Systems security requirements analysis for M-Government transformation

Fatima Al Shamsi, Sarah Bamatraf, Talal Rahwan, Zeyar Aung, Davor Svetinovic

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

With the launch of smart government initiatives, it is important to analyze the security requirements that will enable the decision makers to successfully carry out the process of transformation to mobile government (M-Government). This paper presents a security analysis using the security requirements engineering SQUARE method in the context of the M-Government transformation. The mobile application architectures are evaluated as a case study using the SQUARE method. In particular, the main contribution of this paper is the analysis of the outcomes of the SQUARE method using qualitative evaluation criteria.

Original languageBritish English
Title of host publicationICAT 2017 - 26th International Conference on Information, Communication and Automation Technologies, Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-6
Number of pages6
ISBN (Electronic)9781538633373
DOIs
StatePublished - 8 Dec 2017
Event26th International Conference on Information, Communication and Automation Technologies, ICAT 2017 - Sarajevo, Bosnia and Herzegovina
Duration: 26 Oct 201728 Oct 2017

Publication series

NameICAT 2017 - 26th International Conference on Information, Communication and Automation Technologies, Proceedings
Volume2017-December

Conference

Conference26th International Conference on Information, Communication and Automation Technologies, ICAT 2017
Country/TerritoryBosnia and Herzegovina
CitySarajevo
Period26/10/1728/10/17

Keywords

  • security requirements engineering
  • smart government

Fingerprint

Dive into the research topics of 'Systems security requirements analysis for M-Government transformation'. Together they form a unique fingerprint.

Cite this