Patterns are based on scientific sources.
Name | Suggestive Dialogues |
Sources | (Muñoz-Arteaga et al., 2009) |
Synonyms | None |
Context | The system must to provide users suggested actions to follow to mitigate the damages caused for some detected security threat. |
Problem | How to facilitate the interpretation of a security alert and the reduction of damages caused by some detected threat? |
Solution | By means of specific messages (without technical terms or irrelevant information) the users could be notified about the internal state of the system. The messages must include suggested actions to follow in case of eventuality. |
Examples | Source: (Muñoz-Arteaga et al., 2009) |
Implementation | Notify about the internal state of the system and offer suggested actions. |
Consequences | A suggested action represents a contribution to reduce misunderstands and makes easier the decision making. |
Dependencies | None |
Relationships | [Providing Recommendations] [Failing Safely] |
Principles | [Path of Least Resistance] |
Guidelines | None |
Check lists | None |
Use cases | None |
Tags | Suggestive Dialogues, Providing Recommendations, Learnability, Fail Safety |
Log history | [12/21/2015]: Added to repository |
Muñoz-Arteaga, J., González, R.M., Martin, M.V., Vanderdonckt, J., Álvarez-Rodriguez, F., Calleros, J.G., 2009. A method to design information security feedback using patterns and hCI-security criteria, in: Computer-Aided Design of User Interfaces VI. Springer London, pp. 283–294. doi:10.1007/978-1-84882-206-1_26