{"id":"https://openalex.org/W2084470861","doi":"https://doi.org/10.4018/jiscrm.2013040101","title":"Crafting Requirements for Mobile and Pervasive Emergency Response based on Privacy and Security by Design Principles","display_name":"Crafting Requirements for Mobile and Pervasive Emergency Response based on Privacy and Security by Design Principles","publication_year":2013,"publication_date":"2013-04-01","ids":{"openalex":"https://openalex.org/W2084470861","doi":"https://doi.org/10.4018/jiscrm.2013040101","mag":"2084470861"},"language":"en","primary_location":{"id":"doi:10.4018/jiscrm.2013040101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jiscrm.2013040101","pdf_url":null,"source":{"id":"https://openalex.org/S4394735749","display_name":"International Journal of Information Systems for Crisis Response and Management","issn_l":"1937-9420","issn":["1937-9420"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Systems for Crisis Response and Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037590981","display_name":"Stefan Weber","orcid":"https://orcid.org/0000-0002-6619-4931"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Stefan G. Weber","raw_affiliation_strings":["UBIN AG, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"UBIN AG, Berlin, Germany","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072790652","display_name":"Prima Gustien\u00e9","orcid":null},"institutions":[{"id":"https://openalex.org/I43968019","display_name":"Karlstad University","ror":"https://ror.org/05s754026","country_code":"SE","type":"education","lineage":["https://openalex.org/I43968019"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Prima Gustien\u00e9","raw_affiliation_strings":["Karlstad Business School, Karlstad University, Karlstad, Sweden"],"affiliations":[{"raw_affiliation_string":"Karlstad Business School, Karlstad University, Karlstad, Sweden","institution_ids":["https://openalex.org/I43968019"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5037590981"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.6179,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.88530233,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"5","issue":"2","first_page":"1","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9843999743461609,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6889995336532593},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6503325700759888},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6073108911514282},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.48298895359039307},{"id":"https://openalex.org/keywords/requirements-elicitation","display_name":"Requirements elicitation","score":0.440989226102829},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4350087642669678},{"id":"https://openalex.org/keywords/requirements-analysis","display_name":"Requirements analysis","score":0.3354616165161133},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.33460450172424316},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.08251601457595825}],"concepts":[{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6889995336532593},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6503325700759888},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6073108911514282},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.48298895359039307},{"id":"https://openalex.org/C45384764","wikidata":"https://www.wikidata.org/wiki/Q838667","display_name":"Requirements elicitation","level":4,"score":0.440989226102829},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4350087642669678},{"id":"https://openalex.org/C59488412","wikidata":"https://www.wikidata.org/wiki/Q187147","display_name":"Requirements analysis","level":3,"score":0.3354616165161133},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.33460450172424316},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.08251601457595825},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/jiscrm.2013040101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jiscrm.2013040101","pdf_url":null,"source":{"id":"https://openalex.org/S4394735749","display_name":"International Journal of Information Systems for Crisis Response and Management","issn_l":"1937-9420","issn":["1937-9420"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Systems for Crisis Response and Management","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jiscra:v:5:y:2013:i:2:p:1-18","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jiscrm.2013040101","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W24729950","https://openalex.org/W125787581","https://openalex.org/W180045574","https://openalex.org/W301118434","https://openalex.org/W1484976599","https://openalex.org/W1488128752","https://openalex.org/W1498029688","https://openalex.org/W1585331908","https://openalex.org/W1599622714","https://openalex.org/W1673429520","https://openalex.org/W1877672271","https://openalex.org/W1927161182","https://openalex.org/W1966363528","https://openalex.org/W1969042806","https://openalex.org/W1969912405","https://openalex.org/W1992175386","https://openalex.org/W1995788981","https://openalex.org/W1996455443","https://openalex.org/W2012909998","https://openalex.org/W2021947635","https://openalex.org/W2081809050","https://openalex.org/W2096524691","https://openalex.org/W2099469593","https://openalex.org/W2100787642","https://openalex.org/W2112915393","https://openalex.org/W2113738519","https://openalex.org/W2119603836","https://openalex.org/W2122959094","https://openalex.org/W2124405605","https://openalex.org/W2130048331","https://openalex.org/W2132523663","https://openalex.org/W2142858126","https://openalex.org/W2146767810","https://openalex.org/W2157521729","https://openalex.org/W2159694746","https://openalex.org/W2167873099","https://openalex.org/W2188726183","https://openalex.org/W2219477711","https://openalex.org/W2304126825","https://openalex.org/W2311094758","https://openalex.org/W2524624957","https://openalex.org/W2773411043","https://openalex.org/W2907076083","https://openalex.org/W2941016799","https://openalex.org/W4232315931","https://openalex.org/W4244750418","https://openalex.org/W4246157826","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2097950940","https://openalex.org/W2472769502","https://openalex.org/W4292814261","https://openalex.org/W2402056828","https://openalex.org/W2181998829","https://openalex.org/W4253611616","https://openalex.org/W3152487049","https://openalex.org/W3143558183","https://openalex.org/W4291197340","https://openalex.org/W2242308721"],"abstract_inverted_index":{"According":[0],"to":[1,32],"fundamental":[2],"principles":[3],"of":[4,12,22,29,60,86,97,128,143],"the":[5,10,26,37,61,69,84,87,124,141],"Privacy":[6,43],"by":[7,46,76],"Design":[8],"approach,":[9],"consultation":[11],"privacy":[13,100],"issues":[14],"should":[15],"be":[16,74],"embedded":[17],"into":[18,112],"analysis":[19],"and":[20,44,52,99,104,126,139],"design":[21],"information":[23],"systems,":[24],"from":[25],"early":[27,70],"stages":[28],"system":[30],"planning":[31],"implementation.":[33],"In":[34],"this":[35,40,65,117],"article,":[36],"authors":[38],"extend":[39],"perspective":[41],"towards":[42],"Security":[45],"Design.":[47],"Exemplary":[48],"focusing":[49],"on":[50],"mobile":[51,103],"pervasive":[53,105,131],"emergency":[54,62,106,136],"response,":[55],"as":[56],"a":[57,77,94,120],"specific":[58],"area":[59],"management":[63,137],"domain,":[64],"article":[66,118],"conveys":[67],"how":[68],"requirements":[71,101],"elicitation":[72,90],"can":[73],"supported":[75],"semantically":[78],"integrated":[79],"conceptual":[80],"modeling":[81],"method.":[82],"Presenting":[83],"results":[85],"exemplary":[88],"executed":[89],"processes,":[91],"it":[92],"contributes":[93],"concrete":[95],"set":[96],"security":[98,115],"for":[102,123],"response":[107,145],"settings.":[108],"By":[109],"also":[110],"taking":[111],"account":[113],"conflicting":[114],"goals,":[116],"provides":[119],"substantial":[121],"grounding":[122],"development":[125],"deployment":[127],"multilaterally":[129],"secure":[130],"ICT":[132],"that":[133],"effectively":[134],"supports":[135],"during":[138],"in":[140],"aftermath":[142],"critical":[144],"missions.":[146]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
