Skip to main content
Article thumbnail
Location of Repository

Privacy, security, liberty:informing the design of emergency management information systems

By Monika Buscher, Lisa Wood and Sung-Yueh Perng


Faced with life-threatening circumstances, many people would consider a loss of privacy a small price to pay for swift assistance. However, how societies handle, and how individuals can be aware of, and control, personal data are highly sensitive and consequential matters, deeply entangling security, privacy and liberty with technological potential. The design of emergency management systems (EMIS) and architectures for the assembly of emergency management systems of systems should be sensitive to challenges, opportunities and dangers. In this paper we explore key issues and some design avenues

Publisher: KIT
Year: 2013
OAI identifier:
Provided by: Lancaster E-Prints

Suggested articles


  1. (2010). A framework for the ethical impact assessment of information technology. doi
  2. (2006). A Report on the Surveillance Society - For the Information Commissioner by the Surveillance Studies Network.
  3. (2006). Agility and Discipline: Critical Success Factors for Disaster Response. doi
  4. (2011). Alone Together. doi
  5. (2008). Cities Under Siege: The New Military Urbanism. doi
  6. (2006). Culture of Fear. doi
  7. (2008). Data Mining and the Security-Liberty Debate.
  8. (2007). Data Protection and Sharing – Guidance for Emergency Planners and Responders.
  9. (2009). Disasters, Catastrophes, and Policy Failure in the Homeland Security Era 1. doi
  10. (1977). Discipline and Punish. doi
  11. (2012). Domain Analysis - Interoperability and Integration. Bridge project Deliverable D2.2. Available from the authors
  12. (2007). Emergency Response Information Systems Emerging Trends and technologies. doi
  13. (2007). Emergent Interoperability: Collaborative Adhocracies and Mix and Match Technologies in Emergency Management. doi
  14. (2009). Facing airport security: affect, biopolitics, and the preemptive securitisation of the mobile body. Environment and Planning D: Society and Space, doi
  15. (2006). Forgetting as a feature, not a bug: the duality of memory and implications for ubiquitous computing. doi
  16. (2002). From personal to digital: CCTV, the panopticon, and the technological mediation of suspicion and social control. In
  17. (2011). Improved response to disasters and outbreaks by tracking ppulation movements with mobile phone network data: a post-earthquake geospatial study in Haiti. doi
  18. (2008). Information accountability. doi
  19. (2010). Information Systems for Emergency Management. doi
  20. (2010). Interoperability In a crisis. Human Factors and Organisational Processes.
  21. (2010). Locational Privacy in Public Spaces: Media Discourses on Location-Aware Mobile Technologies. doi
  22. (2006). Metaphors Matter: Disaster Myths, Media Frames, and Their Consequences in Hurricane Katrina. doi
  23. (2003). Mobile Transformations of `Public’ and `Private' doi
  24. (1989). Modernity and the Holocaust. doi
  25. (2004). of Homeland Security. doi
  26. (2007). Outlines of a world coming into existence: pervasive computing and the ethics of forgetting. doi
  27. (2009). Privacy impact assessment: Its origins and development. doi
  28. (2012). Privacy Impact Assessment. doi
  29. (2009). Privacy in Context: Technology, Policy, and the Integrity of Social Life. doi
  30. (1976). Privacy: a conceptual analysis. doi
  31. (2012). Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data
  32. (2012). Safeguarding Privacy in a Connected World. A European Data Protection Framework for the 21st Century.
  33. (2007). Sentient cities ambient intelligence and the politics of urban space. doi
  34. (2011). Smarter Cities and Their Innovation Challenges. doi
  35. (2005). State of Exception. Chicago: doi
  36. (2011). Summary: USA PATRIOT Act series.
  37. (2006). Survey Article: Emergency Powers and the Rule of Law After 9/11*. doi
  38. (2009). Taking account of privacy when designing cloud computing services. doi
  39. (2001). Taking Care of Business: Privacy by Design.
  40. (2003). The design of a dynamic emergency response management information system (DERMIS).
  41. (2004). The Origins of Totalitarianism. doi
  42. (1890). The Right to Privacy. Harvard Law Review, doi
  43. (2006). Transparent Accountable Data Mining: New Strategies for Privacy Protection. Artificial Intelligence.
  44. (2003). Unpacking “privacy” for a networked world. doi

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.