The burden of proof in fraudulent transactions and optimal investment in information security

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This study investigates the consequences of different legal systems for fraudulent transactions in electronic commerce (ecommerce) or online payment. When a fraudulent online transaction occurs and the online customer disputes the transaction, in many European countries, the online customer takes responsibility for the proof of her or his argument, whereas in the United States, the burden of proof lies with the firm. This paper analyzes corollaries of the two different legal systems and discusses why different regulations exist from the perspective of e-commerce laws. We found that, in a market or society where the elasticity for security investment is relatively high, the legal system that imposes the burdens of proof on firms results in Pareto superior and e-commerce firms achieve higher profitability in equilibrium than the legal system that burdens the onus on customers. In addition, we found that, in some range of the elasticity for security investment, return of the security investment of firms in the first legal system is higher than that in the other legal system in the equilibrium.

Original languageEnglish
Title of host publication15th Americas Conference on Information Systems 2009, AMCIS 2009
Pages5195-5204
Number of pages10
StatePublished - 2009
Event15th Americas Conference on Information Systems 2009, AMCIS 2009 - San Francisco, CA, United States
Duration: 6 Aug 20099 Aug 2009

Publication series

Name15th Americas Conference on Information Systems 2009, AMCIS 2009
Volume8

Conference

Conference15th Americas Conference on Information Systems 2009, AMCIS 2009
Country/TerritoryUnited States
CitySan Francisco, CA
Period6/08/099/08/09

Keywords

  • E-commerce law
  • Electronic commerce
  • Electronic commerce regulation
  • Onus of proof
  • Security and privacy

Fingerprint

Dive into the research topics of 'The burden of proof in fraudulent transactions and optimal investment in information security'. Together they form a unique fingerprint.

Cite this