User Requirements and Training Needs within Security Applications
Methods for Capture and Communication
Alex W. Stedmon, Rose Saikayasit, Glyn Lawson and Peter Fussey
User requirements elicitation
Understanding the valuable tacit knowledge and expertise of end users and other stakeholders is fundamental to the general acceptance, successful use, and overall effectiveness of new training programs, procedures, and technological solutions (Wilson, 1995). From a human factors perspective this translates into user-centered approaches in which a variety of methods have been applied in research areas as wide as healthcare, product design, human–computer interaction and, more recently, security and counterterrorism (Saikayasit, et al., 2012 ...