Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet53/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   49   50   51   52   53   54   55   56   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

Threats to security
Organizational factors
User
Operational environment
Security tasks
Security technologies
Human
performance
Outcomes
1. High
(e.g., multiple tasks,
speed of
communications)
1. Enhanced
security capability
2. Positive public
experience
3. Threat detection
2. Low
(e.g., unintentional
and intentional
mistakes)
FIGURE 5.2
Macro-ergonomic conceptual framework for security.
Adapted from 
Kraemer et al., 2009
.


49
 
Balancing technological and human capabilities
training), security technologies (e.g., the performance and usability of technologies 
used), and security tasks (e.g., task loading and the operational environment).
The central factor of the framework is the user (e.g., the frontline security operator
screener, inspector) who has specific skills within the security system. The security 
operator is able to use technologies and tools to perform a variety of security screen-
ing tasks that support the overall security capability. However these are influenced 
by task and workload factors (e.g., overload/under load/task monotony/repetition). 
In addition, organizational factors (e.g., training, management support, culture and 
organizational structures) as well as the operational environment (e.g., noise, climate, 
and temperature) also contribute to the overall security capability. This approach helps 
identify the macro-ergonomic factors where the complexity of the task and resulting 
human performance within the security system may include errors (e.g., missed threat 
signals and false positives) or violations (e.g., compromised or adapted protocols in 
response to the dynamic demands of the operational environment) (
Kraemer et al., 
2009
). This macro-ergonomic framework has been used to form a basis for under-
standing user requirements within counter-terrorism focusing on the interacting fac-
tors and their influence of overall performance of security systems including users and 
organizational processes (
Saikayasit et al., 2012; Stedmon et al., 2013
).
This framework provides a useful perspective on cyber-security and can be re-
drawn to embody a typical user and provides a basis for exploring user requirements 
(
Figure 5.3
).
In this way, cyber-security can be understood in terms of the user (e.g., adult or 
child) who has a range of skills but also presents vulnerabilities within the overall 
cyber-security security system (e.g., a child may not know the exact identity of some-
one who befriends them in a chat-room; an adult may not realize the significance of 
imparting details about a relative to friends on a social networking site; a lonely per-
son may be susceptible to others people’s approaches on the pretext of friendship). 
The user has a range of technologies and tools to perform a variety of tasks, some 

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   49   50   51   52   53   54   55   56   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish