Patterns are based on scientific sources.
Name | Localization of Specific Areas |
Sources | (Muñoz-Arteaga et al., 2009) |
Synonyms | None |
Context | The system should indicate clearly which elements in the interface belong to system’s security, and should provide an appropriated access to these elements. |
Problem | How to indicate the limits of specific elements of the interface to the end user? |
Solution | Changes in the shape of the mouse’s cursor is a good alternative to notify about the frontiers between the different elements of the interface. It could be enhanced including text messages. |
Examples | Source: (Muñoz-Arteaga et al., 2009) |
Implementation | Change the shape of the mouse curser to notify about the frontiers between the different elements of the interface. |
Consequences | An adequate distinction of the security elements could speed up the localization of specific elements of the interface. |
Dependencies | None |
Relationships | [Direct Access to UI Components] |
Principles | [Locatability] [Visibility] |
Guidelines | None |
Check lists | None |
Use cases | None |
Tags | Localization of Specific Areas, Direct Access to UI Components, Accessibility |
Log history | [12/21/2015]: Added to repository |
Muñoz-Arteaga, J., González, R.M., Martin, M.V., Vanderdonckt, J., Álvarez-Rodriguez, F., Calleros, J.G., 2009. A method to design information security feedback using patterns and hCI-security criteria, in: Computer-Aided Design of User Interfaces VI. Springer London, pp. 283–294. doi:10.1007/978-1-84882-206-1_26