Patterns are based on scientific sources.
| Name | Restricted Areas Notification |
| Sources | (Muñoz-Arteaga et al., 2009) |
| Synonyms | None |
| Context | The system must to inform users about the limits established for specific elements in the interface. This notification must to be made in a very kind manner. |
| Problem | How to notify users about the restricted areas in the system? |
| Solution | Changes in the shape of the mouse’s cursor is a good alternative to notify about the restricted elements of the interface. Additionally, messages with a touch of humor could be used (in moderation). |
| Examples | None |
| Implementation | Change the shape of the mouse curser to notify about the frontiers between the different elements of the interface. |
| Consequences | An adequate feedback makes easier the introduction of restrictive messages. |
| Dependencies | None |
| Relationships | [General Notifications About Security] |
| Principles | None |
| Guidelines | None |
| Check lists | None |
| Use cases | None |
| Tags | Restricted Areas Notification, Notifications |
| Log history | [12/21/2015]: Added to repository |
Muñoz-Arteaga, J., González, R.M., Martin, M.V., Vanderdonckt, J., Álvarez-Rodriguez, F., Calleros, J.G., 2009. A method to design information security feedback using patterns and hCI-security criteria, in: Computer-Aided Design of User Interfaces VI. Springer London, pp. 283–294. doi:10.1007/978-1-84882-206-1_26