Legally "reasonable" security requirements: A 10-year FTC retrospective

被引:23
作者
Breaux, Travis D. [1 ]
Baumer, David L. [2 ]
机构
[1] Carnegie Mellon Univ, Inst Software Res, Pittsburgh, PA 15213 USA
[2] N Carolina State Univ, Dept Business Management, Raleigh, NC 27695 USA
关键词
Requirements; Security; Reasonability; Legal compliance; Case study; PRIVACY; FRAMEWORK; SUPPORT;
D O I
10.1016/j.cose.2010.11.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Growth in electronic commerce has enabled businesses to reduce costs and expand markets by deploying information technology through new and existing business practices. However, government laws and regulations require businesses to employ reasonable security measures to thwart risks associated with this technology. Because many security vulnerabilities are only discovered after attacker exploitation, regulators update their interpretation of reasonable security to stay current with emerging threats. With a focus on determining what businesses must do to comply with these changing interpretations of the law, we conducted an empirical, multi-case study to discover and measure the meaning and evolution of "reasonable" security by examining 19 regulatory enforcement actions by the U.S. Federal Trade Commission (FTC) over a 10 year period. The results reveal trends in FTC enforcement actions that are institutionalizing security knowledge as evidenced by 39 security requirements that mitigate 110 legal security vulnerabilities. (C) 2010 Published by Elsevier Ltd.
引用
收藏
页码:178 / 193
页数:16
相关论文
共 46 条
[1]  
[Anonymous], IEEE 14 INT REQ ENG
[2]  
[Anonymous], 2003, CASE STUDY RES DESIG
[3]  
[Anonymous], 19 INT C ADV INF SYS
[4]  
[Anonymous], PENNSYLVANIA STATE L
[5]  
[Anonymous], CONTR OBJ INF REL TE
[6]  
[Anonymous], ISOIEC154082005
[7]  
[Anonymous], DATA REACH INVESTIGA
[8]  
[Anonymous], DUKE LAW J
[9]  
[Anonymous], IDENTITY FRAUD SURVE
[10]  
[Anonymous], AG ANN SETTL SEP ACT