56
CHAPTER 5
User requirements for cyber-security investigations
for eliciting such data does not exist specifically for cyber-security at present. At the
moment, investigations rely on the experience, understanding and skill of the inves-
tigator in deciding which approach is best to adopt in order to collect robust data that
can then be fed back into the system process.
ACKNOWLEDGMENT
Aspects of the work presented in this chapter were supported by the Engineering and
Physical Sciences Research Council (EPSRC) as part of the “Shades of Grey” project (EP/
H02302X/1).
REFERENCES
Beldad, A., de Jong, M., Steehouder, M., 2010. How shall I trust the faceless and the intan-
gible? A literature review on the antecedents of online trust. Comput. Hum. Behav. 26,
857–869.
Biernacki, P., Waldorf, D., 1981. Snowball sampling. Problems and techniques of chain refer-
ral sampling. Sociol. Methods Res. 10 (2), 141–163.
Blandford, A., Rugg, G., 2002. A case study on integrating contextual information with ana-
lytical usability evaluation. Int. J. Hum.-Comput. Stud. 57, 75–99.
Boyd, J., 2003. The rhetorical construction of trust online. Commun. Theory 13 (4), 392–410.
Cerone, A., Shaikh, S.A., 2008. Formal analysis of security in interactive systems. In: Gupta,
M., Sharman, R. (Eds.), Handbook of Research on Social and Organizational Liabilities in
Information Security. IGI-Global, pp. 415–432 (Chapter 25).
Cooke, N.J., Winner, J.L., 2008. Human factors of homeland security. In: Boehm-Davis, D.A.
(Ed.), Reviews of Human Factors and Ergonomics, vol. 3. Human Factors and Ergonomics
Society, Santa Monica, CA, pp. 79–110.
Coughlan, J., Macredie, R.D., 2002. Effective communication in requirements elicitation: a
comparison of methodologies. Requirements Eng. 7, 47–60.
Crabtree, A., Hemmings, T., Rodden, T., Cheverst, K., Clarke, K., Dewsbury, G., Huges, J.,
Rouncefield, M., 2003. Designing with care: adapting cultural probes to inform design in
sensitive settings. Proc. OzCHI 2003, 4–13.
Eason, K., 1987. Information Technology and Organizational Change. Taylor and Francis,
London.
Freeman, L.A., Jessup, L.M., 2004. The power and benefits of concept mapping: measuring
use, usefulness, ease of use, and satisfaction. Int. J. Sci. Educ. 26 (2), 151–169.
Friedrich, W.R., van der Poll, J.A., 2007. Towards a methodology to elicit tacit domain knowl-
edge from users. Interdisciplinary J. Inf. Knowl. Manage. 2, 179–193.
Gaver, B., Dunne, T., Pacenti, E., 1999. Design: cultural probes. Interaction 6 (1), 21–29.
Haas, D.F., Deseran, F.A., 1981. Trust and symbolic exchange. Social Psychol. Q. 44 (1), 3–13.
Hancock, P.A., Hart, S.G., 2002. Defeating terrorism: what can human factors/ergonomics
offer? Ergonomics Design 10, 6–16.
Iphofen, R., in print. Ethical issues in surveillance and privacy. In: Stedmon, A.W., Lawson, G.
(Eds.), Hostile Intent and Counter-Terrorism: Human Factors Theory and Application.
Ashgate, Aldershot.
Do'stlaringiz bilan baham: |