Privacy, security, liberty: Informing the design of EMIS

Monika Buscher, Lisa Wood, Sung-Yueh Perng

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

This paper explores issues of security, privacy and liberty arising in relation to ICT supported emergency management. The aim is to inform the design of emergency management information systems (EMIS) and architectures that support emergent interoperability and assembly of emergency management systems of systems. We show how transformations of social and material practices of privacy boundary management create challenges, opportunities and dangers in this context. While opportunities include development of more efficient and agile emergency management models, building on smart city concepts, dangers include surveillance, social sorting and an erosion of civil liberties. Against this backdrop, we briefly explore human practice focused 'privacy by design' as a candidate design avenue.

Original languageEnglish
Title of host publicationISCRAM 2013 Conference Proceedings - 10th International Conference on Information Systems for Crisis Response and Management
PublisherKarlsruher Institut fur Technologie (KIT)
Pages401-410
Number of pages10
ISBN (Print)9783923704804
StatePublished - 12 May 2013
Event10th International Conference on Information Systems for Crisis Response and Management, ISCRAM 2013 - Baden-Baden, Germany
Duration: 12 May 201315 May 2013

Publication series

NameISCRAM 2013 Conference Proceedings - 10th International Conference on Information Systems for Crisis Response and Management

Conference

Conference10th International Conference on Information Systems for Crisis Response and Management, ISCRAM 2013
Country/TerritoryGermany
CityBaden-Baden
Period12/05/1315/05/13

Keywords

  • Emergency management information systems (EMIS)
  • Liberty
  • Privacy
  • Security

Fingerprint

Dive into the research topics of 'Privacy, security, liberty: Informing the design of EMIS'. Together they form a unique fingerprint.

Cite this