{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T23:29:43Z","timestamp":1654126183510},"reference-count":52,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4,1]]},"abstract":"<p>According to fundamental principles of the Privacy by Design approach, the consultation of privacy issues should be embedded into analysis and design of information systems, from the early stages of system planning to implementation. In this article, the authors extend this perspective towards Privacy and Security by Design. Exemplary focusing on mobile and pervasive emergency response, as a specific area of the emergency management domain, this article conveys how the early requirements elicitation can be supported by a semantically integrated conceptual modeling method. Presenting the results of the exemplary executed elicitation processes, it contributes a concrete set of security and privacy requirements for mobile and pervasive emergency response settings. By also taking into account conflicting security goals, this article provides a substantial grounding for the development and deployment of multilaterally secure pervasive ICT that effectively supports emergency management during and in the aftermath of critical response missions.<\/p>","DOI":"10.4018\/jiscrm.2013040101","type":"journal-article","created":{"date-parts":[[2013,8,22]],"date-time":"2013-08-22T18:20:32Z","timestamp":1377195632000},"page":"1-18","source":"Crossref","is-referenced-by-count":3,"title":["Crafting Requirements for Mobile and Pervasive Emergency Response based on Privacy and Security by Design Principles"],"prefix":"10.4018","volume":"5","author":[{"given":"Stefan G.","family":"Weber","sequence":"first","affiliation":[{"name":"UBIN AG, Berlin, Germany"}]},{"given":"Prima","family":"Gustien\u00e9","sequence":"additional","affiliation":[{"name":"Karlstad Business School, Karlstad University, Karlstad, Sweden"}]}],"member":"2432","reference":[{"key":"jiscrm.2013040101-0","unstructured":"Adam, N. R., Atluri, V., Chun, S. A., Ellenberger, J., Shafiq, B., Vaidya, J., & Xiong, H. (2008). Secure information sharing and analysis for effective emergency management. In Proceedings of the Digital Government Research Conference (pp. 407\u2013408). Digital Government Society of North America."},{"key":"jiscrm.2013040101-1","unstructured":"Backes, M., Druschel, P., Haeberlen, A., & Unruh, D. (2009). CSAR: A practical and provable technique to make randomized systems accountable. In Proceedings of the Network and Distributed System Security Symposium, The Internet Society."},{"key":"jiscrm.2013040101-2","doi-asserted-by":"crossref","unstructured":"Brucker, A. D., & Hutter, D. (2010). Information flow in disaster management systems. In Proceedings of the Conference on Availability, Reliability and Security (pp. 156-163), IEEE CS.","DOI":"10.1109\/ARES.2010.107"},{"key":"jiscrm.2013040101-3","doi-asserted-by":"crossref","unstructured":"Brucker, A. D., Petritsch, H., & Weber, S. G. (2010). Attribute-based encryption with break-glass. In Proceedings of the Workshop in Information Security Theory and Practice (pp. 237\u2013244). Springer.","DOI":"10.1007\/978-3-642-12368-9_18"},{"key":"jiscrm.2013040101-4","doi-asserted-by":"publisher","DOI":"10.1109\/MTAS.2005.1407744"},{"key":"jiscrm.2013040101-5","author":"A.Cavoukian","year":"2009","journal-title":"Privacy by design: The 7 fundamental principles"},{"key":"jiscrm.2013040101-6","year":"2007","journal-title":"Successful response starts with a map: Improving geospatial support for disaster management"},{"key":"jiscrm.2013040101-7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-33149-2"},{"key":"jiscrm.2013040101-8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20317-6_4"},{"key":"jiscrm.2013040101-9","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2005.07.005"},{"key":"jiscrm.2013040101-10","unstructured":"Ehlert, P. A. (2003). Intelligent user interfaces: Introduction and survey (Research Report DKS03-01 \/ ICE 01). Delft University of Technology, Faculty of Information Technology and Systems, Data and Knowledge Systems Group."