Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/15570
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGaniyu, Shefiu Olusegun-
dc.contributor.authorJimoh, Rasheed Gbenga-
dc.date.accessioned2022-12-19T19:28:24Z-
dc.date.available2022-12-19T19:28:24Z-
dc.date.issued2018-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/15570-
dc.description.abstractRisk evaluation models are employed by individuals and organisations to determine the level of risk involved in a process. Specifically, such model could be employed in computing risk value for risk-aware access control in bring your own device (BYOD) environment. Remarkably, several of these models vary in their coverages of risk components, output rendering formalisms and areas of application; thereby, putting the burden of model selection on users. Worst still, attempts to compare these models by previous researchers are baffled by subjective criteria that are not well-founded and often based on old taxonomy that are incompatible with pervasive environments. Thus, the study purposely formulated eight comparison criteria from characteristics of BYOD risk factors and countermeasures. Thereafter, the criteria were ranked with Analytic Hierarchy Process (AHP). Then, the ranked criteria were used to compare twelve risk evaluation methods, which were selected through three selection criteria expressly crafted for the study. Specifically, the result was rendered as numeric value, which is easy to understand by nontechnical user. In all, the comparison approach presented in this study will assist BYOD operators in selecting model that could safeguard vital information assets against unauthorised access.en_US
dc.language.isoenen_US
dc.publisherInternational Journal for Information Security Research (IJISR)en_US
dc.relation.ispartofseries8;2-
dc.titleComparative Analysis of Risk Evaluation Models for Risk-aware Access Control in Bring Your Own Device Environmenten_US
dc.typeArticleen_US
Appears in Collections:Information and Media Technology

Files in This Item:
File Description SizeFormat 
Comparative-Analysis-of-Risk-Evaluation-Models.pdf951.49 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.