Security and Human Behaviour 2010

نویسنده

  • Michelle Baddeley
چکیده

1. INTRODUCTION The growth of the Internet has been enabled by rapid technological developments. Specifically for electronic commerce, there is pressure on financial systems to adapt to the increased volume of spending taking place over the Internet. Until now, most buyers have used credit arrangements or checking accounts as the principle means of paying for Internet purchases. For Internet transactions, a range of electronic solutions including electronic cash (ecash) are proving to be potentially superior substitutes for conventional monetary instruments. Significant problems have emerged however because alongside the positive innovations, significant abuses have grown concomitantly including antisocial behaviour and security/privacy abuses, e.g. spam attacks, phishing and identity theft. In preventing fraud, the virtue of traditional cash is its anonymity, security and lower transactions costs so in amelorating problems of fraudulent collection of personal financial information during electronic transactions, at least theoretically and technically, systems such as e-cash can be developed to harness the lower computational and/or transactions costs of electronic payments schemes whilst retaining in electronic cash the virtues of conventional cash (e.g. in terms of security and anonymity). Hypothetically at least, the potential security of virtual money could be greater than that of conventional money given the sophisticated printing and counterfeiting methods used for conventional cash. In practice however, governmental constraints have meant that adoption of tamper resistant technology is limited, e.g. for e-money by the US export limits on long /complex keys (Swire,1997). Many existing e-cash systems, particularly those that can be used with a number of different merchants, are not completely anonymous because the monitoring of their use is actually essential to the proper operation of these systems in order to prevent the double spending of virtual coins. This monitoring may be very costly requiring collusion between institutions. The use of a conventional cash system allows direct interaction between buyer and seller and so it is not possible to monitor transactions taking place mediated using conventional cash. Anonymity is ensured. Conventional cash will be preferred by those involved with criminal activities as long as criminals and tax evaders believe that electronic transactions will always leave some trace (Goodhart, 2000). It can be argued that complete anonymity is not desirable from a social welfare point-of-view (de Solages and Traore, 1998). In theory, a system of anonymity that is only revoked by some trusted authority when criminal activities take place would mean that criminal activity could be more effectively …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Entrepreneurial Behavior among Cassava Farmers in Ebonyi State, Nigeria

The study assessed the entrepreneurial behaviour of smallholder cassava farmers in Ebonyi State, Nigeria. Multistage sampling technique was employed in the selection of 108 cassava farmers across the agricultural zones in Ebonyi state using pretested and structured questionnaire from which data and information were elicited. Analytically, the study employed entrepreneurial behavioural index (EB...

متن کامل

Information security culture: A Behaviour Compliance Conceptual Framework

Understanding the complex dynamic and uncertain characteristics of organisational employees who perform authorised or unauthorised information security activities is deemed to be a very important and challenging task. This paper presents a conceptual framework for classifying and organising the characteristics of organisational subjects involved in these information security practices. Our fram...

متن کامل

A Novel Index for Online Voltage Stability Assessment Based on Correlation Characteristic of Voltage Profiles

Abstract: Voltage instability is a major threat for security of power systems. Preserving voltage security margin at a certain limit is a vital requirement for today’s power systems. Assessment of voltage security margin is a challenging task demanding sophisticated indices. In this paper, for the purpose of on line voltage security assessment a new index based on the correlation characteristic...

متن کامل

Measures for improving information security management in organisations: the impact of training and awareness programmes

Security breaches have attracted corporate attention and major organisations are now determined to stop security breaches as they are detrimental to their success. Users’ security awareness and cautious behaviour play an important role in information security both within and outside the organisation. Arguably the most common factor contributing to these breaches is that of human behaviour towar...

متن کامل

Social life, evolution of intelligence, behaviour and human brain size

Social life is one of the most critical factors of the evolution of the behavior of non-human primates and humans. Several factors, such as an increase in brain size, adaptive modules, and grooming, are related to the complexities of social groups. Although some scientists have mentioned foraging as a rival hypothesis for the evolution of behavior, in this research, we tried to investigate the ...

متن کامل

Capitalism, the state, and the underlying drivers of human development

What are the underlying drivers of human development? This essay argues that long-term human development, in incomes, social conditions, security and so on, is fundamentally driven by capitalist dynamics and state functioning. The big issue is not state versus market, or growth versus equity, or dynamism versus security. It is the jointly determined functioning of both capitalism and the state....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010