Enhancing the user authentication process with colour memory cues

N Woods, J Silvennoinen - Behaviour & Information Technology, 2023 - Taylor & Francis
The authentication process is the first line of defence against potential impostors, and
therefore is an important concern when protecting personal and organisational data …

“As Usual, I Needed Assistance of a Seeing Person”: Experiences and Challenges of People with Disabilities and Authentication Methods

A Erinola, A Buckmann, J Friedauer… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
According to the World Health organization, about 16% of the world's population live with a
disability. While they could benefit from digital products and services, users with disabilities …

Assessing Suspicious Emails with Banner Warnings Among Blind and {Low-Vision} Users in Realistic Settings

F Sharevski, A Zeidieh - 33rd USENIX Security Symposium (USENIX …, 2024 - usenix.org
Warning users about suspicious emails usually happens through visual interventions such
as banners. Evidence from laboratory experiments shows that email banner warnings are …

Allowing for secure and accessible authentication for individuals with disabilities of dexterity

A Price, F Loizides - International Conference on Human-Centred Software …, 2024 - Springer
People living with disabilities of dexterity can be vulnerable to attackers when authenticating
using physical input methods, such as when inputting PIN numbers using a keypad at an …

Accessible password strength assessment method for visually challenged users

KS Kuppusamy, G Balayogi - International Journal of Information Security, 2023 - Springer
Text-based password authentication is the most common password authentication in the
digital space. People often need help to create secure and strong passwords for their digital …

Improving Consumer Data Privacy Protection and Trust in the Context of the Digital Platform

C Cao, M Zheng, L Ni - International Conference on Human-Computer …, 2022 - Springer
In response to the full impact and the fair playing field of digital and cybersecurity, strong
multilateral cooperation among politicians and businesses is needed in the global markets …

Visions of the Future: What Could Happen to User Authentication?

H Paananen, N Woods - European …, 2024 - papers.academic-conferences.org
The most prevalent information system security feature for the user is the authentication
process. Passwords have been the primary authentication method for decades due to their …

Improving quality of life through the application of assistive technology

P Whittington, H Dogan - A Research Agenda for Disability and …, 2024 - elgaronline.com
The World Bank (nd) states that there are one billion people worldwide that have disabilities
affecting daily interactions with society, which accounts for 15 per cent of the population …

Las Tecnologías de la Información y la Comunicación (TIC) y las personas con discapacidad intelectual: Tendencias y oportunidades

L Yuting - 2023 - gredos.usal.es
[SPA] El disfrute de una vida de calidad, exenta de discriminación y accesible, es un
derecho fundamental para las personas con discapacidad. En este contexto, las tecnologías …

A big phish is (not) in sight: phishing prevention and response for screen reader users

JNF Janeiro - 2024 - repositorio.ul.pt
Phishing is a prevalent and increasingly sophisticated threat in the critical digital
environment. Nowadays, measures to protect against phishing are highly dependent on …