The burden of proof and the optimal security investment of firms in ubiquitous computing

被引:0
|
作者
Se-Hak Chun
机构
[1] Seoul National University of Science and Technology,Department of Business Administration
来源
关键词
Burden of proof; Legal liability; Ubiquitous computing; Security vulnerability; Security investment; Fraudulent transaction; Mobile banking;
D O I
暂无
中图分类号
学科分类号
摘要
Recently security vulnerabilities and fraudulent transactions have simultaneously increase with the rise in use of smart mobile handsets for electronic transactions. Also, the governing liability rule on disputes arising from security breaches is becoming a practical issue as users get accustomed to doing transactions using various smart and intelligent computing devices in ubiquitous computing environments. Although there have been debates in law and computer science literature, there has been little research on legal issues in comparison with the amount of research on technical issues for electronic transactions. This paper analyzes how a burden of proof can play a role in preventing fraudulent transactions and investigates how it is related to firms’ investments in security.
引用
收藏
页码:965 / 969
页数:4
相关论文
共 50 条
  • [11] Security for ubiquitous computing: Problems and proposed solution
    Hung, Le Xuan
    Phuong, Tran Van
    Giang, Pho Duc
    Zhung, Yonil
    Lee, Sungyoung
    Lee, Young-Koo
    12TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2006, : 110 - 113
  • [12] Security aspects of ubiquitous computing in health care
    Weippl, E.
    Holzinger, A.
    Tjoa, A. M.
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2006, 123 (04): : 156 - 161
  • [13] The resurrecting duckling: Security issues for ubiquitous computing
    Stajano, Frank
    Anderson, Ross
    Computer, 2002, 35 (SUPPL.) : 22 - 26
  • [14] Personal and Ubiquitous Computing Issue on privacy and security
    Schmandt, Chris
    Ackerman, Mark
    PERSONAL AND UBIQUITOUS COMPUTING, 2004, 8 (06) : 389 - 390
  • [15] Intelligent ubiquitous computing: applications and security issues
    Park, Jong Hyuk
    Gritzalis, Stefanos
    Hsu, Ching-Hsien
    INTERNET RESEARCH, 2009, 19 (02) : 133 - 135
  • [16] Advanced security technologies and applications for ubiquitous computing
    Kim, Jongsung
    Lu, Jiqiang
    Hsu, Ching-Hsien
    PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) : 835 - 836
  • [17] The resurrecting duckling: Security issues for ubiquitous computing
    Stajano, F
    Anderson, R
    COMPUTER, 2002, : 22 - 26
  • [18] A security framework for executables in a ubiquitous computing environment
    Llewellyn-Jones, D
    Merabti, M
    Shi, Q
    Askwith, B
    GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2158 - 2163
  • [19] Advanced security technologies and applications for ubiquitous computing
    Jongsung Kim
    Jiqiang Lu
    Ching-Hsien Hsu
    Personal and Ubiquitous Computing, 2013, 17 : 835 - 836
  • [20] Optimal firm investment in security
    Kort, PM
    Haunschmied, JL
    Feichtinger, G
    ANNALS OF OPERATIONS RESEARCH, 1999, 88 (0) : 81 - 98