DESIGN STRATEGIES FOR SECURITY DOCUMENTS:BASED ON CONTRADICTORY COGNITIVE NEEDS

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 679
  • Download : 0
In spite of its important function and strong influence in society, specified approaches for security document design has not been achieved because of its unique developmental environment and the nature of its products. To establish useful and effective security design strategies, the relationship between the product and various stakeholders as well as the essential function of the security document should be considered cooperatively. The major functions and consequent viewpoints of the security document can be defined as an essential commodity, an aggregation of technologies for deterring counterfeit, and a collective identity. A security document should protect information and should also let public users easily certify its genuineness. Taking this into consideration, this study premised the essential attribute as the balance between contrary requirements, and established design strategies along three viewpoints of a security document, based on a two-way symmetric communication model which is framed by two factors, interactivity and persuasiveness.
Publisher
Japanese society for the science of design
Issue Date
2015-05
Language
English
Citation

BULLETIN OF JAPANESE SOCIETY FOR THE SCIENCE OF DESIGN, v.61, no.5, pp.11 - 18

ISSN
0910-8173
DOI
10.11247/jssdj.61.5_11
URI
http://hdl.handle.net/10203/204031
Appears in Collection
ID-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0