Skip to main content
Top
Published in: Electronic Commerce Research 3/2013

01-09-2013

The security service rating design for IT convergence services

Author: Hangbae Chang

Published in: Electronic Commerce Research | Issue 3/2013

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

There has been damage to users due to security problems such as personal information leaks and spam etc. by IT convergence in various information communication industries. Since where the responsibility for this damage lies, compensation systems and damage estimation criteria have not been prepared yet, its compensation is solved by civil litigation between service providers and users. In addition, for security services provided, the standardized clauses of a contract with consumers are provider-oriented articles to be disadvantageous to service users, and detailed compensation criteria have not been prepared in reality. Therefore, it is time to need to prepare a damage compensation system and an estimation criterion for protecting users against technical and legal troubles that could arise when providing security services.
In order to solve these problems, this paper developed a damage compensation index for sustainable security service. In detail, by analyzing damage compensation criteria and cases for general information communication services, a damage compensation index on security services was developed for a goal of VoIP services. It could offer voluntary improvement of service quality for service providers, and simplicity of damage compensation for users. Additionally, it could socially give benefits of increasing the number of companies to apply the security SLA and mitigating legal disputes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Stubblefield, A., Rubin, A. D., & Wallach, D. S. (2005). Managing the performance impact of web security. Electronic Commerce Research, 5(1), 99–116. CrossRef Stubblefield, A., Rubin, A. D., & Wallach, D. S. (2005). Managing the performance impact of web security. Electronic Commerce Research, 5(1), 99–116. CrossRef
2.
go back to reference Ganna, F. (2007). Service level agreements: web services and security. In Proceedings of the 7th international conference on web engineering (pp. 556–562). Ganna, F. (2007). Service level agreements: web services and security. In Proceedings of the 7th international conference on web engineering (pp. 556–562).
3.
go back to reference Frankova, G. (2007). Service level agreements: web services and security. In Proc. of the 7th international conference on web engineering (Vol. 4607, pp. 556–562). Frankova, G. (2007). Service level agreements: web services and security. In Proc. of the 7th international conference on web engineering (Vol. 4607, pp. 556–562).
4.
go back to reference Chang, H., Kwon, H., Kang, J., & Kim, Y. (2008). A case study on intelligent service design in ubiquitous computing. Computing and Informatics, 30(3), 513–529. Chang, H., Kwon, H., Kang, J., & Kim, Y. (2008). A case study on intelligent service design in ubiquitous computing. Computing and Informatics, 30(3), 513–529.
5.
go back to reference Scarle, S., Arnab, S., Dunwell, I., Petridis, P., Protopsaltis, A., & de Freitas, S. (2012). E-commerce transactions in a virtual environment: virtual transactions. Electronic Commerce Research, 12(3), 379–407. CrossRef Scarle, S., Arnab, S., Dunwell, I., Petridis, P., Protopsaltis, A., & de Freitas, S. (2012). E-commerce transactions in a virtual environment: virtual transactions. Electronic Commerce Research, 12(3), 379–407. CrossRef
6.
go back to reference Röhrig, S., & Knorr, K. (2004). Security analysis of electronic business processes. Electronic Commerce Research, 4(1–2), 59–81. CrossRef Röhrig, S., & Knorr, K. (2004). Security analysis of electronic business processes. Electronic Commerce Research, 4(1–2), 59–81. CrossRef
7.
go back to reference Verkaik, P., Agarwal, Y., Gupta, R., & Snoeren, A. C. (2009). Softspeak: making VoIP play well in existing 802.11 deployments. In Proceedings of the 6th USENIX symposium on networked systems design and implementation (pp. 409–422). Verkaik, P., Agarwal, Y., Gupta, R., & Snoeren, A. C. (2009). Softspeak: making VoIP play well in existing 802.11 deployments. In Proceedings of the 6th USENIX symposium on networked systems design and implementation (pp. 409–422).
8.
go back to reference Franke Kleist, V. (2004). A transaction cost model of electronic trust: transactional return, incentives for network security and optimal risk in the digital economy. Electronic Commerce Research, 4(1–2), 41–57. CrossRef Franke Kleist, V. (2004). A transaction cost model of electronic trust: transactional return, incentives for network security and optimal risk in the digital economy. Electronic Commerce Research, 4(1–2), 41–57. CrossRef
9.
go back to reference Mazurczyk, W., & Kotulski, Z. (2008). In Covert channel for improving VoIP security, advances in information processing and protection, part II (pp. 271–280). Mazurczyk, W., & Kotulski, Z. (2008). In Covert channel for improving VoIP security, advances in information processing and protection, part II (pp. 271–280).
10.
go back to reference Liu, X., & Tu, C. (2011). Research on security of VoIP network. Communications in Computer and Information Science, 231, 59–65. CrossRef Liu, X., & Tu, C. (2011). Research on security of VoIP network. Communications in Computer and Information Science, 231, 59–65. CrossRef
11.
go back to reference Kim, Y., Kang, J., Na, Y., & Chang, H. (2012) In Lecture notes in electrical engineering: Vol. 164. Study on development of appraisal business performance indicator (pp. 417–423). Kim, Y., Kang, J., Na, Y., & Chang, H. (2012) In Lecture notes in electrical engineering: Vol. 164. Study on development of appraisal business performance indicator (pp. 417–423).
Metadata
Title
The security service rating design for IT convergence services
Author
Hangbae Chang
Publication date
01-09-2013
Publisher
Springer US
Published in
Electronic Commerce Research / Issue 3/2013
Print ISSN: 1389-5753
Electronic ISSN: 1572-9362
DOI
https://doi.org/10.1007/s10660-013-9115-2

Other articles of this Issue 3/2013

Electronic Commerce Research 3/2013 Go to the issue