Breaking bad? In search of a (softer) systems view of security ergonomics

被引:0
|
作者
Denis Fischbacher-Smith
机构
[1] Adam Smith Business School,
[2] University of Glasgow,undefined
来源
Security Journal | 2016年 / 29卷
关键词
security ergonomics; soft systems methodology; organisational design; human factors; socio-technical systems;
D O I
暂无
中图分类号
学科分类号
摘要
A series of terrorist attacks in late 2014 and early 2015 prompted the head of the UK’s Security Service to comment on the need to improve the information flows available to the service in order to deal with the emerging task demands that it faces. The comments highlighted the tensions that have been created in the post-Snowden revelations around domestic surveillance and intelligence gathering and these concerns span both public and private sector organisations. The intervention by the head of MI5 raises a series of questions about the design of security organisations and their function, and does so within a wider systems context, where changes in the environment require corresponding changes in the core processes and functions of the organisation. This is a central domain of security ergonomics and the manner in which an organisation can frame its response to an ever more complex threat matrix is the main purpose of this article. The question becomes one of how one might ‘design’ such a high performing organisation and especially one that can satisfy the zero-failure mandate that is often required of the security function. The argument presented here is that those organisations that see security as a ‘bolt-on’ function to existing organisational activities will invariably fail to capture the wider strategic dynamics of threat-response interactions and, more significantly, the role that other organisational activities can play in shaping that process. This article approaches the question from the perspective of two related bodies of research – Soft Systems Methodology and Ergonomics/Human Factors.
引用
收藏
页码:5 / 22
页数:17
相关论文
共 48 条
  • [21] The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game
    Frey, Sylvain
    Rashid, Awais
    Anthonysamy, Pauline
    Pinto-Albuquerque, Maria
    Naqvi, Syed Asad
    [J]. PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, : 496 - 496
  • [22] Group Support Systems Research in the Field of Business Information Security; a Practitioners View
    Bobbert, Yuri
    Mulder, Hans
    [J]. PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 589 - 598
  • [23] A Search-Based Approach to Multi-view Clustering of Software Systems
    Saeidi, Amir M.
    Hage, Jurriaan
    Khadka, Ravi
    Jansen, Slinger
    [J]. 2015 22ND INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), 2015, : 429 - 438
  • [24] Help, My Signal has Bad Device! Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device
    Wichelmann, Jan
    Berndt, Sebastian
    Pott, Claudius
    Eisenbarth, Thomas
    [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2021, 2021, 12756 : 88 - 105
  • [25] A Security Architecture for Pay-Per-View Business Models in Conditional Access Systems
    Kirkels, Bart
    Maas, Martijn
    Roelse, Peter
    [J]. DRM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON DIGITAL RIGHTS MANAGEMENT, 2007, : 1 - 9
  • [26] Security Systems with Biometry based on Partial View Facial Images Using Geometrical Features
    Milczarski, Piotr
    Stawska, Zofia
    Dowdall, Shane
    [J]. PROCEEDINGS OF THE 2018 IEEE 4TH INTERNATIONAL SYMPOSIUM ON WIRELESS SYSTEMS WITHIN THE INTERNATIONAL CONFERENCES ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS (IDAACS-SWS), 2018, : 204 - 209
  • [27] INFLUENCE OF THE SIZE OF THE INSTANTANEOUS FIELD OF VIEW ON THE EFFICIENCY OF A SEARCH FOR A POINT OBJECT IN DISSECTOR SYSTEMS
    SABLIN, VK
    FEDOSEEV, VI
    [J]. SOVIET JOURNAL OF OPTICAL TECHNOLOGY, 1981, 48 (09): : 509 - 510
  • [28] Security measure allocation for industrial control systems: Exploiting systematic search techniques and submodularity
    Milosevic, Jezdimir
    Teixeira, Andre
    Tanaka, Takashi
    Johansson, Karl H.
    Sandberg, Henrik
    [J]. INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (11) : 4278 - 4302
  • [29] A Review on Search-Based Tools and Techniques to Identify Bad Code Smells in Object-Oriented Systems
    Kaur, Amandeep
    Dhiman, Gaurav
    [J]. HARMONY SEARCH AND NATURE INSPIRED OPTIMIZATION ALGORITHMS, 2019, 741 : 909 - 921
  • [30] Person search over security video surveillance systems using deep learning methods: A review
    Irene, S.
    Prakash, A. John
    Uthariaraj, V. Rhymend
    [J]. IMAGE AND VISION COMPUTING, 2024, 143