“I... Got my Nose-Print. But it Wasn't Accurate”: How People with Upper Extremity Impairment Authenticate on their Personal Computing Devices

B Lewis, K Venkatasubramanian - … on Human Factors in Computing …, 2021 - dl.acm.org
… the use of authentication on personal computing devices (referred to as devices, for brevity,
… : (1) how and why people with UEI used authentication on their devices and (2) the nature of …

A new authentication approach for people with upper extremity impairment

B Lewis, J Hebert… - … Computing and …, 2020 - ieeexplore.ieee.org
… setup of their computing devices such as HMDs. People with disabilities are disproportionally
… Caregiver crimes against people with disabilities include the theft and misuse of personal …

[图书][B] Designing Accessible Computing Device Authentication for People With Upper Extremity Impairment

B Lewis - 2023 - search.proquest.com
… In this paper, we aim to understand the authentication process used by people with upper
extremity impairment (UEI). A person with UEI lacks range of motion, strength, endurance, …

A3C: An Image-Association-Based Computing Device Authentication Framework for People with Upper Extremity Impairments

B Lewis, P Kirupaharan, TM Ranalli… - … Accessible Computing, 2024 - dl.acm.org
computing device authentication often presents accessibility barriers for people with upper
extremity impairments … image-Association-based Authentication for Computing devices (A3C), …

Allowing for Secure and Accessible Authentication for Individuals with Disabilities of Dexterity

A Price, F Loizides - International Conference on Human-Centred Software …, 2024 - Springer
upper extremity impairment authenticate on their personal computing devices. In: Proceedings
of the 2021 CHI Conference on Human Factors in Computing Systems, pp. 1–14 (2021) …

“Sometimes I feel that I'm being left behind”: Exploring Computing Device Use by People with Upper Extremity Impairment During the COVID-19 Pandemic

BF Lewis, P Courtemanche… - … Factors in Computing …, 2022 - dl.acm.org
… In this paper, we explore how computing device use by people with upper extremity impairment
(… multiple options for authentication such as the fngerprint authentication favored by P5. …

Accessible authentication: Assessing the applicability for users with disabilities

S Furnell, K Helkala, N Woods - Computers & security, 2022 - Elsevier
… in trunk, head and neck region, shoulder region and in upper extremities. The ability to
undertake multiple tasks or a single task, involuntary movements, pain, and vestibular issues. …

Check for Allowing for Secure and Accessible Authentication for Individuals with Disabilities of Dexterity

A Price, F Loizides - Human-Centered Software Engineering: 10th IFIP … - books.google.com
… of authentication, the security of individuals with Parkinson’s and upper extremity disabilities
… In: Proceedings of the 20th International ACM SIGACCESS Conference on Computers and …

Physical disabilities and computing technologies: an analysis of impairments

A Sears, M Young, J Feng - The human-computer interaction …, 2007 - taylorfrancis.com
computing devices. Building on this observation, we briefly discuss the relationship among
the environment, context, physical impairments, and disabilities… and upper extremity gestures …

A review of literature on accessibility and authentication techniques

S Andrew, S Watson, T Oh, GW Tigwell - … Conference on Computers and …, 2020 - dl.acm.org
… People with upper extremity disabilities have difculty typing [28], which can … authentication
with visual impairments, hearing impairments, cognitive impairments, and motor impairments. …