},{"key":"jiscrm.2013040101-11","unstructured":"Endres, C., Wurz, A., Hoffmann, M., & Behring, A. (2010). A task-based messaging approach to facilitate staff work. In Proceedings of the International Conference on Information Systems for Crisis Response and Management."},{"key":"jiscrm.2013040101-12","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.91"},{"key":"jiscrm.2013040101-13","unstructured":"Flentge, F., Weber, S. G., Behring, A., & Ziegert, T. (2008). Designing context-aware HCI for collaborative emergency management. In Proceedings of the International Workshop on HCI for Emergencies in Conjunction with Conference on Human Factors in Computing Systems."},{"key":"jiscrm.2013040101-14","doi-asserted-by":"crossref","unstructured":"Fournaris, A. P. (2010). Trust ensuring crisis management hardware module. Information Security Journal: A Global Perspective, 19(2), 74\u201383. Taylor & Francis.","DOI":"10.1080\/19393550903404910"},{"key":"jiscrm.2013040101-15","unstructured":"G\u00fcrses, S., Troncoso, C., & Diaz, C. (2011). Engineering privacy by design. In Computers, privacy & data protection."},{"key":"jiscrm.2013040101-16","doi-asserted-by":"crossref","unstructured":"Gustas, R., & Gustien\u00e9, P. (2008). Pragmatic-driven approach for service-oriented analysis and design. In Information Systems Engineering: From Data Analysis to Process Networks (pp. 97-128). IGI Global.","DOI":"10.4018\/978-1-59904-567-2.ch005"},{"key":"jiscrm.2013040101-17","doi-asserted-by":"publisher","DOI":"10.4018\/jismd.2012010103"},{"key":"jiscrm.2013040101-18","unstructured":"Gustien\u00e9, P. (2010). Development of a new service-oriented modelling method for information systems analysis and design. Doctoral Thesis, Karlstad: Karlstad University Studies."},{"key":"jiscrm.2013040101-19","doi-asserted-by":"crossref","first-page":"44","DOI":"10.4018\/978-1-60566-890-1.ch004","article-title":"How models and methods for analysis and design of information systems can be improved to better support communication and learning","author":"P.Gustien\u00e9","year":"2010","journal-title":"Informatics for distributed business and decision-making environment: Creating information system ecology"},{"key":"jiscrm.2013040101-20","unstructured":"Iannella, R., Robinson, K., & Rinta-Koski, O.-P. (2007). Towards a framework for crisis information management systems (CIMS). In Proceedings of the 14th Annual Conference of the International Emergency Management Society (TIEMS)."},{"issue":"3","key":"jiscrm.2013040101-21","first-page":"85","article-title":"Emergency response systems: The utility Y2K experience.","volume":"6","author":"M. E.Jennex","year":"2004","journal-title":"Journal of Information Technology Theory and Application"},{"key":"jiscrm.2013040101-22","doi-asserted-by":"crossref","unstructured":"Jiang, X., Chen, N. Y., Hong, J. I., Wang, K., Takayama, L., & Landay, J. A. (2004). Siren: Context-aware computing for firefighting. In Proceedings of the Conference on Pervasive Computing (pp. 87-105). Springer.","DOI":"10.1007\/978-3-540-24646-6_6"},{"key":"jiscrm.2013040101-23","doi-asserted-by":"crossref","unstructured":"Johnson, C. W. (2008). Complexity, structured chaos and the importance of information management for mobile computing in the UK floods of 2007. In Proceedings of the Workshop on Mobile Information Technology for Emergency Response (pp. 1\u201311), Springer.","DOI":"10.1007\/978-3-642-00440-7_1"},{"key":"jiscrm.2013040101-24","unstructured":"Kim, J. K., Sharman, R., Rao, H. R., & Upadhyaya, S. (2006). Framework for analyzing critical incident management systems (CIMS). In Proceedings of the Hawaii International Conference on System Sciences (HICSS \u201906). IEEE CS."