Shark Attack Database

A comprehensive collection of shark attack incidents worldwide, organized for research and educational purposes.

Methodology

The Shark Attack Database employs a rigorous methodology to ensure the accuracy and reliability of our data. This page outlines our approach to data collection, verification, and categorization.

Data Collection

Our data comes from multiple sources, including:

  • Official government records and reports
  • Scientific publications and research papers
  • News media accounts (cross-verified when possible)
  • Historical archives and documents
  • Firsthand accounts and witness statements
  • Existing shark attack databases and compilations

Verification Process

Each incident in our database undergoes a verification process that includes:

  1. Cross-referencing multiple sources when available
  2. Evaluating the reliability of each source
  3. Identifying and resolving contradictions in accounts
  4. Consulting with marine biologists and shark experts when necessary
  5. Flagging incidents with insufficient verification as "unconfirmed"

Categorization Criteria

We categorize shark attacks using several key dimensions:

Attack Type

  • Provoked: Incidents where humans initiated contact with the shark
  • Unprovoked: Incidents where sharks initiated contact with humans
  • Boat Attack: Incidents involving sharks and watercraft
  • Investigatory: Non-predatory bites that appear to be exploratory in nature

Activity

We classify the human activity at the time of the incident (swimming, surfing, diving, etc.)

Outcome

We record whether the incident resulted in fatality, injury, or no physical harm

Species Identification

When possible, we identify the shark species involved, noting the level of certainty in the identification

Data Limitations

We acknowledge several limitations in our data:

  • Historical incidents may have less complete information
  • Species identification is often uncertain or missing
  • Reporting biases exist across regions and time periods
  • Minor incidents are more likely to go unreported

Continuous Improvement

Our methodology evolves as new information becomes available and as we receive feedback from the scientific community and the public. We regularly review and update our database to incorporate new findings and correct any errors.