Crafting Requirements for Mobile and Pervasive Emergency Response based on Privacy and Security by Design Principles
2013 (English)In: International Journal of Information Systems for Crisis Response and Management, ISSN 1937-9390, E-ISSN 1937-9420, Vol. 5, no 2, 1-18 p.Article in journal (Refereed) Published
According to fundamental principles of the Privacy by Design approach, the consultation of privacy issues should be embedded into analysis and design of information systems, from the early stages of system planning to implementation. In this article, we extend this perspective towards Privacy and Security by Design. Exemplary focusing on mobile and pervasive emergency response, as a specific area of the emergency management domain, this article conveys how the early requirements elicitation can be supported by a semantically integrated conceptual modeling method. Presenting the results of the exemplary executed elicitation processes, it contributes a concrete set of security and privacy requirements for mobile and pervasive emergency response settings. By also taking into account conflicting security goals, this article provides a substantial grounding for the development and deployment of multilaterally secure pervasive ICT that effectively supports emergency management during and in the aftermath of critical response missions.
Place, publisher, year, edition, pages
New York: IGI Global, 2013. Vol. 5, no 2, 1-18 p.
Information Security, Privacy by Design, Pervasive Computing, Emergency Response, Conceptual Modeling, Information Systems
Research subject Information Systems
IdentifiersURN: urn:nbn:se:kau:diva-28825DOI: 10.4018/jiscrm.2013040101OAI: oai:DiVA.org:kau-28825DiVA: diva2:644506