O'Reilly logo

Strategic Intelligence Management by Simeon Yates, Babak Akhgar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11

User Requirements and Training Needs within Security Applications

Methods for Capture and Communication

Alex W. Stedmon, Rose Saikayasit, Glyn Lawson and Peter Fussey

User requirements elicitation

Understanding the valuable tacit knowledge and expertise of end users and other stakeholders is fundamental to the general acceptance, successful use, and overall effectiveness of new training programs, procedures, and technological solutions (Wilson, 1995). From a human factors perspective this translates into user-centered approaches in which a variety of methods have been applied in research areas as wide as healthcare, product design, human–computer interaction and, more recently, security and counterterrorism (Saikayasit, et al., 2012 ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required