The burden of proof and the optimal security investment of firms in ubiquitous computing

被引:0
|
作者
Se-Hak Chun
机构
[1] Seoul National University of Science and Technology,Department of Business Administration
来源
关键词
Burden of proof; Legal liability; Ubiquitous computing; Security vulnerability; Security investment; Fraudulent transaction; Mobile banking;
D O I
暂无
中图分类号
学科分类号
摘要
Recently security vulnerabilities and fraudulent transactions have simultaneously increase with the rise in use of smart mobile handsets for electronic transactions. Also, the governing liability rule on disputes arising from security breaches is becoming a practical issue as users get accustomed to doing transactions using various smart and intelligent computing devices in ubiquitous computing environments. Although there have been debates in law and computer science literature, there has been little research on legal issues in comparison with the amount of research on technical issues for electronic transactions. This paper analyzes how a burden of proof can play a role in preventing fraudulent transactions and investigates how it is related to firms’ investments in security.
引用
收藏
页码:965 / 969
页数:4
相关论文
共 50 条
  • [1] The burden of proof and the optimal security investment of firms in ubiquitous computing
    Chun, Se-Hak
    PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) : 965 - 969
  • [2] Security and privacy in ubiquitous computing
    Miri, Ali
    Benslimane, Abderrahim
    Huang, Nen-Fu
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1417 - 1419
  • [3] Survey of Ubiquitous Computing Security
    Li Y.
    Chen Y.
    Zhao J.
    Yue X.
    Zheng C.
    Wu Y.
    Wu G.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (05): : 1054 - 1081
  • [4] The security challenges of ubiquitous computing
    Stajano, F
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 1 - 1
  • [5] On the Optimal Burden of Proof
    Kaplow, Louis
    JOURNAL OF POLITICAL ECONOMY, 2011, 119 (06) : 1104 - 1140
  • [6] Security policies and trust in ubiquitous computing
    Joshi, Anupam
    Finin, Tim
    Kagal, Lalana
    Parker, Jim
    Patwardhan, Anand
    PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2008, 366 (1881): : 3769 - 3780
  • [7] Special issue on security in ubiquitous computing
    Qu, Wenyu
    Xiang, Yang
    Zhang, Yong
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (11) : 1221 - 1222
  • [8] Small worlds and the security of ubiquitous computing
    Vogt, H
    SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, : 593 - 597
  • [9] SPUC: Security protocol for ubiquitous computing
    Yang, Fan
    Lv, Qingcong
    Cao, Qiying
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 757 - 760
  • [10] Security aspects of ubiquitous computing in health careSicherheitsaspekte von Ubiquitous Computing im Gesundheitsbereich
    E. Weippl
    A. Holzinger
    A. M. Tjoa
    e & i Elektrotechnik und Informationstechnik, 2006, 123 (4) : 156 - 161