Cargando…

User Requirements for Wireless.

In most IT system development processes, the identification or elicitation of user requirements is recognized as a key building block. In practice, the identification of user needs and wants is a challenge and inadequate or faulty identifications in this step of an IT system development can cause hu...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Sørensen, Lene
Otros Autores: Skouby, Knud Erik
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Aalborg : River Publishers, 2015.
Colección:River Publishers series in communications.
Temas:
Acceso en línea:Texto completo
Descripción
Sumario:In most IT system development processes, the identification or elicitation of user requirements is recognized as a key building block. In practice, the identification of user needs and wants is a challenge and inadequate or faulty identifications in this step of an IT system development can cause huge problems with the final product. The elicitation of user requirements as such changes according to age groups;, to gender,; to cultural settings,; and into time; and experience in the use of the system/software. User requirements, therefore, cannot be used between projects, IT systems, and different software. That makes the elicitation of user requirements an inherent part of any software development project and a resourceful activity as well. This book provides insights to the process of identifying user requirements and to different types by describing varying case studies in which technologies or software has been developed. A variety of user requirements are provided illustrating the effect of changing the targeted user group with respect to age,; to the context and the different technologies or software as well as to the difference in viewpoint on ways of involving users in the elicitation process. Cases and user requirement elements discussed in the book include: User requirements elicitation processes for children, construction workers, and farmers User requirements for personalized services of a broadcast company Variations in user involvement Practical elements of user involvement and requirements elicitation Usable security requirements for design of privacy.
Notas:5.5.4 User Authentication and Mutual Authentication in Most/All Transactions.
Descripción Física:1 online resource (135 pages)
Bibliografía:References5. Security and Usability; 5.1 What is Usable Security?; 5.2 Background; 5.2.1 Usability Status; 5.2.1.1 Usability in mobile communication; 5.2.1.2 Usability in other systems; 5.2.2 Security Status; 5.2.2.1 Security of mobile communication system; 5.2.2.2 Internet security; 5.2.3 Security in the Future; 5.3 Stakeholders; 5.3.1 Individual Users; 5.3.2 Corporate Users; 5.3.3 Developers; 5.3.4 System Administrators; 5.3.5 Network Operators; 5.3.6 Manufacturers; 5.3.7 Service Providers; 5.3.8 Regulators; 5.3.9 Government Agencies; 5.3.10 Certification Authorities; 5.3.11 Insurers.
ISBN:9788793237612
8793237618
9781003339977
1003339972
9781000793321
100079332X
9781000796094
1000796094