Presentation is loading. Please wait.

Presentation is loading. Please wait.

STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Alex W. Stedmon, Rose Saikayasit, Glyn Lawson, Peter Fussey Chapter 11 - User Requirements and Training Needs.

Similar presentations


Presentation on theme: "STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Alex W. Stedmon, Rose Saikayasit, Glyn Lawson, Peter Fussey Chapter 11 - User Requirements and Training Needs."— Presentation transcript:

1 STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Alex W. Stedmon, Rose Saikayasit, Glyn Lawson, Peter Fussey Chapter 11 - User Requirements and Training Needs within Security Applications: Methods for Capture and Communication, Pg. 120

2 11. User Requirements and Training Needs within Security Applications: Methods for Capture and Communication, Pg. 120 Understanding the valuable tacit knowledge and expertise of end users and other stakeholders is fundamental to the general acceptance, successful use, and overall effectiveness of new training programs, procedures, and technologies (Wilson, 1995). A fundamental issue in developing successful solutions is the correct identification of user requirements that are then revisited in an iterative manner throughout the design process. Alongside this, it is important to clarify specific “contexts of use” for proposed solutions as this provides design boundaries as well as frames of reference for communicating issues back to end users and other stakeholders. This chapter presents aspects of a user requirements elicitation exercise that was conducted as part of the “Shades of Grey” security consortium funded by the Engineering and Physical Sciences Research Council. Section 3: Technologies, Information, and Knowledge for National Security

3 11. User Requirements and Training Needs within Security Applications: Methods for Capture and Communication, Pg. 120 Methods for identifying and gathering user needs in the security domain are relatively underdeveloped and little research exists on understanding the work of security personnel and systems, A series of user requirements elicitation exercises were conducted at a UK entertainment venue (referred to as “Venue X”). Venue X was recruited using a snowball sampling method, developed from an introduction by a local Counter-Terrorism Security Advisor (CTSA). The data collected throughout this case study provided evidence toward the emerging themes in terms of team interactions and security. This information was then presented in different formats back to Venue X to develop their understanding of security at the venue and elicit future training needs to support their current approaches in empowering the staff at all levels. Section 3: Technologies, Information, and Knowledge for National Security


Download ppt "STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Alex W. Stedmon, Rose Saikayasit, Glyn Lawson, Peter Fussey Chapter 11 - User Requirements and Training Needs."

Similar presentations


Ads by Google