Systems security requirements analysis for M-Government transformation

Fatima Al Shamsi, Sarah Bamatraf, Talal Rahwan, Zeyar Aung, Davor Svetinovic

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

With the launch of smart government initiatives, it is important to analyze the security requirements that will enable the decision makers to successfully carry out the process of transformation to mobile government (M-Government). This paper presents a security analysis using the security requirements engineering SQUARE method in the context of the M-Government transformation. The mobile application architectures are evaluated as a case study using the SQUARE method. In particular, the main contribution of this paper is the analysis of the outcomes of the SQUARE method using qualitative evaluation criteria.

Original languageEnglish (US)
Title of host publicationICAT 2017 - 26th International Conference on Information, Communication and Automation Technologies, Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-6
Number of pages6
ISBN (Electronic)9781538633373
DOIs
StatePublished - Dec 8 2017
Event26th International Conference on Information, Communication and Automation Technologies, ICAT 2017 - Sarajevo, Bosnia and Herzegovina
Duration: Oct 26 2017Oct 28 2017

Publication series

NameICAT 2017 - 26th International Conference on Information, Communication and Automation Technologies, Proceedings
Volume2017-December

Other

Other26th International Conference on Information, Communication and Automation Technologies, ICAT 2017
Country/TerritoryBosnia and Herzegovina
CitySarajevo
Period10/26/1710/28/17

Keywords

  • security requirements engineering
  • smart government

ASJC Scopus subject areas

  • Control and Optimization
  • Artificial Intelligence
  • Computer Networks and Communications
  • Information Systems

Fingerprint

Dive into the research topics of 'Systems security requirements analysis for M-Government transformation'. Together they form a unique fingerprint.

Cite this