Research Repository

User Requirements for Security and Counter-terrorism Initiatives

Saikayasit, R and Stedmon, A and Lawson, G and Fussey, P (2012) 'User Requirements for Security and Counter-terrorism Initiatives.' In: Salvendy, G and Karwowski, W, (eds.) Advances in Social and Organizational Factors. Advances in Human Factors and Ergonomics Series . CRC Press, 256 - 268. ISBN 9781439870198

Full text not available from this repository.


The involvement of end-users and stakeholders in the development of a product or process is considered essential as their reactions, interactions, use and acceptance dictate the effectiveness, success and the overall performance of am implementation. End-user and stakeholder involvement has been adopted as part of user-centered design methodology in many fields such as healthcare. health and safety, product design and human-computer interaction. This paper describes the application of user requirements gathering methods from existing human factors techniques and discusses the specific issues and challenges of requirements generation in the sensitive domain of security and counter-terrorism. The knowledge was gained during the development of design specifications for a suite of interventions for two distinct end-user groups: front-line security personnel and top-level security agencies. A case study is presented of the user requirements elicitation conducted at a major entertainment venue. Furthermore. key emergent themes were identified and are reported.

Item Type: Book Section
Uncontrolled Keywords: user requirements; security and counter-terrorism; end-user and resource management; sensitive domains
Subjects: H Social Sciences > H Social Sciences (General)
H Social Sciences > HD Industries. Land use. Labor > HD61 Risk Management
Divisions: Faculty of Social Sciences > Sociology, Department of
Depositing User: Jim Jamieson
Date Deposited: 21 Dec 2012 10:04
Last Modified: 17 Aug 2017 18:04

Actions (login required)

View Item View Item