Saikayasit, R and Stedmon, A and Lawson, G and Fussey, P (2012) User Requirements for Security and Counter-terrorism Initiatives. In: Advances in Social and Organizational Factors. Advances in Human Factors and Ergonomics Series . CRC Press, pp. 256-268. ISBN 9781439870198. Official URL: http://dx.doi.org/10.1201/b12314
Saikayasit, R and Stedmon, A and Lawson, G and Fussey, P (2012) User Requirements for Security and Counter-terrorism Initiatives. In: Advances in Social and Organizational Factors. Advances in Human Factors and Ergonomics Series . CRC Press, pp. 256-268. ISBN 9781439870198. Official URL: http://dx.doi.org/10.1201/b12314
Saikayasit, R and Stedmon, A and Lawson, G and Fussey, P (2012) User Requirements for Security and Counter-terrorism Initiatives. In: Advances in Social and Organizational Factors. Advances in Human Factors and Ergonomics Series . CRC Press, pp. 256-268. ISBN 9781439870198. Official URL: http://dx.doi.org/10.1201/b12314
Abstract
The involvement of end-users and stakeholders in the development of a product or process is considered essential as their reactions, interactions, use and acceptance dictate the effectiveness, success and the overall performance of am implementation. End-user and stakeholder involvement has been adopted as part of user-centered design methodology in many fields such as healthcare. health and safety, product design and human-computer interaction. This paper describes the application of user requirements gathering methods from existing human factors techniques and discusses the specific issues and challenges of requirements generation in the sensitive domain of security and counter-terrorism. The knowledge was gained during the development of design specifications for a suite of interventions for two distinct end-user groups: front-line security personnel and top-level security agencies. A case study is presented of the user requirements elicitation conducted at a major entertainment venue. Furthermore. key emergent themes were identified and are reported.
Item Type: | Book Section |
---|---|
Uncontrolled Keywords: | user requirements; security and counter-terrorism; end-user and resource management; sensitive domains |
Subjects: | H Social Sciences > H Social Sciences (General) H Social Sciences > HD Industries. Land use. Labor > HD61 Risk Management |
Divisions: | Faculty of Social Sciences Faculty of Social Sciences > Sociology and Criminology, Department of |
SWORD Depositor: | Unnamed user with email elements@essex.ac.uk |
Depositing User: | Unnamed user with email elements@essex.ac.uk |
Date Deposited: | 21 Dec 2012 10:04 |
Last Modified: | 25 Oct 2024 00:07 |
URI: | http://repository.essex.ac.uk/id/eprint/4801 |