Cyber-specifications: Capturing user requirements for cyber-security investigations

Alex W. Stedmon, Dale Richards, Siraj A. Shaikh, John Huddlestone, Ruairidh Davison

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

In order to capture important user requirements data, it is necessary to take a user-centered approach to understand security from a human factors perspective. Human Factors and Ergonomics are the disciplines that look to support user needs and requirements of products and processes through a detailed understanding of the user's capabilities, limitations and expectation of those products or processes. A range of methods and approaches are available to assist with the collection of user requirements in sensitive domains and this chapter considers practical issues of their use for cyber-security. A framework of macro-ergonomic security threats is reinterpreted for the cyber domain and illustrated using issues of trust in order to raise awareness for cyber investigations.

Original languageEnglish
Title of host publicationCyber Crime and Cyber Terrorism Investigator's Handbook
EditorsBabak Akhgar, Andrew Staniforth, Francesca Bosco
PublisherElsevier
Pages43-58
Number of pages16
ISBN (Electronic)978-0-12-800811-9
ISBN (Print)978-0-12-800743-3
DOIs
Publication statusPublished - 16 Jul 2014

Fingerprint

Ergonomics
Human engineering
Specifications
Macros

Keywords

  • Cyber-interactions
  • Cyber-ripples
  • Cyber-security
  • End-users
  • Sensitive domains
  • Stakeholders
  • User requirements elicitation

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Stedmon, A. W., Richards, D., Shaikh, S. A., Huddlestone, J., & Davison, R. (2014). Cyber-specifications: Capturing user requirements for cyber-security investigations. In B. Akhgar, A. Staniforth, & F. Bosco (Eds.), Cyber Crime and Cyber Terrorism Investigator's Handbook (pp. 43-58). Elsevier. https://doi.org/10.1016/B978-0-12-800743-3.00005-0

Cyber-specifications : Capturing user requirements for cyber-security investigations. / Stedmon, Alex W.; Richards, Dale; Shaikh, Siraj A.; Huddlestone, John; Davison, Ruairidh.

Cyber Crime and Cyber Terrorism Investigator's Handbook. ed. / Babak Akhgar; Andrew Staniforth; Francesca Bosco. Elsevier, 2014. p. 43-58.

Research output: Chapter in Book/Report/Conference proceedingChapter

Stedmon, AW, Richards, D, Shaikh, SA, Huddlestone, J & Davison, R 2014, Cyber-specifications: Capturing user requirements for cyber-security investigations. in B Akhgar, A Staniforth & F Bosco (eds), Cyber Crime and Cyber Terrorism Investigator's Handbook. Elsevier, pp. 43-58. https://doi.org/10.1016/B978-0-12-800743-3.00005-0
Stedmon AW, Richards D, Shaikh SA, Huddlestone J, Davison R. Cyber-specifications: Capturing user requirements for cyber-security investigations. In Akhgar B, Staniforth A, Bosco F, editors, Cyber Crime and Cyber Terrorism Investigator's Handbook. Elsevier. 2014. p. 43-58 https://doi.org/10.1016/B978-0-12-800743-3.00005-0
Stedmon, Alex W. ; Richards, Dale ; Shaikh, Siraj A. ; Huddlestone, John ; Davison, Ruairidh. / Cyber-specifications : Capturing user requirements for cyber-security investigations. Cyber Crime and Cyber Terrorism Investigator's Handbook. editor / Babak Akhgar ; Andrew Staniforth ; Francesca Bosco. Elsevier, 2014. pp. 43-58
@inbook{3124abb214d44e02aaca29c275094337,
title = "Cyber-specifications: Capturing user requirements for cyber-security investigations",
abstract = "In order to capture important user requirements data, it is necessary to take a user-centered approach to understand security from a human factors perspective. Human Factors and Ergonomics are the disciplines that look to support user needs and requirements of products and processes through a detailed understanding of the user's capabilities, limitations and expectation of those products or processes. A range of methods and approaches are available to assist with the collection of user requirements in sensitive domains and this chapter considers practical issues of their use for cyber-security. A framework of macro-ergonomic security threats is reinterpreted for the cyber domain and illustrated using issues of trust in order to raise awareness for cyber investigations.",
keywords = "Cyber-interactions, Cyber-ripples, Cyber-security, End-users, Sensitive domains, Stakeholders, User requirements elicitation",
author = "Stedmon, {Alex W.} and Dale Richards and Shaikh, {Siraj A.} and John Huddlestone and Ruairidh Davison",
year = "2014",
month = "7",
day = "16",
doi = "10.1016/B978-0-12-800743-3.00005-0",
language = "English",
isbn = "978-0-12-800743-3",
pages = "43--58",
editor = "Babak Akhgar and Andrew Staniforth and Francesca Bosco",
booktitle = "Cyber Crime and Cyber Terrorism Investigator's Handbook",
publisher = "Elsevier",
address = "Netherlands",

}

TY - CHAP

T1 - Cyber-specifications

T2 - Capturing user requirements for cyber-security investigations

AU - Stedmon, Alex W.

AU - Richards, Dale

AU - Shaikh, Siraj A.

AU - Huddlestone, John

AU - Davison, Ruairidh

PY - 2014/7/16

Y1 - 2014/7/16

N2 - In order to capture important user requirements data, it is necessary to take a user-centered approach to understand security from a human factors perspective. Human Factors and Ergonomics are the disciplines that look to support user needs and requirements of products and processes through a detailed understanding of the user's capabilities, limitations and expectation of those products or processes. A range of methods and approaches are available to assist with the collection of user requirements in sensitive domains and this chapter considers practical issues of their use for cyber-security. A framework of macro-ergonomic security threats is reinterpreted for the cyber domain and illustrated using issues of trust in order to raise awareness for cyber investigations.

AB - In order to capture important user requirements data, it is necessary to take a user-centered approach to understand security from a human factors perspective. Human Factors and Ergonomics are the disciplines that look to support user needs and requirements of products and processes through a detailed understanding of the user's capabilities, limitations and expectation of those products or processes. A range of methods and approaches are available to assist with the collection of user requirements in sensitive domains and this chapter considers practical issues of their use for cyber-security. A framework of macro-ergonomic security threats is reinterpreted for the cyber domain and illustrated using issues of trust in order to raise awareness for cyber investigations.

KW - Cyber-interactions

KW - Cyber-ripples

KW - Cyber-security

KW - End-users

KW - Sensitive domains

KW - Stakeholders

KW - User requirements elicitation

U2 - 10.1016/B978-0-12-800743-3.00005-0

DO - 10.1016/B978-0-12-800743-3.00005-0

M3 - Chapter

SN - 978-0-12-800743-3

SP - 43

EP - 58

BT - Cyber Crime and Cyber Terrorism Investigator's Handbook

A2 - Akhgar, Babak

A2 - Staniforth, Andrew

A2 - Bosco, Francesca

PB - Elsevier

ER -