Chapter 11

User Requirements and Training Needs within Security Applications

Methods for Capture and Communication

Alex W. Stedmon, Rose Saikayasit, Glyn Lawson and Peter Fussey

User requirements elicitation

Understanding the valuable tacit knowledge and expertise of end users and other stakeholders is fundamental to the general acceptance, successful use, and overall effectiveness of new training programs, procedures, and technological solutions (Wilson, 1995). From a human factors perspective this translates into user-centered approaches in which a variety of methods have been applied in research areas as wide as healthcare, product design, human–computer interaction and, more recently, security and counterterrorism (Saikayasit, et al., 2012 ...

Get Strategic Intelligence Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.