In most IT system development processes, the identification or elicitation of user requirements is recognized as a key building block. In practice, the identification of user needs and wants is a challenge, and inadequate or faulty identifications in this step of an IT system development can cause huge problems with the final product. The elicitation of user requirements as such changes according to age groups, gender, cultural settings, into time, and experience in the use of the system/software. User requirements, therefore, cannot be used between projects, IT systems, and different...
In most IT system development processes, the identification or elicitation of user requirements is recognized as a key building block. In practice, th...
Cybersecurity is a global issue with local impact. When cyber security breaches occur, it impacts on society at all levels: Users lose trust in digital platforms, companies lose money, and public institutions are discredited. Over the last years, cybersecurity as a concept has changed significantly and has become a broad area covering for example crime, espionage, privacy inva- sions, and technical solutions for prevention of attacks on users, individuals as well as industry/companies. Along with this, privacy has become a central element in the discussion mirroring the fact that users have...
Cybersecurity is a global issue with local impact. When cyber security breaches occur, it impacts on society at all levels: Users lose trust in digita...