Optimized Three-Dimensional Security Framework to Mitigate Risks Arising From BYOD-Enabled Business Environment

Author(s):  
Lizzy Oluwatoyin Ofusori ◽  
Ncamiso Nkululeko Jahalenkhosi Dlamini ◽  
Prabhakar Rontala Subramaniam

Bring your own device (BYOD) has infiltrated the work environment and businesses are enjoying the benefits coupled with the adoption of the trend. At the same time, the adoption of BYOD has introduced a number of security threats that businesses are failing to match. In the pursuit of addressing security threats that are introduced by the adoption of this technology trend, this chapter recommends a three-dimensional (3-D) security framework that can be used to mitigate the risks emanating from a BYOD enabled environment. Data was collected from the employees of two banks in Africa that supported BYOD trend to measure individual and organizational practices. This chapter investigates further on these practices in addressing implications of BYOD. Three categories of security threats are delineated in this chapter. A review of existing security frameworks is presented in this chapter. The chapter concludes by outlining a 3-D security framework as a potential solution to protect BYOD enabled business environment.

Author(s):  
Lizzy Oluwatoyin Ofusori ◽  
Ncamiso Nkululeko Jahalenkhosi Dlamini ◽  
Prabhakar Rontala Subramaniam

Bring your own device (BYOD) has infiltrated the work environment and businesses are enjoying the benefits coupled with the adoption of the trend. At the same time, the adoption of BYOD has introduced a number of security threats that businesses are failing to match. In the pursuit of addressing security threats that are introduced by the adoption of this technology trend, this chapter recommends a three-dimensional (3-D) security framework that can be used to mitigate the risks emanating from a BYOD enabled environment. Data was collected from the employees of two banks in Africa that supported BYOD trend to measure individual and organizational practices. This chapter investigates further on these practices in addressing implications of BYOD. Three categories of security threats are delineated in this chapter. A review of existing security frameworks is presented in this chapter. The chapter concludes by outlining a 3-D security framework as a potential solution to protect BYOD enabled business environment.


2021 ◽  
Vol 1 ◽  
pp. 2631-2640
Author(s):  
Santosh Maurya ◽  
Tezuka Shin ◽  
Kentaro Watanabe ◽  
Hiroshi Nakagoe

AbstractThis research investigates service creation in/after effect of coronavirus pandemic targeting the essential business environment. It follows prevention through design approach to facilitate business owners to maintain their business environments at low COVID contraction risks, for both customers and staff. The effectiveness of recommended prevention practices (like social distancing and hand-sanitising) is uncertain at public workplaces, simply due to inevitable workers and customers interactions. Such uncertainty, especially in cases of retail stores and hospitals, raises a need for the design of services and support systems for common/necessary public business activities to reduce the burden on people involved. This research investigates the risk-related metrics to realise such digital services, focussing on three types: congestion at the work environment, disinfection of store area/objects, and sanitisation of people and staffs involved. Based on this, a digital technology-based service COVSAFE was created and tested through a proof-of-concept implementation for a supermarket business environment. This implementation and its evaluations highlight the bottlenecks/challenges for realising this system in everyday scenarios.


2020 ◽  
Vol 0 (0) ◽  
Author(s):  
Debasish Roy

AbstractThe marketing performance models, regardless of their nature and applications, should ultimately lead to creation of cash flows efficiently. This common objective emphasizes on a basic proposition: the output (dependent) variable must be intrinsically correlated to the financial behavior of the firm at the micro level. The four criteria for marketing performance and evaluation are Financial relevance, Actionable, Stable behavior, and Reliable long-term guidance respectively. By using those four criteria as the cornerstone, the Core Sales – Response Model was formulated under the Process perspective (the marketing procedure which helps to generate cash flows along with other antecedents of financial performance). This research paper is aimed at restructuring the fundamental Sales – Response model with the dependent variable Sales and three independent variables, namely, Marketing Support, Firm – controlled factors, and Uncontrolled factors in view of uncertainties related to global turmoil and widespread economic recession into a three – dimensional model by dropping ‘Marketing Support’ to fit the foundation of mathematical chaos theory and try to test its impact in the real world scenario by two ways: first, whether it can accurately define the current nature of functioning of a business firm under chaotic business environment, and second, given the condition of chaos; if the firm fails to prove its stability, what actions should be taken to stabilize its position in the feasible space. In order to serve the purposes, the manufacturing giant Apple, Inc. ® has been considered as the sample firm for the time – series study of 10 years (2009–2018).


Author(s):  
Lizzy Oluwatoyin Ofusori ◽  
Prabhakar Rontala Subramaniam

As the adoption of bring your own device (BYOD) phenomenon by businesses and other sectors continues to grow. Employees find it desirable to use their personally owned mobile devices for work without the need to differentiate between their carrier services and their organizations' network. However, this practice makes such businesses vulnerable to various security threats. Nigeria banking institutions, like other businesses globally, have adopted the BYOD phenomenon. However, BYOD trend constitutes heterogeneity, and there is large diversity in mobile devices, hence the risk of corporate data being exposed to threats increases. Thus, this paper investigates the influence of technical and social threats as it relates to BYOD phenomenon in the banking institutions. Data was collected from the employees of four banks in Nigeria that supported BYOD trend. The study found out that there are some security threats that are integrated, and the existing security measures are not sufficient to mitigate those threats. Hence, this study has presented an integrated solution to curb these threats.


Author(s):  
Patrice Braun

In view of the fact that women are playing an increasingly important role in the global economy, this chapter examines business skilling in the digital economy for women in general and women-led small businesses in Australia, in particular. With employability and entrepreneurial capacity of women increasing, so too is their need for a comprehensive skill set is increasing. It is proposed that business courses currently offered do not necessarily consider their target audience or include new economy considerations. This chapter discusses the need for meta-competencies that will allow women in both developed and emerging economies to operate more effectively in a changing work environment and an increasingly digital business environment. For meta-competency efficacy, it is further proposed that evidence-based learning models, gender-sensitive approaches to business learning, and collaborative uses of technology underpin content and (e-)business learning designs.


1998 ◽  
Vol 83 (11) ◽  
pp. 6347-6349 ◽  
Author(s):  
K. Sivasubramaniam ◽  
S. Salon ◽  
M. V. K. Chari ◽  
I. D. Mayergoyz

2016 ◽  
Vol 39 (12) ◽  
pp. 1567-1586 ◽  
Author(s):  
Ashutosh Muduli

Purpose Recognizing that very less number of research has been conducted on workforce agility, the current research aimed to examine the impact of organizational practices in the form of organizational learning and training, compensation, involvement, team work and information system (IS) on workforce agility. Influenced by the “Black Box” approach, the study also examined the role of psychological empowerment as a mechanism mediating the relationship between organizational practices and workforce agility. Design/methodology/approach The study has been conducted in selective Indian industries, representing manufacturing and service sector across public and private sectors. Quantitative and qualitative data have been collected from both executives and non-executives through reliable instruments validated in Indian context. Data have been analyzed using descriptive analysis, canonical correlation analysis and multiple regression. Findings Findings that organizational practices significantly related to workforce agility prove that organizational practices are capable of improving the agile attributes and behavior of the workforce. In detail, team work has the greatest influence on workforce agility, followed by Reward system, employee involvement, organizational learning and training and ISs. Further, the study result also proved the mediating role of psychological empowerment between organizational practices and workforce agility. Practical implications Organizations are to design practices related to organizational learning and training, compensation, involvement, team work and IS and implement them efficiently and effectively to enable agility within the workforce, as an agile workforce can only respond proactively to a volatile, uncertain, complex and ambiguous business environment. Further, the result also suggests that managers should design the organizational practices capable of enhancing psychological empowerment, as the combination can deliver better workforce agility. Originality/value The research is useful considering very less number of research on workforce agility.


2002 ◽  
Vol 11 (1) ◽  
pp. 33-54 ◽  
Author(s):  
Dieter Schmalstieg ◽  
Anton Fuhrmann ◽  
Gerd Hesina ◽  
Zsolt Szalavári ◽  
L. Miguel Encarnação ◽  
...  

Our starting point for developing the Studierstube system was the belief that augmented reality, the less obtrusive cousin of virtual reality, has a better chance of becoming a viable user interface for applications requiring manipulation of complex three-dimensional information as a daily routine. In essence, we are searching for a 3-D user interface metaphor as powerful as the desktop metaphor for 2-D. At the heart of the Studierstube system, collaborative augmented reality is used to embed computer-generated images into the real work environment. In the first part of this paper, we review the user interface of the initial Studierstube system, in particular the implementation of collaborative augmented reality, and the Personal Interaction Panel, a two-handed interface for interaction with the system. In the second part, an extended Studierstube system based on a heterogeneous distributed architecture is presented. This system allows the user to combine multiple approaches— augmented reality, projection displays, and ubiquitous computing—to the interface as needed. The environment is controlled by the Personal Interaction Panel, a twohanded, pen-and-pad interface that has versatile uses for interacting with the virtual environment. Studierstube also borrows elements from the desktop, such as multitasking and multi-windowing. The resulting software architecture is a user interface management system for complex augmented reality applications. The presentation is complemented by selected application examples.


Author(s):  
Maurice Adiga ◽  
Ude Bassey

Organizations productivity all over the globe witnessed a dramatic change occasioned bycoronavirus pandemic which has affected HRM and sustainability of organizations. The study main objective was to heighten the relevance of dynamismin human resource management in the Covid-19 pandemic business environment. The survey research design was employed in the study through the aid of electronic questionnaire and the data was analyzed using SPSS (v25), Excel and Minitab 17. The findings of the study showed that to a greater extent, the performance of employees was not much affected by the pandemic as organizations maintained regular working shift in the early breakout of the virus in Nigeria. The study found that the pandemic altered the usual working modalities of organizations and orchestrated the utilization of e-working. On the performance of employees, work-life balance experience and HRs welfare rating, the study found mixed reactions from HR managers and employees indicating satisfactory and unsatisfactory experience. The pandemic crisis has caused several lingering challenges in the business world which requires a dynamic and strategic approach by HR managers to salvage in other to sustain the organizations and maintain the employees. However, the study recommends a more robust HR to develop employees’ skills, especially in information technology. The study also recommends a better incentive plan for employees’ and also adequate provision of protective gear at the work environment.


2020 ◽  
Vol 37 (1) ◽  
Author(s):  
Awino Okech

This paper focuses on contemporary challenges to the human security framework through an examination of asymmetrical conflict generated by extremist insurgents, specifically Al Shabaab in Kenya. The political and security dynamics generated by extremist groups often find reinforcement in local contestations over power and territory, resulting in an interaction between local and 'external'. It is the product of these interactions in the form of opportunities, resultant discourses, responses and what they offer to an expansion of normative ideas about human security and conflict that this paper focuses on. Using Kenya as a case study, this paper explores the interface between the growth of Al Shabaab, securitisation of governance and political elite consensus on the policy relationship between human security versus a state security model. This paper pursues the argument that the rise in the intensity and nature of Al Shabaab attacks in Kenya has influenced the interpretation of the country's security  threats and the application of strategies. Rather than aiding the application of human security as central to national security, it has rolled back previous gains.


Sign in / Sign up

Export Citation Format

Share Document