Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet59/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   55   56   57   58   59   60   61   62   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

55
 
Conclusion
the context of use. Personas typically provide a profile of a specific user, stakeholder 
or role based on information from a number of sources (e.g., a typical child using 
a chat-room; a parent trying to govern the safety of their child’s on-line presence
a shopper; a person using a home-banking interface). What is then communicated 
is a composite and synthesis of key features within a single profile that can then 
be used as a single point of reference (e.g., Mary is an 8-year-old girl with no clear 
understanding of internet grooming techniques; Malcolm is a 60-year-oldman with 
no awareness of phishing tactics). In some cases personas are given names and back-
ground information such as age, education, recent training courses attended and even 
generic images/photos to make them more realistic or representative of a typical 
user. In other cases, personas are used anonymously in order to communicate generic 
characteristics that may be applicable to a wider demographic.
User requirements elicitation with users working in sensitive domains also pres-
ents issues of personal anonymity and data confidentiality (
Kavali et al., 2005
). In 
order to safeguard these, anonymity and pseudonymity can be used to disguise in-
dividuals, roles and relationships between roles (
Pfitzmann and Hansen, 2005
). In 
this way, identifying features of participants should not be associated with the data 
or approaches should be used that specifically use fictitious personas to illustrate 
and integrate observations across a number of participants. If done correctly, these 
personas can then be used as an effective communication tool without compromising 
the trust that has been built during the elicitation process.
Using a variety of human factors methods provides investigators with a clearer 
understanding how cyber-security, as a process, can operate based on the perspec-
tive of socio-technical systems. Without a range of methods to employ and without 
picking those most suitable for a specific inquiry, there is a danger that the best data 
will be missed. In addition, without using the tools for communicating the findings of 
user requirements activities, the overall process would be incomplete and end-users 
and other stakeholders will miss opportunities to learn about cyber-security and/or 
contribute further insights into their roles. Such approaches allow investigators to 
develop a much better understanding of the bigger picture such as the context and 
wider systems, as well as more detailed understandings of specific tasks and goals.
CONCLUSION
A user-centered approach is essential to understanding cyber-security from a human 
factors perspective. It is also important to understand the context of work and related 
factors contributing to the overall performance of a security system. The adaptation 
of the security framework goes some way in helping to focus attention. However, 
while there are many formal and established methodologies that are in use, it is es-
sential that the practitioner considers the key contextual issues as outlined in this 
chapter before simply choosing a particular methodology. Whilst various methods 
and tools can indeed be helpful in gaining insight into particular aspects of require-
ments elicitation for cyber-security, caution must be at the forefront as a valid model 



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   55   56   57   58   59   60   61   62   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish