Journal ArticleDOI
The Effect of Software Warranties on Cybersecurity
Dirk van der Linden,Awais Rashid +1 more
TLDR
The insights from the workshop highlight a number of interesting directions for research on the interplay between software warranties and cybersecurity.Abstract:
This workshop focused on bringing software developers and legal professionals together to understand the shared challenges they face in promoting the development of secure software on the one hand, and software at all, on the other hand. This report sum- marizes current scienti c research on the topics and challenges discussed in the workshop breakout sessions. The insights from the workshop highlight a number of interesting directions for fur- ther research on the interplay between software warranties and cybersecurity.read more
Citations
More filters
Journal ArticleDOI
A Knowledge-Based Integrated System of Hesitant Fuzzy Set, AHP and TOPSIS for Evaluating Security-Durability of Web Applications
Rajeev Kumar,Asif Irshad Khan,Yoosef B. Abushark,Mottahir Alam,Alka Agrawal,Raees Ahmad Khan +5 more
TL;DR: This paper uses a hybrid approach of Hesitant Fuzzy (HF) sets, Analytic Hierarchy Process (AHP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) techniques to estimate security-durability of web application.
Journal ArticleDOI
A wake-up call for data integrity invulnerability
TL;DR: In this paper, the authors describe data as "like a blank cheque, disclosure or modification of which may cause irreparable loss." Data has become the most valuable commodity today, as all human endeavours, from routine chores, healthcare, business enterprises to government policies are all directed by it.
Journal ArticleDOI
Need and Importance of Healthcare Data Integrity
TL;DR: Some of the key benefits to be derived from maintaining data integrity, as well as the risks associated with the software industries in general and healthcare industries in particular if it is not observed strictly are explained.
Posted Content
Products Liability and the Internet of (Insecure) Things: Should Manufacturers Be Liable for Damage Caused by Hacked Devices?
TL;DR: In this article, the authors proposed a new field of "connected devices" products liability law, which could provide a good model for determining liability for several reasons, such as attacks on IoT devices can and have caused significant damage to property and are highly foreseeable.
Posted Content
Regulating Cybersecurity - What Civil Liability in Case of Cyber-Attacks?
Evelyne Studer,Jacques de Werra +1 more
TL;DR: In spite of the growing risks posed by cyber-attacks, the legal fallout and specifically the civil liability resulting from such attacks is still unclear and raises complex legal issues namely because of the diversity of potentially applicable liability regimes (which include personal data and product liability regulations).
References
More filters
Journal ArticleDOI
Analyzing Regulatory Rules for Privacy and Security Requirements
Travis D. Breaux,Annie I. Antón +1 more
TL;DR: The methodology provides statement-level coverage for an entire regulatory document to consistently identify and infer six types of data access constraints, handle complex cross references, resolve ambiguities, and assign required priorities between access rights and obligations to avoid unlawful information disclosures.
Proceedings ArticleDOI
The trustworthy computing security development lifecycle
TL;DR: The trustworthy computing security development lifecycle (or simply the SDL) is described and experience with its implementation across a range of Microsoft software is discussed, showing a significantly reduced rate of external discovery of security vulnerabilities.
Journal ArticleDOI
The economics of cybersecurity: Principles and policy options
TL;DR: The various economic challenges plaguing cybersecurity in greater detail are outlined: misaligned incentives, information asymmetries and externalities, and the regulatory options that are available to overcome these barriers in the cybersecurity context are discussed.
Journal ArticleDOI
Building a European Data Economy
TL;DR: Bitkom as discussed by the authors proposed a human-centric data economy that works for all and is in line with data protection rules, which can lead to far reaching innovation across sectors, which is needed to catch-up with more advanced efforts in Asia and the US.
Journal ArticleDOI
Two views on security software liability. Let the legal system decide
D.J. Ryan,C. Heckman +1 more
TL;DR: The product liability screwdriver is not the right legal tool for the job, so why not consider a package of more effective tools?