[PDF][PDF] Challenges in universally usable privacy and security

H Hochheiser, J Feng, J Lazar - Symposium On Usable Privacy …, 2008 - cups.cs.cmu.edu
Accessibility concerns compound the already-considerable difficulties of building systems
that provide usable privacy and security. In addition to facing common concerns regarding …

Using a participatory activities toolkit to elicit privacy expectations of adaptive assistive technologies

F Hamidi, K Poneres, A Massey, A Hurst - Proceedings of the 17th …, 2020 - dl.acm.org
Individuals whose abilities change over time can benefit from assistive technologies that can
detect and adapt to their current needs. While these Adaptive Assistive Technologies (AATs) …

How online tests contribute to the support system for people with cognitive and mental disabilities

Q Li, J Lee, C Zhang, K Reinecke - Proceedings of the 23rd International …, 2021 - dl.acm.org
Roughly 1 in 3 people around the world are affected by cognitive or mental disabilities at
some point in their lives, yet people often face a variety of barriers when seeking support …

“Too taxing on the mind!” Authentication grids are not for everyone

K Krol, C Papanicolaou, A Vernitski… - … , HAS 2015, Held as Part of …, 2015 - Springer
The security and usability issues associated with passwords have encouraged the
development of a plethora of alternative authentication schemes. These aim to provide …

Password Managers Use Among Individuals Who Are Visually Impaired: Awareness, Adoption, and Rejection

N Alajarmeh, RE Ladner - International Journal of Human …, 2024 - Taylor & Francis
Little research has examined the aspects of PMs' use among individuals who are blind or
visually impaired (BVI) who face extra challenges while entering credentials, such as low …

Children's Authentication: Understanding and Usage

D Ratakonda - Proceedings of the 18th ACM International Conference …, 2019 - dl.acm.org
With the widespread infusion of technology into society, children (ages 5-11) not only
interact with technology but are also required to create and use credentials in order to …

Multimodal User Authentication in Smart Environments: Survey of User Attitudes

A Aloba, S Morrison-Smith, A Richlen, K Suarez… - arXiv preprint arXiv …, 2023 - arxiv.org
As users shift from interacting actively with devices with screens to interacting seamlessly
with smart environments, novel models of user authentication will be needed to maintain the …

Evaluation of user authentication methods in the gadget-free world

K Halunen, J Häikiö, V Vallivaara - Pervasive and Mobile Computing, 2017 - Elsevier
In an ideal gadget-free environment the user is interacting with the environment and the
services through only “natural” means. This imposes restrictions on many aspects of the …

Exploring capturable everyday memory for autobiographical authentication

S Das, E Hayashi, JI Hong - Proceedings of the 2013 ACM international …, 2013 - dl.acm.org
We explore how well the intersection between our own everyday memories and those
captured by our smartphones can be used for what we call autobiographical authentication …

Human-centered authentication guidelines

JD Still, A Cain, D Schuster - Information & Computer Security, 2017 - emerald.com
Purpose Despite the widespread use of authentication schemes and the rapid emergence of
novel authentication schemes, a general set of domain-specific guidelines has not yet been …