Search results
1 – 2 of 2Alessandro Aldini, Jean-Marc Seigneur, Carlos Ballester Lafuente, Xavier Titi and Jonathan Guislain
The Bring-Your-Own-Device (BYOD) paradigm favors the use of personal and public devices and communication means in corporate environments, thus representing a challenge for the…
Abstract
Purpose
The Bring-Your-Own-Device (BYOD) paradigm favors the use of personal and public devices and communication means in corporate environments, thus representing a challenge for the traditional security and risk management systems. In this dynamic and heterogeneous setting, the purpose of this paper is to present a methodology called opportunity-enabled risk management (OPPRIM), which supports the decision-making process in access control to remote corporate assets.
Design/methodology/approach
OPPRIM relies on a logic-based risk policy model combining estimations of trust, threats and opportunities. Moreover, it is based on a mobile client – server architecture, where the OPPRIM application running on the user device interacts with the company IT security server to manage every access request to corporate assets.
Findings
As a mandatory requirement in the highly flexible BYOD setting, in the OPPRIM approach, mobile device security risks are identified automatically and dynamically depending on the specific environment in which the access request is issued and on the previous history of events.
Originality/value
The main novelty of the OPPRIM approach is the combined treatment of threats (resp., opportunities) and costs (resp., benefits) in a trust-based setting. The OPPRIM system is validated with respect to an economic perspective: cost-benefit sensitivity analysis is conducted through formal methods using the PRISM model checker and through agent-based simulations using the Anylogic framework.
Details
Keywords
This paper aims to examine issues of bribery, cronyism and nepotism in one of the most corrupt countries in Africa.
Abstract
Purpose
This paper aims to examine issues of bribery, cronyism and nepotism in one of the most corrupt countries in Africa.
Design/methodology/approach
This is a single-country case study, drawing on material dating from the mid-1970s, including court cases.
Findings
The corruption is pervasive and systemic, showing severe problems with governance in general, in the sector and against corruption. Nonetheless, two operators, one South African and one Nigerian, have delivered extensive access to mobile networks.
Practical implications
The system of governance requires significant structural reforms, if the burden of corruption is to be reduced.
Originality/value
This paper sheds new and explicit light on the complex history of telecommunications in Nigeria. It adds to the small base of material on corruption in the telecommunications sector. It identifies issues that could usefully be taken up by institutions in Nigeria.
Details