},{"key":"jiscrm.2013040101-25","doi-asserted-by":"crossref","unstructured":"Kost, M., Freytag, J.-C., Kargl, F., & Kung, A. (2011). Privacy verification using ontologies. In Proceedings of the Six International Conference on Availability, Reliability and Security (ARES\u201911) (pp. 627-632). Washington, DC: IEEE Computer Society.","DOI":"10.1109\/ARES.2011.97"},{"key":"jiscrm.2013040101-26","doi-asserted-by":"crossref","unstructured":"Lachner, J., & Hellwagner, H. (2008). Information and communication systems for mobile emergency response. In Proceedings of the United Information Systems Conference (pp. 213\u2013224). Springer.","DOI":"10.1007\/978-3-540-78942-0_22"},{"key":"jiscrm.2013040101-27","doi-asserted-by":"crossref","unstructured":"Langheinrich, M. (2001). Privacy by design - Principles of privacy-aware ubiquitous systems. In Proceedings of the Conference on Ubiquitous Computing (pp. 273\u2013291). Springer.","DOI":"10.1007\/3-540-45427-6_23"},{"key":"jiscrm.2013040101-28","author":"C.Linde","year":"2008","journal-title":"Aufbau und Technik des digitalen BOS-Funks"},{"key":"jiscrm.2013040101-29","doi-asserted-by":"crossref","unstructured":"Ma, Y., Kalashnikov, D. V., Hariharan, R., Mehrotra, S., Venkatasubramanian, N., Ashish, N., & Lickfett, J. (2007). On-demand information portals for disaster situations. In Proceedings of the Conference on Intelligence and Security Informatics (pp. 133\u2013136). IEEE CS.","DOI":"10.1109\/ISI.2007.379546"},{"key":"jiscrm.2013040101-30","first-page":"179","article-title":"Project rescue: Challenges in responding to the unexpected. SPIE Journal of Electronic Imaging","volume":"5304","author":"S.Mehrotra","year":"2004","journal-title":"Displays & Medical Imaging"},{"key":"jiscrm.2013040101-31","unstructured":"Meissner, A., Luckenbach, T., Risse, T., Kirste, T., & Kirchner, H. (2002). Design challenges for an integrated disaster management communication and information system. In Proceedings of the Workshop on Disaster Recovery Networks."},{"key":"jiscrm.2013040101-32","unstructured":"Meissner, A., Wang, Z., Putz, W., & Grimmer, J. (2006). MIKoBOS - A mobile information and communication system for emergency response. In Proceedings of the International Conference on Information Systems for Crisis Response and Management (pp. 92-101)."},{"key":"jiscrm.2013040101-33","doi-asserted-by":"crossref","unstructured":"Murgatroyd, B. W. (2003). End to end encryption in public safety TETRA networks. IE seminar on secure GSM and beyond: End to end security for mobile communication (Digest No. 2003\/10059).","DOI":"10.1049\/ic:20030015"},{"key":"jiscrm.2013040101-34","doi-asserted-by":"crossref","unstructured":"Nuseibeh, B., & Easterbrook, S. (2000). Requirements engineering: A roadmap. In Proceedings of the Conference on the Future of Software Engineering: International Conference on Software Engineering (pp. 35-46), ACM Press.","DOI":"10.1145\/336512.336523"},{"key":"jiscrm.2013040101-35","doi-asserted-by":"publisher","DOI":"10.1207\/S15326926CLP0801_01"},{"key":"jiscrm.2013040101-36","doi-asserted-by":"publisher","DOI":"10.1504\/IJEM.2006.011296"},{"key":"jiscrm.2013040101-37","doi-asserted-by":"publisher","DOI":"10.1109\/98.943998"},{"key":"jiscrm.2013040101-38","doi-asserted-by":"publisher","DOI":"10.4018\/jiscrm.2011100104"},{"key":"jiscrm.2013040101-39","author":"S.Spiekermann","year":"2008","journal-title":"User control in ubiquitous computing: Design alternatives and user acceptance"},{"issue":"4","key":"jiscrm.2013040101-40","first-page":"1","article-title":"The design of a dynamic emergency response management information system.","volume":"5","author":"M.Turoff","year":"2004","journal-title":"Journal of Information Technology Theory and