
breach involved information about account logins, passwords, credit Sony was forced to replace a large number of its systems, set up
card details, purchase histories and billing addresses. Sony’s facilities a hotline for identity fraud, provide psychological counselling for
in Japan were also heavily impacted from the earthquake of March employees and organize seminars on data security. Following the at-
2011, resulting in the suspension of several critical operations, tack, Sony’s employees received emails threatening their families if
which rendered the cyber-attack well timed to inflict maximum they did not denounce Sony, their credit cards were available for
damage. Sony had to place its PSN services offline the day following sale on Dark Net markets, and some witnessed their bank accounts
the attack [67] to assess the extent of the incident, resulting in loss exceeding credit limits. A survey conducted by the Identity Theft
of revenue; incurred response costs regarding identifying and Resource Center regarding victims of identity theft, reported that
addressing the vulnerabilities exploited and notifying the customers; victims’ experienced ‘denial, frustration, rage, fear, betrayal, and
a rough estimate of the costs is $171 million. This figure, however, powerlessness in the days, weeks, and years after the violation’ [57].
does not include punitive damages from lawsuits, costs from identity Class-action lawsuits from employees were filed, either because
theft or any other misuse of stolen credit cards, nor the loss of busi- Sony did not notify those whose data was leaked, or over fears of
ness and market capitalization [67]. how personal leaked information could be potentially used. This
In late April 2011, Sony provided a comprehensive recovery plan also contributed to the fact that some key staff left the company;
and an accurate calculation of the costs inflicted from the earth- and furthermore, the press discovered Sony’s diversity issues,
quake, but they were still not yet able to calculate the full organiza- which were discussed extensively in the content of the leaked emails
tional harm from the cyber-attack [64]. The aggregated impact of [57, 66].
the earthquake and the data breach resulted in a significant decrease
in Sony’s market evaluation as depicted in stock-exchange markets.
Sony’s share price dropped 19% after the earthquake, a drop The JP Morgan case
equivalent to the general Japanese stock exchange market, but soon JP Morgan Chase, one of the largest banks in the USA, reported that
recovered 50% of this loss [64]. After the cyber-attack, however, hackers obtained administrator access to several of their servers.
Sony’s price sustained a 12% loss (this time it was not a reflection of Information regarding names, phone numbers, email and physical
the rest of the Japanese economy), and the revelation of the security addresses of account holders was exfiltrated, affecting 76 million
weaknesses once Sony had restored service prolonged the recovery households and seven million small businesses. JP Morgan had
phase [64]. announced an increase in their cybersecurity budget of $250 million
Three years after these incidents, in November 2014, confiden- per year just before the attack occurred [76]. The company was
tial data from Sony Pictures were once again leaked. The data forced to replace the majority of its IT infrastructure, a process that
included more than 30 000 internal documents, 170 000 emails, was time-consuming and hindered the daily lives of employees. The
social-security numbers of Sony’s employees, personnel reviews and remaining budget was spent hiring more than 1000 employees to
medical histories, and movies which had not yet been released. The monitor the company’s systems [74]. Of significant interest are the
same cyber-attack paralysed all of Sony’s systems, rendering the on- two long-term effects, which resulted from this hack. The majority
line database of stock footage unsearchable, the telephone system of the customers whose information was leaked were obliged to
offline, computers and servers unusable; this was described by the monitor their finances in fear of fraud, while they received fake
FBI as an ‘unprecedented digital assault that would have felled 90 emails directing them to impostor websites for financial exchanges.
