Principles are based on scientific sources.
Name | Convenience |
Sources | (Furnell et al., 2006) |
Synonyms | Convenient |
Intent | Although visibility is important, the provision of security should not become so prominent that it is considered inconvenient or intrusive. |
Motivation | Users are likely to disable features that become too much of an impediment to legitimate use. |
Examples | None |
Guidelines | Usable set-up of security policies Recommendations for improving the design of phishing indicators Warning Design Guidelines |
Tags | Satisfaction, Recognition of Appropriateness |
Log history | [02/14/2016]: Added to repository [04/22/2016]: Updated name from “Convenient” |
Furnell, S.M., Jusoh, A., Katsabas, D., 2006. The challenges of understanding and using security: A survey of end-users. Computers & Security 25. doi:10.1016/j.cose.2005.12.004