Application"},{"key":"jiscrm.2013040101-41","doi-asserted-by":"publisher","DOI":"10.1145\/1226736.1226760"},{"key":"jiscrm.2013040101-42","doi-asserted-by":"crossref","unstructured":"Weber, S. G. (2009). Harnessing pseudonyms with implicit attributes for privacy-respecting mission log analysis. In Proceedings of the Conference on Intelligent Networking and Collaborative Systems (pp. 119-126). IEEE CS.","DOI":"10.1109\/INCOS.2009.40"},{"key":"jiscrm.2013040101-43","doi-asserted-by":"crossref","unstructured":"Weber, S. G. (2009). Secure and efficient first response coordination based on attribute-based encryption techniques. In Proceedings of the International Conference on Information Systems for Crisis Response and Management (Poster Session).","DOI":"10.1109\/CONGRESS.2009.11"},{"key":"jiscrm.2013040101-44","doi-asserted-by":"crossref","unstructured":"Weber, S. G. (2009). Securing first response coordination with dynamic attribute-based encryption. In Proceedings of the Conference on Privacy, Security and Trust in conjunction with World Congress on Privacy, Security, Trust and the Management of e-Business (pp. 58-69). IEEE CS.","DOI":"10.1109\/CONGRESS.2009.11"},{"key":"jiscrm.2013040101-45","author":"S. G.Weber","year":"2012","journal-title":"Multilaterally secure pervasive cooperation \u2013 Privacy protection, accountability and secure communication for the age of pervasive computing"},{"key":"jiscrm.2013040101-46","unstructured":"Weber, S. G., & Dr\u00fceke, R. (2008). Ubiquitous computing: Zwischen Privatheit und (Eigen-) Verantwortlichkeit. In Deutschsprachiges Symposiums des International Center for Information Ethics: Wandel des Internets - Wandel der Informationsethik? Schwerpunkt: Das Internet ohne Personalcomputer."},{"key":"jiscrm.2013040101-47","doi-asserted-by":"crossref","unstructured":"Weber, S. G., Heinemann, A., & M\u00fchlh\u00e4user, M. (2008). Towards an architecture for balancing privacy and traceability in ubiquitous computing environments. In Proceedings of the Workshop on Privacy and Assurance at Conference on Availability, Reliability and Security (pp. 958\u2013964). IEEE CS.","DOI":"10.1109\/ARES.2008.195"},{"key":"jiscrm.2013040101-48","doi-asserted-by":"crossref","unstructured":"Weber, S. G., Kalev, Y., Ries, S., & M\u00fchlh\u00e4user, M. (2011). MundoMessage: Enabling trustworthy ubiquitous emergency communication. In Proceedings of the International Conference on Ubiquitous Information Management and Communication (pp 29:1\u201329:10). ACM Press.","DOI":"10.1145\/1968613.1968649"},{"key":"jiscrm.2013040101-49","doi-asserted-by":"crossref","unstructured":"Weber, S. G., & M\u00fchlh\u00e4user, M. (2011). Multilaterally secure ubiquitous auditing. In Proceedings of the Intelligent Networking and Collaborative Systems and Applications (pp. 207\u2013233). Springer.","DOI":"10.1007\/978-3-642-16793-5_10"},{"key":"jiscrm.2013040101-50","unstructured":"Weber, S. G., Ries, S., & Heinemann, A. (2007). Inherent tradeoffs in ubiquitous computing services. In GI Jahrestagung (pp. 364\u2013368), GI."},{"issue":"3","key":"jiscrm.2013040101-51","first-page":"44","article-title":"Enterprise architecture: The issue of the century.","volume":"10","author":"J. A.Zachman","year":"1997","journal-title":"Database Programming and Design Magazine"}],"container-title":["International Journal of Information Systems for Crisis Response and Management"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=81271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T22:19:30Z","timestamp":1654121970000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jiscrm.2013040101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,4,1]]},"references-count":52,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jiscrm.2013040101","relation":{},"ISSN":["1937-9390","1937-9420"],"issn-type":[{"value":"1937-9390","type":"print"},{"value":"1937-9420","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4,1]]}}}