Cyber-specifications: Capturing user requirements for cyber-security investigations

Alex W. Stedmon, Dale Richards, Siraj A. Shaikh, John Huddlestone, Ruairidh Davison

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

In order to capture important user requirements data, it is necessary to take a user-centered approach to understand security from a human factors perspective. Human Factors and Ergonomics are the disciplines that look to support user needs and requirements of products and processes through a detailed understanding of the user's capabilities, limitations and expectation of those products or processes. A range of methods and approaches are available to assist with the collection of user requirements in sensitive domains and this chapter considers practical issues of their use for cyber-security. A framework of macro-ergonomic security threats is reinterpreted for the cyber domain and illustrated using issues of trust in order to raise awareness for cyber investigations.

Original languageEnglish
Title of host publicationCyber Crime and Cyber Terrorism Investigator's Handbook
EditorsBabak Akhgar, Andrew Staniforth, Francesca Bosco
PublisherElsevier
Pages43-58
Number of pages16
ISBN (Electronic)978-0-12-800811-9
ISBN (Print)978-0-12-800743-3
DOIs
Publication statusPublished - 16 Jul 2014

Keywords

  • Cyber-interactions
  • Cyber-ripples
  • Cyber-security
  • End-users
  • Sensitive domains
  • Stakeholders
  • User requirements elicitation

ASJC Scopus subject areas

  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Cyber-specifications: Capturing user requirements for cyber-security investigations'. Together they form a unique fingerprint.

Cite this