per cent of companies it hit’ [57]. As a result, many became victims of financial fraud. The second
Journal of Cybersecurity, 2018, Vol. 0, No. 0 11
effect was the replacement of their chief information security officer Once the data was publicly available and easily searchable, cus-
because of his inadequate collaboration with federal authorities in tomers became susceptible to blackmail, with professional and per-
an attempt to try to control the investigation and obscure the leak- sonal ramifications [72]. Many of the leaked email addresses
age of information [74]. contained the ‘.mil’ domain, indicating people who serve in the US
military. Adultery, however, is a crime in the US military and mem-
bers of Ashley Madison were subject to a year of confinement or dis-
The Ashley Madison case
honourable discharge [77]. In a similar vein, owners of 1, 200 ‘.sa’
In July 2015, details of 33 million accounts and personal informa-
email addresses were exposed to a potential death sentence, which is
tion about people registered on Ashley Madison, a website facilitat-
the punishment in Saudi Arabia for adultery. New practices of
ing extramarital affairs, were leaked [63]. A core principle of Ashley
cybercrime emerged, with criminals threatening to expose people
Madison’s business model was privacy and security, through which
whose email addresses were found in the Ashley Madison dataset to
they would build a trust relationship with their customers. The
their ‘significant other’, unless $225 were paid in bitcoin [65].
cyber-attack, therefore, had dramatic consequences for the reputa-
Public figures were coerced into ‘painful personal admissions’,
tion of the company, not only because it exposed the vulnerabilities
others were divorced, while the Toronto police reported two sui-
of the system, but because it proved that Ashley Madison’s promise
cides potentially linked to the cyber-attack [65].
to delete data upon customers’ request was not kept [77]. As a result
of this practice, Ashley Madison became liable to lawsuits [77], with
many organizations soliciting litigants on Twitter [72]. What are of Analysis of case studies for propagation of harm
great interest in this case, however, are the repercussions of what We start our analysis with a digest of the different types of harm
was coined as ‘collateral damage’ which are peculiar to the nature of arising from the case studies and their impact on the organization
the services the website offered. and its employees and customers. This is presented below as a visual
12 Journal of Cybersecurity, 2018, Vol. 0, No. 0
in Fig. 2, and then discussed in general in the remainder of the pattern, ‘physical’ harms lead to ‘economic’ harms, which if not
section. addressed may lead to ‘reputational’ harms for organizations. When
There are several salient points that can be seen in the cases ‘psychological’ harms for employees occur after ‘physical harms’,
assessed. Focusing on one of the most prevalent classes of cyber- then ‘economic’ and ‘physical’ harms may follow for employees and
attack in the literature, i.e. data breaches (e.g. details of JP Morgan customers. The presence of such types of harm may amplify the ‘eco-
customers or employees at Sony), the direct type of harm which nomic’, ‘reputational’ and more scarcely ‘social’ harms that organ-
occurs based on our taxonomy is ‘exposure or leakage of digital in- izations already experience.
formation’. As it is evident in the case studies presented above, dif- To reflect more generally on the cases in terms of commonalities
ferent entities and stakeholders were affected by the various harms in harm propagation, exposed or leaked data, especially when it
that occurred (e.g. the organization under attack, its employees, cus- contains personal information, usually has a significant impact on
tomers and suppliers). the organization and its customers. Customers often feel confused
We commence our analysis for the subsequent types of harm and frustrated, and this may escalate significantly depending on the
from an organization’s perspective, since they are the main targets data that has been leaked (sometimes it may be identity theft, and
cyber-harm for organizations?’, a lack of effective metrics, tools and understanding of how we might go about modelling the intercon-
frameworks seeking to understand and assess the harm organ- nections that exist between harms, and so the possible cascading
izations face from cyber-attacks. effects.
According to the CUNA president and CEO Jim Nussie, organ- Therefore, our next steps are to extend this research by designing
izations are not incentivized to invest in and prioritize security [83]. an asset-oriented model. Our decision is based on the fact that such
It is of paramount importance for board members to obtain a com- an approach encourages organizations to focus on their core assets,
prehensive cost-benefit analysis on how cutting-edge technologies and think beyond current threats to consider the full range of harms
and investments in implementing strong cybersecurity practices may that might potentially result to assets. Reflecting on our taxonomy
hedge the risk of a cyber-attack and its harmful impact. The case and the case studies presented in the article, we believe that such a
studies presented in Section ‘The propagation of cyber-harm’ illus- model should comprise six different stages in defining and assessing
trated that organizations lack sufficient models to estimate the the notion of cyber-harm. These are: identifying core assets; identify-
harm, direct and indirect, from cyber-attacks. What it is further evi- ing direct harm to assets; determining the stakeholders that hold an
dent from our analysis of the case studies is that organizations re- interest in direct harm; identifying different types of cyber-harm
12. UVM. Enterprise Risk Management Program: Guide to Risk Assessment 39. Kvochko E, Pant R. Why data breaches don’t hurt stock prices. Harvard
& Response. https://www.uvm.edu/sites/default/files/UVM-Risk-Manage Business Review, 2015. https://hbr.org/2015/03/why-data-breaches-dont-
ment-and-Safety/Guide_to_Risk_Opportunity_Assessment_Response.pdf hurt-stock-prices (13 July 2018, date last accessed).
