Principles are based on scientific sources.
| Name | Convenience |
| Sources | (Furnell et al., 2006) |
| Synonyms | Convenient |
| Intent | Although visibility is important, the provision of security should not become so prominent that it is considered inconvenient or intrusive. |
| Motivation | Users are likely to disable features that become too much of an impediment to legitimate use. |
| Examples | None |
| Guidelines | Usable set-up of security policies Recommendations for improving the design of phishing indicators Warning Design Guidelines |
| Tags | Satisfaction, Recognition of Appropriateness |
| Log history | [02/14/2016]: Added to repository [04/22/2016]: Updated name from “Convenient” |
Furnell, S.M., Jusoh, A., Katsabas, D., 2006. The challenges of understanding and using security: A survey of end-users. Computers & Security 25. doi:10.1016/j.cose.2005.12.004