Wikipedia:WikiProject Computer Security/Assessment

From Wikipedia, the free encyclopedia
Jump to: navigation, search

The WikiProject Computer Security/Assessment is the department of the WikiProject Computer Security that assesses computer security articles. This page lists its members and facilitates its workflow.


The department currently has no members.

New members should deliver an assessment first. A member should deliver at least one assessment per half a year.


  • Editors can add an assessment request to the list below. Instructions are in the source.
  • The list is transcluded to Wikipedia:WikiProject_Computing/Assessment#Open_requests, because the WikiProjects Computer Security and Computing are related.
  • Please also take the initiative to respond to another open request.
  • Please extend a list item when you attend to an article. Instructions are in the source.
  • Deliver your assessment on the talk page of the assessed article.
  • Articles of class Stub, Start, C, and B can be promoted to a higher class.
  • Articles cannot be promoted to class A until they have been subjected to a peer review or a Good Article/Featured Article review.
  • Articles of any class except GA and FA can be demoted to a lower class.
  • Please remove a request from the list when it has been complied with.
  • Please edit the assessment statistics subsection after adding or removing a list item.

Open requests[edit]

  1. Soft body dynamics (edit|talk|history|protect|delete|links|watch|logs|views) — requested by Shadowjams (talk · contribs) 20:58, 6 May 2012 (UTC)
  2. Columbia (supercomputer) (edit|talk|history|protect|delete|links|watch|logs|views) — requested by AradiaSilverWheel (talk · contribs) 14:20, 15 June 2012
  3. Pleiades (supercomputer) (edit|talk|history|protect|delete|links|watch|logs|views) — requested by AradiaSilverWheel (talk · contribs) 13:07, 19 June 2012

Assessment statistics[edit]

  • Number of requests made in 2012: 4
  • Number of assessments delivered in 2012: 1


WikiProject article quality grading scheme

In the above table, examples are from:

  • computer security articles (best choice);
  • computing articles (second best choice);
  • other articles (third best choice).


Label Articles
Top Fundamental concepts, standards, companies, important websites, or anything that forms the basis of all information
High Popular applications, architectures, or anything that covers a general area of knowledge
Mid Core components or anything that fills in more specific information of certain areas
Low Optional add-ons that are not fairly important, or anything that is an obscure piece of trivia