(13 July 2018, date last accessed). 40. Hovav A, D’Arcy J. The impact of denial-of-service attack announcements
13. ENISA. Security Risk Management Glossary. https://www.enisa.europa. on the market value of firms. RMIR 2003;6:97–121.
eu/activities/risk-management/current-risk/risk-management-inventory/ 41. Campbell K, Gordon LA, Loeb MP, et al. The economic cost of publicly
glossary (13 July 2018, date last accessed). announced information security breaches: empirical evidence from the
14. ISO/IEC. ISO/IEC 13335-1: 2004 Part 1: Concepts and models for infor- stock market. J Comput Secur 2003;11:431–448.
mation and communications technology security management, 2004. 42. Kannan K, Rees J, Sridhar S. Market reactions to information security
15. Beck U. Risk Society: Towards a New Modernity. Vol. 17. London: Sage, breach announcements: an empirical analysis. IJEC 2007;12:69–91.
1992 . 43. World Economic Forum. Partnering for cyber resilience towards the
16. Giddens A. The Consequences of Modernity. Cambridge: Polity Press, quantification of cyber threats. http://www3.weforum.org/docs/WEFUSA_
1990. QuantificationofCyberThreats_Report2015.pdf (13/07/2018, last accessed)
17. Beck U. The terrorist threat: world risk society revisited. Theory Cult Soc 44. C¸etin B, Yaman E, Peker A. Cyber victim and bullying scale: a study of
63. InfoSec Institute. Ashley Madison revisited: legal, business and security 74. JP Morgan security exec reassigned after breach. Europe TechWeek,
repercussions,. 2015, 8. http://resources.infosecinstitute.com/ashley-madi 2015. http://www.techweekeurope.co.uk/e-management/jobs/jp-morgan-
son-revisited-legal-business-and-security-repercussions (13 July 2018, exec-reassigned-171644 (13 July 2018, date last accessed).
date last accessed). 75. Howard JD, Longstaff TA. A common language for computer security
64. Dark Reading. Sony data breach cleanup to cost $171million, 2011 http:// incidents. Sandia National Laboratories, 1998. https://prod.sandia.gov/
www.darkreading.com/attacks-and-breaches/sony-data-breach-cleanup- techlib-noauth/access-control.cgi/1998/988667.pdf (13 July 2018, date
to-cost-\$171-million/d/d-id/1097898 (13 July 2018, date last accessed). last accessed).
65. Ashley M. Aftermath: confessions, suicide reports and hot on the hacker’s 76. JP Morgan Chase reveals massive data breach affecting 76m households.
trail. National Post, 2015 http://news.nationalpost.com/news/canada/ash The Guardian, 2014. http://www.theguardian.com/business/2014/oct/02/
ley-madison-aftermath-confessions-suicide-reports-and-hot-on-the-hack jp-morgan-76m-households-affected-data-breach (13 July 2018, date last
ers-trail (13 July 2018, date last accessed). accessed).
66. Variety. Sony hack attack opens minefield of legal questions that has 77. The Verge. The mind-bending messiness of the Ashley Madison data
hollywood worried, 2015,07–13. http://variety.com/2015/biz/news/sony- dump,2015. http://www.theverge.com/2015/8/19/9178855/ashley-madi
hack-attack-opens-minefield-of-legal-questions-that-has-hollywood-wor son-data-breach-implications (13 July 2018, date last accessed).