Search results

1 – 2 of 2
Open Access
Article
Publication date: 7 April 2020

Fatima M. Isiaka, Salihu Abdullahi Audu and Mustafa Ahmed Umar

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered…

2378

Abstract

Purpose

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered national economies, enhanced how governments interact with their citizens and how ordinary people connect with friends and family. However, this dependence has equally resulted to a high rise in vulnerability, threat and risk associated with more use of information and communication technology. Cyber-attacks that have the potential to disrupt or damage information system infrastructure are getting more complex with some level of sophistication. Traditional protection of information system infrastructure is no longer sufficient; systems have proven to be immune to failure or incidents. This paper aims to ensure that there is a continuous availability of services through a fail-safe proof.

Design/methodology/approach

MYSQL replication technique was used to develop a model based on three-tier layers using the principle of network interdependency and the replication techniques. Tier 1 depicts a Telecom organization serving as service provider that provides internet service to Tier 2 organization – a Bank; Tier 3 is the financial App that can be used by bank staff and customers. The fail-safe mode integrated mechanism enables Tier 3 to continue to render its services in the event of an attack on Tier 1 such as DDoS without disruption.

Findings

This technique succeeded in mitigating the loss of data if cyber incident occurred or reception of uninterrupted services is countered, which give rise to future master-to-master architecture.

Research limitations/implications

The study conducted is limited to the design and development of a fail-safe system for interdependent networks or systems using MYSQL replication technique.

Originality/value

In an interdependent environment such as the cyberspace, the sectors are interdependent for optimal results. The originality of the work ensures that there is availability of services which is sustained and that data integrity is assured using the fail-safe technique based on MySQL replication method.

Details

International Journal of Crowd Science, vol. 4 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Article
Publication date: 6 July 2015

Olatunde Julius Otusanya, Sarah Lauwo, Oluwaseun Joseph Ige and Olunlade Samuel Adelaja

This study aims to contribute to the emerging discourse on elite financial crime, with particular attention devoted to the role played by the legislature in corrupt practices in…

Abstract

Purpose

This study aims to contribute to the emerging discourse on elite financial crime, with particular attention devoted to the role played by the legislature in corrupt practices in Nigeria. Separations of power, watchdog role of legislature and ideologies have become a major influence in democratic system. Legislative power has developed as a means of providing oversight functions over the executives, thereby inhibiting fraudulent practices in governments.

Design/methodology/approach

The paper argues that the political institutional structures embedded with monopoly, discretion and little or no accountability facilitate financial corrupt practices within the legislature. The paper uses publicly available evidence to show that the legislators in developing countries are actively engaged in corrupt practices.

Findings

The evidence provided in this paper shows that separation of power and representative democracy had not brought about transparency and accountability in government activities in Nigeria. Legislature often trade-off their constitutional power and their claim of service to the public interest by engaging in financial criminal practices.

Research limitations/implications

This paper does not set out to provide a comprehensive analysis of political corruption. Instead, it considers the “dark” side of legislative practice by examining the involvement of legislature in facilitating corrupt financial practices in Nigeria.

Practical implications

The inability of the regulators to effectively sanction legislators implicated in corrupt practices suggests that the current institutional and regulatory apparatus are not fully equipped in dealing with the financial criminal activities of legislators.

Social implications

Despite the arrest and prosecution of some legislators, a number of cases are swept under the carpet. Therefore, this paper suggests that Nigeria need to reform its political system and institutions to promote transparency and accountability in government and to build trust in the legislative process.

Originality/value

This paper considers the “dark” side of legislative practice by examining the involvement of legislature in facilitating corrupt financial practices in Nigeria.

Details

Journal of Financial Crime, vol. 22 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 2 of 2