A review of literature on accessibility and authentication techniques

S Andrew, S Watson, T Oh, GW Tigwell - Proceedings of the 22nd …, 2020 - dl.acm.org
Proceedings of the 22nd International ACM SIGACCESS Conference on Computers …, 2020dl.acm.org
Reliable and accessible authentication techniques are required to maintain privacy and
security. This is paramount as technology plays an increasing role in our lives. In this paper,
we examine the previous work on accessible authentication techniques for blind/low vision
people, deaf/hard-of-hearing people, people with cognitive impairments, and people with
motor impairments. We seek to identify gaps in the current research to advocate where
future efforts are needed to create authentication techniques that will work for everyone. We …
Reliable and accessible authentication techniques are required to maintain privacy and security. This is paramount as technology plays an increasing role in our lives. In this paper, we examine the previous work on accessible authentication techniques for blind/low vision people, deaf/hard-of-hearing people, people with cognitive impairments, and people with motor impairments. We seek to identify gaps in the current research to advocate where future efforts are needed to create authentication techniques that will work for everyone. We found a lot of variability in prior work investigating the accessibility of authentication techniques, including shortfalls and gaps in the literature. We make recommendations on the directions future research should take.
ACM Digital Library
以上显示的是最相近的搜索结果。 查看全部搜索结果