@article{breaux_baumer_2011, title={Legally "reasonable" security requirements: A 10-year FTC retrospective}, volume={30}, ISSN={["1872-6208"]}, DOI={10.1016/j.cose.2010.11.003}, abstractNote={Growth in electronic commerce has enabled businesses to reduce costs and expand markets by deploying information technology through new and existing business practices. However, government laws and regulations require businesses to employ reasonable security measures to thwart risks associated with this technology. Because many security vulnerabilities are only discovered after attacker exploitation, regulators update their interpretation of reasonable security to stay current with emerging threats. With a focus on determining what businesses must do to comply with these changing interpretations of the law, we conducted an empirical, multi-case study to discover and measure the meaning and evolution of ''reasonable'' security by examining 19 regulatory enforcement actions by the U.S. Federal Trade Commission (FTC) over a 10 year period. The results reveal trends in FTC enforcement actions that are institutionalizing security knowledge as evidenced by 39 security requirements that mitigate 110 legal security vulnerabilities.}, number={4}, journal={COMPUTERS & SECURITY}, author={Breaux, Travis D. and Baumer, David L.}, year={2011}, month={Jun}, pages={178–193} } @misc{chumney_baumer_sawyers_2009, title={Patents Gone Wild: An Ethical Examination and Legal Analysis of Tax-Related and Tax Strategy Patents}, volume={46}, ISSN={["1744-1714"]}, DOI={10.1111/j.1744-1714.2009.01081.x}, abstractNote={American Business Law JournalVolume 46, Issue 3 p. 343-406 Patents Gone Wild: An Ethical Examination and Legal Analysis of Tax-Related and Tax Strategy Patents Wade M. Chumney, Wade M. Chumney University of Virginia School of Law aCecil B. Day Assistant Professor of Business Ethics and Law, Georgia Institute of Technology; B.A., Davidson College; M.S. (Information Systems), Dakota State University; J.D., University of Virginia School of Law. An earlier version of this article was awarded the Holmes-Cardozo Award for Outstanding Submitted Conference Paper and the Distinguished Proceedings Paper Award at the 2008 Annual Conference of the Academy of Legal Studies in Business.Search for more papers by this authorDavid L. Baumer, David L. Baumer University of Virginia bProfessor of Law and Technology, North Carolina State University; B.A., Ohio State University; J.D., University of Miami in Florida; Ph.D. (Economics), University of Virginia.Search for more papers by this authorRoby B. Sawyers, Roby B. Sawyers Arizona State University cProfessor of Accounting, North Carolina State University; B.S.B.A., University of North Carolina at Chapel Hill; M.Acc., University of South Florida; Ph.D. Arizona State University.Search for more papers by this author Wade M. Chumney, Wade M. Chumney University of Virginia School of Law aCecil B. Day Assistant Professor of Business Ethics and Law, Georgia Institute of Technology; B.A., Davidson College; M.S. (Information Systems), Dakota State University; J.D., University of Virginia School of Law. An earlier version of this article was awarded the Holmes-Cardozo Award for Outstanding Submitted Conference Paper and the Distinguished Proceedings Paper Award at the 2008 Annual Conference of the Academy of Legal Studies in Business.Search for more papers by this authorDavid L. Baumer, David L. Baumer University of Virginia bProfessor of Law and Technology, North Carolina State University; B.A., Ohio State University; J.D., University of Miami in Florida; Ph.D. (Economics), University of Virginia.Search for more papers by this authorRoby B. Sawyers, Roby B. Sawyers Arizona State University cProfessor of Accounting, North Carolina State University; B.S.B.A., University of North Carolina at Chapel Hill; M.Acc., University of South Florida; Ph.D. Arizona State University.Search for more papers by this author First published: 17 September 2009 https://doi.org/10.1111/j.1744-1714.2009.01081.xCitations: 5 Read the full textAboutPDF ToolsExport citationAdd to favoritesTrack citation ShareShare Give accessShare full text accessShare full-text accessPlease review our Terms and Conditions of Use and check box below to share full-text version of article.I have read and accept the Wiley Online Library Terms and Conditions of UseShareable LinkUse the link below to share a full-text version of this article with your friends and colleagues. Learn more.Copy URL Citing Literature Volume46, Issue3Fall 2009Pages 343-406 RelatedInformation}, number={3}, journal={AMERICAN BUSINESS LAW JOURNAL}, author={Chumney, Wade M. and Baumer, David L. and Sawyers, Roby B.}, year={2009}, pages={343–406} } @article{otto_anton_baumer_2007, title={The ChoicePoint dilemma - How data brokers should handle the privacy of personal information}, volume={5}, ISSN={["1558-4046"]}, DOI={10.1109/MSP.2007.126}, abstractNote={Before 2005, data broker ChoicePoint suffered fraudulent access to its databases that exposed thousands of customers' personal information. We examine Choice-Point's data breach, explore what went wrong from the perspective of consumers, executives, policy, and IT systems, and offer recommendations for the future.}, number={5}, journal={IEEE SECURITY & PRIVACY}, author={Otto, Paul N. and Anton, Annie I. and Baumer, David L.