Patterns are based on scientific sources.
Name | Disable of Services |
Sources | (Muñoz-Arteaga et al., 2009) |
Synonyms | None |
Context | Sometimes security technologies have an performance penalty on a particular transaction. |
Problem | How to give users more control over the system? |
Solution | Include options to disable or enable security features. |
Examples | Source: (Muñoz-Arteaga et al., 2009) |
Implementation | Provide options to disable or continue security features. |
Consequences | If the system provides options to enable and disable specific security features, users could have a feeling of more control over the system. |
Dependencies | None |
Relationships | [Disable by Default] |
Principles | None |
Guidelines | None |
Check lists | None |
Use cases | None |
Tags | Disable of Services |
Log history | [12/21/2015]: Added to repository |
Muñoz-Arteaga, J., González, R.M., Martin, M.V., Vanderdonckt, J., Álvarez-Rodriguez, F., Calleros, J.G., 2009. A method to design information security feedback using patterns and hCI-security criteria, in: Computer-Aided Design of User Interfaces VI. Springer London, pp. 283–294. doi:10.1007/978-1-84882-206-1_26