Abstract
Recently security vulnerabilities and fraudulent transactions have simultaneously increase with the rise in use of smart mobile handsets for electronic transactions. Also, the governing liability rule on disputes arising from security breaches is becoming a practical issue as users get accustomed to doing transactions using various smart and intelligent computing devices in ubiquitous computing environments. Although there have been debates in law and computer science literature, there has been little research on legal issues in comparison with the amount of research on technical issues for electronic transactions. This paper analyzes how a burden of proof can play a role in preventing fraudulent transactions and investigates how it is related to firms’ investments in security.
Similar content being viewed by others
References
Collins M, Dobson S, Nixon P (2006) Security issues with pervasive computing frameworks. In: Proceedings of the PERVASIVE 2006 workshop on privacy, trust and identity issues for ambient intelligence
Ranganathan K (2004) Trustworthy pervasive computing: the hard security problems. In: Proceedings of the second IEEE annual conference on pervasive computing, March 14–17, 2004
Wagealla W, English C, Terzis S, Nixon P, Lowe H, McGettric A A trust-based collaboration model for ubiquitous computing. http://www.ipsi.fraunhofer.de/ambiente/…ws/papers/wagealla.pdf
Bryce C, Dekker MAC, Etalle S, Le, M′etayer D, Le Moüel F, Minier M, Moret-Bailly J, Ub′eda S Ubiquitous privacy protection. http://www.hpl.hp.com/techreports/2006/HPL-2006-141R1.pdf
Swire P (2004) A model for when disclosure helps security: what is different about computer and network security? J Telecommun High Technol Law 3(1):163–208
Granick J (2005) The price of restricting vulnerability publications. Int J Commun Law Priv 9:1–35
Choi J, Fershtman C, Gandal N (2007) Network security: vulnerabilities and disclosure policy. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1133779. CEPR Discussion Paper No. DP6134
Vyas C (2008) From niche play to mainstream delivery channel: US mobile banking forecast. Tower Group 13
Javelin Strategy & Research. https://www.javelinstrategy.com/research/security-risk-fraud. 2011
Joyce FM (2010) Mobile banking liability: the elephant in the parlor. Innovator 3(3):29–32
Mobile Security Report. McAfee Avert Labs 2009
http://www.ecommercetimes.com/story/2771.html?wlc=1279873107
Anderson R (1994) Why cryptosystems fail. Commun ACM 37(11):32–40
Anderson R (2002) Why information security is hard. University of Cambridge, working paper
Gordon LA, Loeb MP (2002) The economics of information security investment. ACM Trans Inf Syst Secur 5(4):438–457
Chun S-H (2011) Smart mobile banking and its security issues: from the perspectives of the legal liability and security investment. Commun Comput Inf Sci 184(1):190–195
LeVasseur T (2010) http://www.messagingnews.com/story/who-is-responsible-email-messaging-security-law-firm-or-client
Steennot R (2008) Allocation of liability in case of fraudulent use of an electronic payment instrument: the new directive on payment services in the internal market. Comput Law Secur Rep 24:555–561
Felsenfeld C (1988) Legal aspects of electronic funds transfers. Butterworth, Stoneham
Hance O, Dionne Balz S (1999) The new virtual money: law and practice. Kluwer Law International, The Hague
Vartanian T, Ledig R, Bruneau L (1998) 21st century money. Banking & Commerce, Washington
Berkvens J (1997) Elektronisch betalingsverkeer. Computerrecht 6:264–265
Acknowledgments
This work was supported by the National Research Foundation of Korea Grant funded by the Korean Government (NRF-2010-327-B00185).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chun, SH. The burden of proof and the optimal security investment of firms in ubiquitous computing. Pers Ubiquit Comput 17, 965–969 (2013). https://doi.org/10.1007/s00779-012-0532-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-012-0532-3