7 Nokia Corporation - initial contribution. |
7 Nokia Corporation - initial contribution. |
8 Contributors: |
8 Contributors: |
9 --> |
9 --> |
10 <!DOCTYPE concept |
10 <!DOCTYPE concept |
11 PUBLIC "-//OASIS//DTD DITA Concept//EN" "concept.dtd"> |
11 PUBLIC "-//OASIS//DTD DITA Concept//EN" "concept.dtd"> |
12 <concept id="GUID-C23196E8-FDD3-4A10-9DA2-DA83A2AD49D9" xml:lang="en"><title>Applications |
12 <concept id="GUID-C23196E8-FDD3-4A10-9DA2-DA83A2AD49D9" xml:lang="en"><title>Applications with a user interface</title><prolog><metadata><keywords/></metadata></prolog><conbody> |
13 with a user interface</title><prolog><metadata><keywords/></metadata></prolog><conbody> |
13 <p>If you are developing an application with a user interface, |
14 <p>If you are developing an application with a user interface, consider |
14 consider the following issues:</p> |
15 the following issues:</p> |
|
16 <ul> |
15 <ul> |
17 <li><p>Other applications may have access to the information that |
16 <li><p>Other applications may have access to the information |
18 the user inputs.</p></li> |
17 that the user inputs.</p></li> |
19 <li><p>A hostile application may lure the user to enter information |
18 <li><p>A hostile application may lure the user to enter |
20 that belongs to another application.</p></li> |
19 information that belongs to another application.</p></li> |
21 </ul> |
20 </ul> |
22 <p>Password dialogs in particular should be designed so that the user easily |
21 <p>Password dialogs in particular should be designed so that the |
23 recognizes the currently running application.</p> |
22 user easily recognizes the currently running application.</p> |
24 <section id="GUID-836A84FD-44E9-4C3F-AA50-4BC36CBA2916"><title>User input</title> |
23 <section id="GUID-836A84FD-44E9-4C3F-AA50-4BC36CBA2916"><title>User |
25 <p>It is possible for the user to unintentionally enter incorrect data |
24 input</title> |
26 that can interfere with the normal operation of the application. All input |
25 <p>It is possible for the user to unintentionally enter incorrect |
27 should be checked and validated before processing. A one-time check may not |
26 data that can interfere with the normal operation of the application. |
28 be enough because the content of data can change during processing, so it |
27 All input should be checked and validated before processing. A one-time |
29 is therefore advisable to quickly check the data every time it is used.</p> |
28 check may not be enough because the content of data can change during |
|
29 processing, so it is therefore advisable to quickly check the data |
|
30 every time it is used.</p> |
30 <p>The following figure shows an example of input processing phases.</p> |
31 <p>The following figure shows an example of input processing phases.</p> |
31 <fig id="GUID-6C871726-D4DB-40FC-A2F8-ADDA2B9A4E9C"><title>Examples of input processing</title><image href="GUID-63AD2899-FDDC-4E3F-8876-C72EC7C194CE_d0e13907_href.png"/></fig> |
32 <fig id="GUID-6C871726-D4DB-40FC-A2F8-ADDA2B9A4E9C"><title>Examples of input processing</title><image href="GUID-63AD2899-FDDC-4E3F-8876-C72EC7C194CE_d0e14007_href.png"/></fig> |
32 <p/> |
33 <p/> |
33 </section> |
34 </section> |
34 </conbody></concept> |
35 </conbody></concept> |