Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet52/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   48   49   50   51   52   53   54   55   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

48
CHAPTER 5
User requirements for cyber-security investigations
wider ethical issues of security research and in relation to cyber investigations, the 
balance between public safety and the need for security interventions (
Iphofen, in 
print; Kavakli et al., 2005
).
Aspects of privacy and confidentiality underpin many of the ethical challenges of 
user requirements elicitation, where investigators must ensure that:
• End-users and stakeholders are comfortable with the type of information they 
are sharing and how the information might be used.
• End-users are not required to breach any agreements and obligations with their 
employers or associated organizations.
In many ways these ethical concerns are governed by Codes of Conduct that are 
regulated by professional bodies such as the British Psychological Society (BPS) 
but it is important that investigators clearly identify the purpose of an investigation 
and set clear and legitimate boundaries for intended usage and communication of 
collected data.
The macro-approach is in contrast to micro-ergonomics, which traditionally fo-
cuses on the interaction of a single user and their immediate technology use (
Reiman 
and Väyrynen, 2011
). This has often been a starting point for traditional human fac-
tors approaches; however by understanding macro-level issues, the complexity of 
socio-technical factors can be translated into micro-level factors for more detailed 
analysis (
Kleiner, 2006
). For example, 
Kraemer et al. (2009)
explored issues in secu-
rity screening and inspection of cargo and passengers by taking a macro-ergonomics 
approach. A five-factor framework was proposed that contributes to the “stress load” 
of frontline security workers in order to assess and predict individual performance 
as part of the overall security system (
Figure 5.2
). This was achieved by identifying 
the interactions between: organizational factors (e.g., training, management support, 
and shift structure), user characteristics (i.e., the human operator’s cognitive skills, 

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   48   49   50   51   52   53   54   55   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish