Accessible authentication: Assessing the applicability for users with disabilities

S Furnell, K Helkala, N Woods - Computers & security, 2022 - Elsevier
Access to the many benefits available from digital technology can often vary depending
upon the capabilities and facilities of the individual who is attempting to engage with it. Many …

Disadvantaged by disability: examining the accessibility of cyber security

S Furnell, K Helkala, N Woods - International Conference on Human …, 2021 - Springer
Today, we are living in a digitally dependent world. Through the use of digital technologies,
life is meant to be easier and streamlined. This includes giving access to services that …

A review of literature on accessibility and authentication techniques

S Andrew, S Watson, T Oh, GW Tigwell - Proceedings of the 22nd …, 2020 - dl.acm.org
Reliable and accessible authentication techniques are required to maintain privacy and
security. This is paramount as technology plays an increasing role in our lives. In this paper …

“As Usual, I Needed Assistance of a Seeing Person”: Experiences and Challenges of People with Disabilities and Authentication Methods

A Erinola, A Buckmann, J Friedauer… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
According to the World Health organization, about 16% of the world's population live with a
disability. While they could benefit from digital products and services, users with disabilities …

Toward accessible authentication: learning from people with visual impairments

B Dosono, J Hayes, Y Wang - IEEE Internet Computing, 2018 - ieeexplore.ieee.org
Current authentication mechanisms often pose significant challenges for people with
disabilities. Drawing from a contextual inquiry study of visually impaired individuals …

Biometrics: Accessibility challenge or opportunity?

R Blanco-Gonzalo, C Lunerti, R Sanchez-Reillo… - PloS one, 2018 - journals.plos.org
Biometric recognition is currently implemented in several authentication contexts, most
recently in mobile devices where it is expected to complement or even replace traditional …

Secure, usable biometric authentication systems

LM Mayron, Y Hausawi, GS Bahr - … Conference, UAHCI 2013, Held as Part …, 2013 - Springer
Biometrics are physiological features that allow individuals to be identified. Popular
biometrics include fingerprints, faces, and irises. A common use of biometric systems is to …

" I Always Have to Think About It First" Authentication Experiences of People with Cognitive Impairments

J Hayes, X Li, Y Wang - Proceedings of the 19th International ACM …, 2017 - dl.acm.org
Authentication is a mundane yet often integral part of people's experiences with computing
devices and Internet services. Since most authentication mechanisms were designed …

Investigating user behavior for authentication methods: A comparison between individuals with Down syndrome and neurotypical users

Y Ma, J Feng, L Kumin, J Lazar - ACM Transactions on Accessible …, 2013 - dl.acm.org
A wide variety of authentication mechanisms have been designed to ensure information
security. Individuals with cognitive disabilities depend on computers and the Internet for a …

Biometric authentication adoption issues

G Ho, G Stephens, R Jamieson - 2003 - aisel.aisnet.org
Biometric authentication technology is increasingly being adopted at a government and
corporate level. Whilst technically feasible, we seek to understand the user acceptance …