}, year={2007}, pages={15–23} } @article{poindexter_earp_baumer_2006, title={An experimental economics approach toward quantifying online privacy choices}, volume={8}, ISSN={["1572-9419"]}, DOI={10.1007/s10796-006-9013-4}, number={5}, journal={INFORMATION SYSTEMS FRONTIERS}, author={Poindexter, J. C. and Earp, Julia B. and Baumer, David L.}, year={2006}, month={Dec}, pages={363–374} } @article{anton_he_baumer_2004, title={Inside JetBlue's privacy policy violations}, volume={2}, number={6}, journal={IEEE Security & Privacy}, author={Anton, A. I. and He, Q. F. and Baumer, D. L.}, year={2004}, pages={18-} } @article{baumer_earp_poindexter_2004, title={Internet privacy law: a comparison between the United States and the European Union}, volume={23}, ISSN={["0167-4048"]}, DOI={10.1016/j.cose.2003.11.001}, abstractNote={The increasing use of personal information in Internet-based applications has created privacy concerns worldwide. This has led to awareness among policy makers in several countries of the desirability of harmonizing privacy laws. The greatest challenge to privacy legislation from an international perspective arises because, while the Internet is virtually borderless, legislative approaches differ from country to country. This paper presents a functional comparison between current privacy law in the European Union (EU) and in the United States (U.S.), as such laws relate to regulation of websites and online service providers. In addition, similarities and differences between the 2002 EU Directive 2002/58/EC, Directive on Privacy and Electronic Communications, which has been adopted by the EU but not yet implemented, and the proposed U.S. Online Privacy Protection Act, are illuminated. Employing a qualitative approach, we use the Fair Information Practices to organize discussion of comparisons and contrasts between U.S. and EU privacy laws. Our investigation of this topic leads us to conclude that the right to privacy is more strictly protected in the EU than in the U.S. The Online Privacy Protection Act, recently introduced as a bill in Congress, has the potential to significantly affect commercial practices in the U.S. and move the U.S. towards current EU privacy protection laws. This analysis benefits managers as well as security professionals since the results can be used as guidelines in ensuring that an organization's website practices are consistent with requirements imposed by countries with which they exchange information. It also provides information that can guide organizations as they prepare for potential privacy legislation.}, number={5}, journal={COMPUTERS & SECURITY}, author={Baumer, DL and Earp, JB and Poindexter, JC}, year={2004}, month={Jul}, pages={400–412} } @book{baumer_poindexter_2004, title={Legal environment of business in the information age}, ISBN={0072441151}, publisher={Boston, Mass.: McGraw-Hill}, author={Baumer, D. L. and Poindexter, J. C.}, year={2004} } @article{earp_baumer_2003, title={Innovative Web use to learn about consumer behavior and online privacy}, volume={46}, ISSN={["0001-0782"]}, DOI={10.1145/641205.641209}, abstractNote={Consumers are more protective of their personal data than most e-marketers probably ever expected. Indeed, any willingness by consumers to provide certain information online greatly depends on who's doing the asking.}, number={4}, journal={COMMUNICATIONS OF THE ACM}, author={Earp, JB and Baumer, D}, year={2003}, month={Apr}, pages={81–83} } @article{young_sapienza_baumer_2003, title={The influence of flexibility in buyer-seller relationships on the productivity of knowledge}, volume={56}, ISSN={["0148-2963"]}, DOI={10.1016/S0148-2963(01)00243-0}, abstractNote={This study is the first empirical examination of the knowledge substitution and flexibility effects derived from the relational and resource-based views of the firm. In these perspectives, it is critically important for firms whose strategic value creation depends on innovation and knowledge to develop interfirm knowledge-sharing routines with their trading partners. These routines enable more productive knowledge resources to replace less productive stocks of knowledge, and the effectiveness of the substitution is influenced by the flexibility with which the supplier and buyer firms adapt to the change. Using a sample of entrepreneurial software firms, we find that their productivity increases as their relationships with trading partners become increasingly flexible. Thus, this paper offers evidence that in an innovative, knowledge-intensive industry context, flexibility in interorganizational relationships is an important interfirm resource.}, number={6}, journal={JOURNAL OF BUSINESS RESEARCH}, author={Young, G and Sapienza, H and Baumer, D}, year={2003}, month={Jun}, pages={443–451} } @book{baumer_poindexter_2002, title={Cyberlaw and e-commerce}, ISBN={0072441208}, publisher={Boston: McGraw-Hill/Irwin}, author={Baumer, D. L. and Poindexter, J. C.}, year={2002} } @article{markham_baumer_aiman-smith_kingon_zapata_2000, title={An algorithm for high technology engineering and management education}, DOI={10.1002/j.2168-9830.2000.tb00515.x}, abstractNote={Abstract}, number={89}, journal={Journal of Engineering Education}, author={Markham, S. and Baumer, D. and Aiman-Smith, L. and Kingon, A. and Zapata, M.}, year={2000}, pages={209–218} }