3
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Alex W. Stedmon, Rose Saikayasit, Glyn Lawson, Peter Fussey Chapter 11 - User Requirements and Training Needs within Security Applications: Methods for Capture and Communication, Pg. 120

STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Alex W. Stedmon, Rose Saikayasit, Glyn Lawson, Peter Fussey Chapter 11 - User Requirements and Training Needs

Embed Size (px)

Citation preview

Page 1: STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Alex W. Stedmon, Rose Saikayasit, Glyn Lawson, Peter Fussey Chapter 11 - User Requirements and Training Needs

STRATEGIC INTELLIGENCE MANAGEMENT

Chapter by Alex W. Stedmon, Rose Saikayasit, Glyn Lawson, Peter Fussey

Chapter 11 - User Requirements and Training Needs within Security Applications: Methods for Capture and Communication, Pg. 120

Page 2: STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Alex W. Stedmon, Rose Saikayasit, Glyn Lawson, Peter Fussey Chapter 11 - User Requirements and Training Needs

• 11. User Requirements and Training Needs within Security Applications: Methods for Capture and Communication, Pg. 120

• Understanding the valuable tacit knowledge and expertise of end users and other stakeholders is fundamental to the general acceptance, successful use, and overall effectiveness of new training programs, procedures, and technologies (Wilson, 1995).

• A fundamental issue in developing successful solutions is the correct identification of user requirements that are then revisited in an iterative manner throughout the design process. Alongside this, it is important to clarify specific “contexts of use” for proposed solutions as this provides design boundaries as well as frames of reference for communicating issues back to end users and other stakeholders.

• This chapter presents aspects of a user requirements elicitation exercise that was conducted as part of the “Shades of Grey” security consortium funded by the Engineering and Physical Sciences Research Council.

Section 3: Technologies, Information, and Knowledge for

National Security

Page 3: STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Alex W. Stedmon, Rose Saikayasit, Glyn Lawson, Peter Fussey Chapter 11 - User Requirements and Training Needs

• 11. User Requirements and Training Needs within Security Applications: Methods for Capture and Communication, Pg. 120

• Methods for identifying and gathering user needs in the security domain are relatively underdeveloped and little research exists on understanding the work of security personnel and systems,

• A series of user requirements elicitation exercises were conducted at a UK entertainment venue (referred to as “Venue X”). Venue X was recruited using a snowball sampling method, developed from an introduction by a local Counter-Terrorism Security Advisor (CTSA).

• The data collected throughout this case study provided evidence toward the emerging themes in terms of team interactions and security. This information was then presented in different formats back to Venue X to develop their understanding of security at the venue and elicit future training needs to support their current approaches in empowering the staff at all levels.

Section 3: Technologies, Information, and Knowledge for

National Security