Security Features Used by the User

Name Security Features Used by the User
Sources (Muñoz-Arteaga et al., 2009)
Synonyms None
Context The interface must to notify users about security technologies activated additionally by theirselves to protect confidential information during a specific transaction. These notifications must be presented avoiding complicate sentences, and the use of technical terms.
Problem How to inform users about the security features used by themselves during an information transaction?
Solution Users could be notified by means of a specific panel that shows those security technologies selected and activated by the user.
Examples Notification about the security scheme’s elements activated by the user. Bearing in mind the previous example, the new element was activated when user select it from the logotype’s list using the mouse. Source: (Muñoz-Arteaga et al., 2009)
Implementation Use a specific panel that shows security technologies selected and activated by the user.
Consequences It is possible to increase trust in some system, if users are informed about the technologies used by them to keep secure all the confidential information.
Dependencies None
Relationships [Security Features Used by the System]
Principles [Consistent Meaningful Vocabulary]
[Expertise]
Guidelines None
Check lists None
Use cases None
Tags Security Features Used by the User, Security Features Used by the System
Log history [12/21/2015]: Added to repository

References

Muñoz-Arteaga, J., González, R.M., Martin, M.V., Vanderdonckt, J., Álvarez-Rodriguez, F., Calleros, J.G., 2009. A method to design information security feedback using patterns and hCI-security criteria, in: Computer-Aided Design of User Interfaces VI. Springer London, pp. 283–294. doi:10.1007/978-1-84882-206-1_26