Wikipedia:WikiProject Computer Security/Assessment
The WikiProject Computer Security/Assessment is the department of the WikiProject Computer Security that assesses computer security articles. This page lists its members and facilitates its workflow.
The department currently has no members.
New members should deliver an assessment first. A member should deliver at least one assessment per half a year.
- Editors can add an assessment request to the list below. Instructions are in the source.
- The list is transcluded to Wikipedia:WikiProject_Computing/Assessment#Open_requests, because the WikiProjects Computer Security and Computing are related.
- Please also take the initiative to respond to another open request.
- Please extend a list item when you attend to an article. Instructions are in the source.
- Deliver your assessment on the talk page of the assessed article.
- Articles of class Stub, Start, C, and B can be promoted to a higher class.
- Articles cannot be promoted to class A until they have been subjected to a peer review or a Good Article/Featured Article review.
- Articles of any class except GA and FA can be demoted to a lower class.
- Please remove a request from the list when it has been complied with.
- Please edit the assessment statistics subsection after adding or removing a list item.
- Shadowjams (talk · contribs) 20:58, 6 May 2012 (UTC) — requested by
- AradiaSilverWheel (talk · contribs) 14:20, 15 June 2012 — requested by
- AradiaSilverWheel (talk · contribs) 13:07, 19 June 2012 — requested by
- Number of requests made in 2012: 4
- Number of assessments delivered in 2012: 1
|Class||Criteria||Reader's experience||Editing suggestions||Example|
|FA||The article has attained featured article status by passing an official review.
|Professional, outstanding, and thorough; a definitive source for encyclopedic information.||No further content additions should be necessary unless new information becomes available; further improvements to the prose quality are often possible.||Storm botnet
|A||The article is well organized and essentially complete, having been reviewed by impartial reviewers from this WikiProject or elsewhere. Good article status is not a requirement for A-Class.
|Very useful to readers. A fairly complete treatment of the subject. A non-expert in the subject would typically find nothing wanting.||Expert knowledge may be needed to tweak the article, and style problems may need solving. Peer review may help.||
(as of March 2010)
|GA||The article has attained good article status by passing an official review.
|Useful to nearly all readers, with no obvious problems; approaching (but not equalling) the quality of a professional encyclopedia.||Some editing by subject and style experts is helpful; comparison with an existing featured article on a similar topic may highlight areas where content is weak or missing.||Digital forensics
Microsoft Security Essentials
|B||The article is mostly complete and without major problems, but requires some further work to reach good article standards.
|Readers are not left wanting, although the content may not be complete enough to satisfy a serious student or researcher.||A few aspects of content and style need to be addressed. Expert knowledge may be needed. The inclusion of supporting materials should also be considered if practical, and the article checked for general compliance with the Manual of Style and related style guidelines.||ITIL security management
|C||The article is substantial, but is still missing important content or contains much irrelevant material. The article should have some references to reliable sources, but may still have significant problems or require substantial cleanup.
|Useful to a casual reader, but would not provide a complete picture for even a moderately detailed study.||Considerable editing is needed to close gaps in content and solve cleanup problems.||Antivirus software
|Start||An article that is developing, but which is quite incomplete and, most notably, lacks adequate reliable sources.
|Provides some meaningful content, but most readers will need more.||Providing references to reliable sources should come first; the article also needs substantial improvement in content and organisation.||
(as of November 2006)
|Stub||A very basic description of the topic.
|Provides very little meaningful content; may be little more than a dictionary definition.||Any editing or additional material can be helpful. The provision of meaningful content should be a priority.||
(as of July 2009)
|FL||The article has attained featured list status.
|Professional standard; it comprehensively covers the defined scope, usually providing a complete set of items, and has annotations that provide useful and appropriate information about those items.||No further content additions should be necessary unless new information becomes available.||List of convicted computer criminals|
|List||Meets the criteria of a stand-alone list, which is an article that contains primarily a list, usually consisting of links to articles in a particular subject area.||There is no set format for a list, but its organization should be logical and useful to the reader.||Lists should be lists of live links to Wikipedia articles, appropriately named and organized.||List of computer viruses|
In the above table, examples are from:
- computer security articles (best choice);
- computing articles (second best choice);
- other articles (third best choice).
|Top||Fundamental concepts, standards, companies, important websites, or anything that forms the basis of all information|
|High||Popular applications, architectures, or anything that covers a general area of knowledge|
|Mid||Core components or anything that fills in more specific information of certain areas|
|Low||Optional add-ons that are not fairly important, or anything that is an obscure piece of trivia|
|Computer Security articles by quality and importance|
|WikiWork factors (?)||ω =6,093||Ω = 5.21|