The burden of proof and the optimal security investment of firms in ubiquitous computing

被引:0
作者
Chun, Se-Hak [1 ]
机构
[1] Seoul Natl Univ Sci & Technol, Dept Business Adm, Seoul 139743, South Korea
基金
新加坡国家研究基金会;
关键词
Burden of proof; Legal liability; Ubiquitous computing; Security vulnerability; Security investment; Fraudulent transaction; Mobile banking;
D O I
10.1007/s00779-012-0532-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently security vulnerabilities and fraudulent transactions have simultaneously increase with the rise in use of smart mobile handsets for electronic transactions. Also, the governing liability rule on disputes arising from security breaches is becoming a practical issue as users get accustomed to doing transactions using various smart and intelligent computing devices in ubiquitous computing environments. Although there have been debates in law and computer science literature, there has been little research on legal issues in comparison with the amount of research on technical issues for electronic transactions. This paper analyzes how a burden of proof can play a role in preventing fraudulent transactions and investigates how it is related to firms' investments in security.
引用
收藏
页码:965 / 969
页数:5
相关论文
共 19 条
  • [1] Anderson R, 2002, WORKING PAPER
  • [2] WHY CRYPTOSYSTEMS FAIL
    ANDERSON, RJ
    [J]. COMMUNICATIONS OF THE ACM, 1994, 37 (11) : 32 - 40
  • [3] [Anonymous], 2009, MOB SEC REP
  • [4] [Anonymous], 2004, Journal on Telecommunications & High Technology Law
  • [5] Berkvens J, 1997, COMPUTERRECHT, V6, P264
  • [6] Bryce C, UBIQUITOUS PRIVACY P
  • [7] Choi J, 2007, DP6134 CEPR
  • [8] Chun SH, 2011, COMM COM INF SC, V184, P190
  • [9] Collins M, 2006, P PERVASIVE 2006 WOR
  • [10] Felsenfeld C, 1988, LEGAL ASPECTS ELECT