2013
DOI: 10.1007/s11896-013-9129-7
|View full text |Cite
|
Sign up to set email alerts
|

User Requirements Elicitation in Security and Counter-Terrorism: A Human Factors Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…The human factors approach has made extensive and effective use of established social science methods such as questionnaires, surveys, interviews, focus groups, observations and ethnographic reviews and formal task or link analyses that can be used as the foundations to knowledge elicitation (Crabtree et al, 2003;Preece, Rogers, & Sharp, 2007). These methods provide different opportunities for interaction between the investigator and target audience, and hence provide different types and levels of data (Saikayasit et al, 2012). A range of complementary methods are often selected to enhance the detail of the issues explored.…”
Section: Knowledge Elicitation Methodsmentioning
confidence: 99%
“…The human factors approach has made extensive and effective use of established social science methods such as questionnaires, surveys, interviews, focus groups, observations and ethnographic reviews and formal task or link analyses that can be used as the foundations to knowledge elicitation (Crabtree et al, 2003;Preece, Rogers, & Sharp, 2007). These methods provide different opportunities for interaction between the investigator and target audience, and hence provide different types and levels of data (Saikayasit et al, 2012). A range of complementary methods are often selected to enhance the detail of the issues explored.…”
Section: Knowledge Elicitation Methodsmentioning
confidence: 99%
“…Many scholars have argued that trust is a prerequisite for successful cyber security. In many areas of security, "Man in the system" is often an important line of defense to identify, prevent, and respond to any threat (1). Traditionally, this area is concentrated in the real world, ranging from mainstream public safety in crowded spaces and border control, through the identification of suspicious behavior, hostile identify and implement counter-terrorism initiatives.…”
Section: Introductionmentioning
confidence: 99%
“…The applied nature of Human Factors has only recently started to be incorporated into security research by combining aspects of applied psychology, systems design, and user experience approaches within the security domain (Saikayasit et al, 2013). In order to tackle hostile intent (in all its guises from low-level criminal behaviours through to large-scale terrorist attacks) and develop a socio-technical perspective for security solutions, Human Factors approaches have sought to integrate empirical research with applied methods and approaches grounded in the practical issues faced by security personnel in the field.…”
mentioning
confidence: 99%