Malicious software and system damages: Is there a case for liability of software vendors?

被引:0
|
作者
Tryfonas, Theodore [1 ]
Owen, Paul [1 ]
Thomas, Paula [1 ]
机构
[1] Univ Glamorgan, Facil Adv Technol, Pontypridd CF37 1DL, M Glam, Wales
关键词
malware; software vendor; liability;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This discussion paper addresses the potential responsibility of the software vendors in the light of the changing nature of the threats originating from malicious software. The authors argue that our understanding of the conventional breed of rogue programs (viruses, worms and Trojan horses) highlighted the liabilities residing with those programs' creators or the end-users' negligence, overlooking the potential responsibility of the software vendor. However, because of the way contemporary forms of malicious software ('adware', spyware, botnets etc.) infect systems, primarily due to the faulty nature of the software end-product or its ineffective support, a question is raised about the emerging potential liability of the product provider, who advertises the safe and secure operation of the software - and receives revenues from its sales.
引用
收藏
页码:281 / 290
页数:10
相关论文
共 50 条
  • [1] Software - Vendors push greater system integration
    不详
    CHEMICAL & ENGINEERING NEWS, 2003, 81 (43) : 22 - 22
  • [2] MEDICAL SOFTWARE VENDORS
    不详
    M D COMPUTING, 1984, 1 (06): : 7 - 7
  • [3] ARE SOFTWARE VENDORS RESTING
    SNYDERS, J
    THIEL, CT
    COLBY, W
    INFOSYSTEMS, 1984, 31 (07): : 56 - &
  • [4] Malicious and Harmless Software in the Domain of System Utilities
    St'astna, Jana
    PROCEEDINGS OF THE 2019 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2019, : 237 - 246
  • [5] Simulating Malicious Users in a Software Reputation System
    Borg, Anton
    Boldt, Martin
    Carlsson, Bengt
    SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 147 - 156
  • [6] Software liability
    Boelzner, DE
    JOURNAL OF MANAGEMENT IN ENGINEERING, 1998, 14 (05) : 18 - 18
  • [7] On malicious software classification
    Lin Jianhui
    2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION WORKSHOP: IITA 2008 WORKSHOPS, PROCEEDINGS, 2008, : 368 - 371
  • [8] CRYPTIC ENCRYPTION SOFTWARE VENDORS
    WAZIAVEK, M
    CD-ROM PROFESSIONAL, 1995, 8 (11): : 10 - 10
  • [9] BUGS IN SOFTWARE VENDORS LIST
    WALLACE, J
    COMPUTER DECISIONS, 1983, 15 (05): : 232 - 232
  • [10] Vendors combine fab software
    不详
    MICRO, 1998, 16 (03): : 42 - 42