Patterns are based on scientific sources.
| Name | Indirect Access to UI Components |
| Sources | (Muñoz-Arteaga et al., 2009) |
| Synonyms | None |
| Context | The system must provide a quick and easy access to external features available or used by the system. |
| Problem | How to facilitate the access to features of the system necessarily presented in additional screens to end users? |
| Solution | By means of a panel that list those security features used by the system. The panel must allow the access to these technologies. |
| Examples | Source: (Muñoz-Arteaga et al., 2009) |
| Implementation | Provide a panel with security features used by the system. |
| Consequences | An easy and quick access to external features could to increase the trust of the user in the system. |
| Dependencies | None |
| Relationships | [Direct Access to UI Components] [Sequential Access to UI Components] |
| Principles | [Locatability] |
| Guidelines | None |
| Check lists | None |
| Use cases | None |
| Tags | Indirect Access to UI Components, Direct Access to UI Components |
| Log history | [12/21/2015]: Added to repository |
Muñoz-Arteaga, J., González, R.M., Martin, M.V., Vanderdonckt, J., Álvarez-Rodriguez, F., Calleros, J.G., 2009. A method to design information security feedback using patterns and hCI-security criteria, in: Computer-Aided Design of User Interfaces VI. Springer London, pp. 283–294. doi:10.1007/978-1-84882-206-1_26