Principles are based on scientific sources.
Name | Visibility |
Sources | (Yee, 2002) |
Synonyms | Visible (Furnell et al., 2006) |
Intent | The system should give a clear indication of whether security is being applied. |
Motivation | Appropriate use of status indicators and warnings will help to remind users in cases where they may have forgotten to enable appropriate safeguards. |
Examples | None |
Guidelines | Design guidelines for security management systems Simplify Access Control Models Recommendations for improving the design of phishing indicators |
Tags | Self-descriptiveness, Accessibility |
Log history | [02/14/2016]: Added to repository [07/11/2016]: Sources fixed |
Furnell, S.M., Jusoh, A., Katsabas, D., 2006. The challenges of understanding and using security: A survey of end-users. Computers & Security 25. doi:10.1016/j.cose.2005.12.004
Yee, K.-P., 2002. User interaction design for secure systems, in: Proceedings of the 4th International Conference on Information and Communications Security, ICICS ’02. Springer-Verlag, London, UK, UK, pp. 278–290.