Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet55/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   51   52   53   54   55   56   57   58   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

51
 
Conducting user requirements elicitation
These factors can be related back to the cyber-security framework in order to high-
light key issues for user requirements investigations (
Table 5.1
).
Using the cyber-security framework to identify potential user requirements issues 
is an important part of specifying cyber-specifications. However, in order to capture 
meaningful data it is also important to consider the range of methods that are avail-
able. The use of formal methods in verifying the correctness of interactive systems 
should also include analysis of human behavior in interacting with the interface and 
must take into account all relationships between user’s actions, user’s goals, and the 
environment (
Cerone and Shaikh, 2008
).
CONDUCTING USER REQUIREMENTS ELICITATION
As previously discussed, whilst methods exist for identifying and gathering user 
needs in the security domain, they are relatively underdeveloped. It is only in the 
last decade that security aspects of interactive systems have been started to be sys-
tematically analyzed (
Cerone and Shaikh, 2008
); however, little research has been 
published on understanding the work of security personnel and systems which 
leads to the lack of case studies or guidance on how methods can be adopted or 
have been used in different security settings (
Hancock and Hart, 2002; Kraemer 
et al., 2009
). As a result it is necessary to revisit the fundamental issues of con-
ducting user requirements elicitation that can then be applied to security research.
Table 5.1 
Using the Cyber-Security Framework to Map Issues of Cyber-Trust
Factors
System Characteristics
Service provider factors
• Privacy, assurance and security features
• Robustness
• Fail safe characteristics (or redundancy)
User characteristics
• Propensity to trust/confidence
• Experience and proficiency in internet usage
• Expectation of what is being provided
• Levels of awareness about cyber-security threats
Security tools
• Social presence cues
• Customization and personalization capacity
• Constrained interfaces that allow free use (e.g., 
ability to convey details over a secure network)
• Dynamic nature should be seamless (and pervasive)
Security tasks
• User interface has high degree of usability
• Explicit security characteristics
• Information quality/quantity/timeliness
• Graphical characteristics
Operational environment
• Experience and familiarity with the online company
• Ease of use in different contexts of use
• Communicating different threat levels



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   51   52   53   54   55   56   57   58   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish