Skip to main content
Log in

The burden of proof and the optimal security investment of firms in ubiquitous computing

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Recently security vulnerabilities and fraudulent transactions have simultaneously increase with the rise in use of smart mobile handsets for electronic transactions. Also, the governing liability rule on disputes arising from security breaches is becoming a practical issue as users get accustomed to doing transactions using various smart and intelligent computing devices in ubiquitous computing environments. Although there have been debates in law and computer science literature, there has been little research on legal issues in comparison with the amount of research on technical issues for electronic transactions. This paper analyzes how a burden of proof can play a role in preventing fraudulent transactions and investigates how it is related to firms’ investments in security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. http://cdachyd.in/research-development/e-security/

  2. Collins M, Dobson S, Nixon P (2006) Security issues with pervasive computing frameworks. In: Proceedings of the PERVASIVE 2006 workshop on privacy, trust and identity issues for ambient intelligence

  3. Ranganathan K (2004) Trustworthy pervasive computing: the hard security problems. In: Proceedings of the second IEEE annual conference on pervasive computing, March 14–17, 2004

  4. Wagealla W, English C, Terzis S, Nixon P, Lowe H, McGettric A A trust-based collaboration model for ubiquitous computing. http://www.ipsi.fraunhofer.de/ambiente/…ws/papers/wagealla.pdf

  5. Bryce C, Dekker MAC, Etalle S, Le, M′etayer D, Le Moüel F, Minier M, Moret-Bailly J, Ub′eda S Ubiquitous privacy protection. http://www.hpl.hp.com/techreports/2006/HPL-2006-141R1.pdf

  6. Swire P (2004) A model for when disclosure helps security: what is different about computer and network security? J Telecommun High Technol Law 3(1):163–208

    Google Scholar 

  7. Granick J (2005) The price of restricting vulnerability publications. Int J Commun Law Priv 9:1–35

    Google Scholar 

  8. Choi J, Fershtman C, Gandal N (2007) Network security: vulnerabilities and disclosure policy. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1133779. CEPR Discussion Paper No. DP6134

  9. Vyas C (2008) From niche play to mainstream delivery channel: US mobile banking forecast. Tower Group 13

  10. Javelin Strategy & Research. https://www.javelinstrategy.com/research/security-risk-fraud. 2011

  11. Joyce FM (2010) Mobile banking liability: the elephant in the parlor. Innovator 3(3):29–32

    Google Scholar 

  12. http://news.cnet.com/8301-1009_3-10164244-83.html

  13. Mobile Security Report. McAfee Avert Labs 2009

  14. http://www.ecommercetimes.com/story/2771.html?wlc=1279873107

  15. Anderson R (1994) Why cryptosystems fail. Commun ACM 37(11):32–40

    Article  Google Scholar 

  16. Anderson R (2002) Why information security is hard. University of Cambridge, working paper

  17. Gordon LA, Loeb MP (2002) The economics of information security investment. ACM Trans Inf Syst Secur 5(4):438–457

    Article  Google Scholar 

  18. Chun S-H (2011) Smart mobile banking and its security issues: from the perspectives of the legal liability and security investment. Commun Comput Inf Sci 184(1):190–195

    Article  Google Scholar 

  19. LeVasseur T (2010) http://www.messagingnews.com/story/who-is-responsible-email-messaging-security-law-firm-or-client

  20. Steennot R (2008) Allocation of liability in case of fraudulent use of an electronic payment instrument: the new directive on payment services in the internal market. Comput Law Secur Rep 24:555–561

    Article  Google Scholar 

  21. Felsenfeld C (1988) Legal aspects of electronic funds transfers. Butterworth, Stoneham

  22. Hance O, Dionne Balz S (1999) The new virtual money: law and practice. Kluwer Law International, The Hague

  23. Vartanian T, Ledig R, Bruneau L (1998) 21st century money. Banking & Commerce, Washington

    Google Scholar 

  24. Berkvens J (1997) Elektronisch betalingsverkeer. Computerrecht 6:264–265

    Google Scholar 

Download references

Acknowledgments

This work was supported by the National Research Foundation of Korea Grant funded by the Korean Government (NRF-2010-327-B00185).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Se-Hak Chun.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chun, SH. The burden of proof and the optimal security investment of firms in ubiquitous computing. Pers Ubiquit Comput 17, 965–969 (2013). https://doi.org/10.1007/s00779-012-0532-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-012-0532-3

Keywords

Navigation