Search results

1 – 2 of 2
Article
Publication date: 13 March 2017

Alessandro Aldini, Jean-Marc Seigneur, Carlos Ballester Lafuente, Xavier Titi and Jonathan Guislain

The Bring-Your-Own-Device (BYOD) paradigm favors the use of personal and public devices and communication means in corporate environments, thus representing a challenge for the…

Abstract

Purpose

The Bring-Your-Own-Device (BYOD) paradigm favors the use of personal and public devices and communication means in corporate environments, thus representing a challenge for the traditional security and risk management systems. In this dynamic and heterogeneous setting, the purpose of this paper is to present a methodology called opportunity-enabled risk management (OPPRIM), which supports the decision-making process in access control to remote corporate assets.

Design/methodology/approach

OPPRIM relies on a logic-based risk policy model combining estimations of trust, threats and opportunities. Moreover, it is based on a mobile client – server architecture, where the OPPRIM application running on the user device interacts with the company IT security server to manage every access request to corporate assets.

Findings

As a mandatory requirement in the highly flexible BYOD setting, in the OPPRIM approach, mobile device security risks are identified automatically and dynamically depending on the specific environment in which the access request is issued and on the previous history of events.

Originality/value

The main novelty of the OPPRIM approach is the combined treatment of threats (resp., opportunities) and costs (resp., benefits) in a trust-based setting. The OPPRIM system is validated with respect to an economic perspective: cost-benefit sensitivity analysis is conducted through formal methods using the PRISM model checker and through agent-based simulations using the Anylogic framework.

Details

Information & Computer Security, vol. 25 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 14 May 2018

Ewan Sutherland

This paper aims to examine issues of bribery, cronyism and nepotism in one of the most corrupt countries in Africa.

Abstract

Purpose

This paper aims to examine issues of bribery, cronyism and nepotism in one of the most corrupt countries in Africa.

Design/methodology/approach

This is a single-country case study, drawing on material dating from the mid-1970s, including court cases.

Findings

The corruption is pervasive and systemic, showing severe problems with governance in general, in the sector and against corruption. Nonetheless, two operators, one South African and one Nigerian, have delivered extensive access to mobile networks.

Practical implications

The system of governance requires significant structural reforms, if the burden of corruption is to be reduced.

Originality/value

This paper sheds new and explicit light on the complex history of telecommunications in Nigeria. It adds to the small base of material on corruption in the telecommunications sector. It identifies issues that could usefully be taken up by institutions in Nigeria.

Details

Digital Policy, Regulation and Governance, vol. 20 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

1 – 2 of 2