Systems security requirements analysis for M-Government transformation

Fatima Al Shamsi, Sarah Bamatraf, Talal Rahwan, Zeyar Aung, Davor Svetinovic

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

With the launch of smart government initiatives, it is important to analyze the security requirements that will enable the decision makers to successfully carry out the process of transformation to mobile government (M-Government). This paper presents a security analysis using the security requirements engineering SQUARE method in the context of the M-Government transformation. The mobile application architectures are evaluated as a case study using the SQUARE method. In particular, the main contribution of this paper is the analysis of the outcomes of the SQUARE method using qualitative evaluation criteria.

Original languageEnglish (US)
Title of host publicationICAT 2017 - 26th International Conference on Information, Communication and Automation Technologies, Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-6
Number of pages6
Volume2017-December
ISBN (Electronic)9781538633373
DOIs
StatePublished - Dec 8 2017
Event26th International Conference on Information, Communication and Automation Technologies, ICAT 2017 - Sarajevo, Bosnia and Herzegovina
Duration: Oct 26 2017Oct 28 2017

Other

Other26th International Conference on Information, Communication and Automation Technologies, ICAT 2017
CountryBosnia and Herzegovina
CitySarajevo
Period10/26/1710/28/17

Fingerprint

Requirements Analysis
Requirements engineering
Security Analysis
Security systems
Qualitative Methods
Requirements Engineering
Mobile Applications
Requirements
Evaluation
Government

Keywords

  • security requirements engineering
  • smart government

ASJC Scopus subject areas

  • Control and Optimization
  • Artificial Intelligence
  • Computer Networks and Communications
  • Information Systems

Cite this

Shamsi, F. A., Bamatraf, S., Rahwan, T., Aung, Z., & Svetinovic, D. (2017). Systems security requirements analysis for M-Government transformation. In ICAT 2017 - 26th International Conference on Information, Communication and Automation Technologies, Proceedings (Vol. 2017-December, pp. 1-6). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICAT.2017.8171627

Systems security requirements analysis for M-Government transformation. / Shamsi, Fatima Al; Bamatraf, Sarah; Rahwan, Talal; Aung, Zeyar; Svetinovic, Davor.

ICAT 2017 - 26th International Conference on Information, Communication and Automation Technologies, Proceedings. Vol. 2017-December Institute of Electrical and Electronics Engineers Inc., 2017. p. 1-6.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Shamsi, FA, Bamatraf, S, Rahwan, T, Aung, Z & Svetinovic, D 2017, Systems security requirements analysis for M-Government transformation. in ICAT 2017 - 26th International Conference on Information, Communication and Automation Technologies, Proceedings. vol. 2017-December, Institute of Electrical and Electronics Engineers Inc., pp. 1-6, 26th International Conference on Information, Communication and Automation Technologies, ICAT 2017, Sarajevo, Bosnia and Herzegovina, 10/26/17. https://doi.org/10.1109/ICAT.2017.8171627
Shamsi FA, Bamatraf S, Rahwan T, Aung Z, Svetinovic D. Systems security requirements analysis for M-Government transformation. In ICAT 2017 - 26th International Conference on Information, Communication and Automation Technologies, Proceedings. Vol. 2017-December. Institute of Electrical and Electronics Engineers Inc. 2017. p. 1-6 https://doi.org/10.1109/ICAT.2017.8171627
Shamsi, Fatima Al ; Bamatraf, Sarah ; Rahwan, Talal ; Aung, Zeyar ; Svetinovic, Davor. / Systems security requirements analysis for M-Government transformation. ICAT 2017 - 26th International Conference on Information, Communication and Automation Technologies, Proceedings. Vol. 2017-December Institute of Electrical and Electronics Engineers Inc., 2017. pp. 1-6
@inproceedings{698a7b938a5a4ed2beb8ba9afd62e1b5,
title = "Systems security requirements analysis for M-Government transformation",
abstract = "With the launch of smart government initiatives, it is important to analyze the security requirements that will enable the decision makers to successfully carry out the process of transformation to mobile government (M-Government). This paper presents a security analysis using the security requirements engineering SQUARE method in the context of the M-Government transformation. The mobile application architectures are evaluated as a case study using the SQUARE method. In particular, the main contribution of this paper is the analysis of the outcomes of the SQUARE method using qualitative evaluation criteria.",
keywords = "security requirements engineering, smart government",
author = "Shamsi, {Fatima Al} and Sarah Bamatraf and Talal Rahwan and Zeyar Aung and Davor Svetinovic",
year = "2017",
month = "12",
day = "8",
doi = "10.1109/ICAT.2017.8171627",
language = "English (US)",
volume = "2017-December",
pages = "1--6",
booktitle = "ICAT 2017 - 26th International Conference on Information, Communication and Automation Technologies, Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Systems security requirements analysis for M-Government transformation

AU - Shamsi, Fatima Al

AU - Bamatraf, Sarah

AU - Rahwan, Talal

AU - Aung, Zeyar

AU - Svetinovic, Davor

PY - 2017/12/8

Y1 - 2017/12/8

N2 - With the launch of smart government initiatives, it is important to analyze the security requirements that will enable the decision makers to successfully carry out the process of transformation to mobile government (M-Government). This paper presents a security analysis using the security requirements engineering SQUARE method in the context of the M-Government transformation. The mobile application architectures are evaluated as a case study using the SQUARE method. In particular, the main contribution of this paper is the analysis of the outcomes of the SQUARE method using qualitative evaluation criteria.

AB - With the launch of smart government initiatives, it is important to analyze the security requirements that will enable the decision makers to successfully carry out the process of transformation to mobile government (M-Government). This paper presents a security analysis using the security requirements engineering SQUARE method in the context of the M-Government transformation. The mobile application architectures are evaluated as a case study using the SQUARE method. In particular, the main contribution of this paper is the analysis of the outcomes of the SQUARE method using qualitative evaluation criteria.

KW - security requirements engineering

KW - smart government

UR - http://www.scopus.com/inward/record.url?scp=85046680332&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85046680332&partnerID=8YFLogxK

U2 - 10.1109/ICAT.2017.8171627

DO - 10.1109/ICAT.2017.8171627

M3 - Conference contribution

VL - 2017-December

SP - 1

EP - 6

BT - ICAT 2017 - 26th International Conference on Information, Communication and Automation Technologies, Proceedings

PB - Institute of Electrical and Electronics Engineers Inc.

ER -