@inproceedings{e5a3b009b392494f9ab8d659b3a27648,
title = "Systems security requirements analysis for M-Government transformation",
abstract = "With the launch of smart government initiatives, it is important to analyze the security requirements that will enable the decision makers to successfully carry out the process of transformation to mobile government (M-Government). This paper presents a security analysis using the security requirements engineering SQUARE method in the context of the M-Government transformation. The mobile application architectures are evaluated as a case study using the SQUARE method. In particular, the main contribution of this paper is the analysis of the outcomes of the SQUARE method using qualitative evaluation criteria.",
keywords = "security requirements engineering, smart government",
author = "Shamsi, {Fatima Al} and Sarah Bamatraf and Talal Rahwan and Zeyar Aung and Davor Svetinovic",
note = "Publisher Copyright: {\textcopyright} 2017 IEEE.; 26th International Conference on Information, Communication and Automation Technologies, ICAT 2017 ; Conference date: 26-10-2017 Through 28-10-2017",
year = "2017",
month = dec,
day = "8",
doi = "10.1109/ICAT.2017.8171627",
language = "British English",
series = "ICAT 2017 - 26th International Conference on Information, Communication and Automation Technologies, Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "1--6",
booktitle = "ICAT 2017 - 26th International Conference on Information, Communication and Automation Technologies, Proceedings",
address = "United States",
}