" I Always Have to Think About It First" Authentication Experiences of People with Cognitive Impairments

J Hayes, X Li, Y Wang - Proceedings of the 19th International ACM …, 2017 - dl.acm.org
Authentication is a mundane yet often integral part of people's experiences with computing
devices and Internet services. Since most authentication mechanisms were designed …

{“I'm}{Stuck!”}: A Contextual Inquiry of People with Visual Impairments in Authentication

B Dosono, J Hayes, Y Wang - … On Usable Privacy and Security (SOUPS …, 2015 - usenix.org
Current authentication mechanisms pose significant challenges for people with visual
impairments. This paper presents results from a contextual inquiry study that investigated the …

Toward accessible authentication: learning from people with visual impairments

B Dosono, J Hayes, Y Wang - IEEE Internet Computing, 2018 - ieeexplore.ieee.org
Current authentication mechanisms often pose significant challenges for people with
disabilities. Drawing from a contextual inquiry study of visually impaired individuals …

Disadvantaged by disability: examining the accessibility of cyber security

S Furnell, K Helkala, N Woods - International Conference on Human …, 2021 - Springer
Today, we are living in a digitally dependent world. Through the use of digital technologies,
life is meant to be easier and streamlined. This includes giving access to services that …

[PDF][PDF] Universal authentication: towards accessible authentication for everyone

Y Wang - ACM Press, 2014 - cups.cs.cmu.edu
Logging into a system or website with user names and passwords (ie, authentication) is an
essential part of people's everyday computer/Internet activities. However, this mundane …

“As Usual, I Needed Assistance of a Seeing Person”: Experiences and Challenges of People with Disabilities and Authentication Methods

A Erinola, A Buckmann, J Friedauer… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
According to the World Health organization, about 16% of the world's population live with a
disability. While they could benefit from digital products and services, users with disabilities …

A review of literature on accessibility and authentication techniques

S Andrew, S Watson, T Oh, GW Tigwell - Proceedings of the 22nd …, 2020 - dl.acm.org
Reliable and accessible authentication techniques are required to maintain privacy and
security. This is paramount as technology plays an increasing role in our lives. In this paper …

Cognitive function vs. accessible authentication: insights from dyslexia research

J Ophoff, G Johnson, K Renaud - … of the 18th International Web for All …, 2021 - dl.acm.org
The most common authentication mechanism, the password, requires a user to recall a
secret. Users take this memorisation, or cognitive function, test on a daily basis in order to …

Investigating user behavior for authentication methods: A comparison between individuals with Down syndrome and neurotypical users

Y Ma, J Feng, L Kumin, J Lazar - ACM Transactions on Accessible …, 2013 - dl.acm.org
A wide variety of authentication mechanisms have been designed to ensure information
security. Individuals with cognitive disabilities depend on computers and the Internet for a …

Accessible authentication: Assessing the applicability for users with disabilities

S Furnell, K Helkala, N Woods - Computers & security, 2022 - Elsevier
Access to the many benefits available from digital technology can often vary depending
upon the capabilities and facilities of the individual who is attempting to engage with it. Many …