The burden of proof and the optimal security investment of firms in ubiquitous computing

被引:0
|
作者
Se-Hak Chun
机构
[1] Seoul National University of Science and Technology,Department of Business Administration
来源
关键词
Burden of proof; Legal liability; Ubiquitous computing; Security vulnerability; Security investment; Fraudulent transaction; Mobile banking;
D O I
暂无
中图分类号
学科分类号
摘要
Recently security vulnerabilities and fraudulent transactions have simultaneously increase with the rise in use of smart mobile handsets for electronic transactions. Also, the governing liability rule on disputes arising from security breaches is becoming a practical issue as users get accustomed to doing transactions using various smart and intelligent computing devices in ubiquitous computing environments. Although there have been debates in law and computer science literature, there has been little research on legal issues in comparison with the amount of research on technical issues for electronic transactions. This paper analyzes how a burden of proof can play a role in preventing fraudulent transactions and investigates how it is related to firms’ investments in security.
引用
收藏
页码:965 / 969
页数:4
相关论文
共 50 条
  • [21] Optimal firm investment in security
    P.M. Kort
    J.L. Haunschmied
    G Feichtinger
    Annals of Operations Research, 1999, 88 : 81 - 98
  • [22] On safety and security requirements in emerging ubiquitous computing models
    Simpson, Andrew (Andrew.Simpson@cs.ox.ac.uk), 1600, Oxford University Press (59):
  • [23] Interoperability and security issues of grid services for ubiquitous computing
    Jana, Debasish
    Chaudhuri, Amritava
    Datta, Abhijit
    Bhaumik, Bijan Bihari
    2006 IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, 2006, : 1113 - 1116
  • [24] Information security management system for SMB in ubiquitous computing
    Chang, H
    Kim, J
    Lim, S
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 707 - 715
  • [25] Design of a security management middleware in ubiquitous computing environments
    Jiang, Z
    Lee, K
    Kim, S
    Bae, H
    Kim, S
    Kang, S
    PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 306 - 308
  • [26] The trouble with login: on usability and computer security in ubiquitous computing
    Bardram, Jakob E.
    PERSONAL AND UBIQUITOUS COMPUTING, 2005, 9 (06) : 357 - 367
  • [27] On Safety and Security Requirements in Emerging Ubiquitous Computing Models
    Osborn, Emma
    Simpson, Andrew
    COMPUTER JOURNAL, 2016, 59 (04): : 570 - 591
  • [28] A security framework for secure home networking in ubiquitous computing
    Lee, Woon-Gu
    Chae, Cheol-Joo
    Kim, Sang-Kuk
    Kang, Mu-Yeong
    Lee, Jae-Kwang
    2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 394 - 397
  • [29] Special Issue on Security Aspects in Pervasive and Ubiquitous Computing
    Khan, Muhammad Khurram
    Kumar, Neeraj
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2015, 18 (1-2) : 1 - 2
  • [30] A Fast Security Mechanism for Mobile Communication in Ubiquitous Computing
    Lee, Won-Goo
    Cho, Han-Jin
    Kim, Jeom-Goo
    ICHIT 2008: INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 651 - 654