Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet57/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   53   54   55   56   57   58   59   60   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

53
 
Capturing and communicating user requirements
sensitive of broadcasting any systemic vulnerabilities which may be perceived by the 
public as a lack of security awareness or exploited by competitors looking for mar-
ketplace leverage. Such domains add further complications to ultimately reporting 
findings to support the wider understanding of user needs in these domains (
Crabtree 
et al., 2003; Lawson et al., 2009
).
CAPTURING AND COMMUNICATING USER REQUIREMENTS
There are a number of human factors methods such as questionnaires, surveys, in-
terviews, focus groups, observations and ethnographic reviews, and formal task or 
link analyses that can be used as the foundations to user requirements elicitation 
(
Crabtree et al., 2003; Preece et al., 2007
). These methods provide different opportu-
nities for interaction between the investigator and target audience, and hence provide 
different types and levels of data (
Saikayasit et al., 2012
). A range of complementary 
methods are often selected to enhance the detail of the issues explored. For example, 
interviews and focus groups might be employed to gain further insights or highlight 
problems that have been initially identified in questionnaires or surveys. In compari-
son to direct interaction between the investigator and participant (e.g., interviews) 
indirect methods (e.g., questionnaires) can reach a larger number of respondents and 
are cheaper to administer, but are not efficient for probing complicated issues or tacit 
knowledge (
Sinclair, 2005
).
Focus groups can also be used, where the interviewer acts as a group organizer
facilitator and prompter, to encourage discussion across several issues around pre-
defined themes (
Sinclair, 2005
). However, focus groups can be costly and difficult 
to arrange depending on the degree of anonymity required by each of the partici-
pants. They are also notoriously “hit and miss” depending on the availability of 
Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   53   54   55   56   57   58   59   60   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish