Principles are based on scientific sources.
| Name | Visibility |
| Sources | (Yee, 2002) |
| Synonyms | Visible (Furnell et al., 2006) |
| Intent | The system should give a clear indication of whether security is being applied. |
| Motivation | Appropriate use of status indicators and warnings will help to remind users in cases where they may have forgotten to enable appropriate safeguards. |
| Examples | None |
| Guidelines | Design guidelines for security management systems Simplify Access Control Models Recommendations for improving the design of phishing indicators |
| Tags | Self-descriptiveness, Accessibility |
| Log history | [02/14/2016]: Added to repository [07/11/2016]: Sources fixed |
Furnell, S.M., Jusoh, A., Katsabas, D., 2006. The challenges of understanding and using security: A survey of end-users. Computers & Security 25. doi:10.1016/j.cose.2005.12.004
Yee, K.-P., 2002. User interaction design for secure systems, in: Proceedings of the 4th International Conference on Information and Communications Security, ICICS ’02. Springer-Verlag, London, UK, UK, pp. 278–290.