Privacy research with marginalized groups: what we know, what's needed, and what's next

S Sannon, A Forte - Proceedings of the ACM on Human-Computer …, 2022 - dl.acm.org
People who are marginalized experience disproportionate harms when their privacy is
violated. Meeting their needs is vital for developing equitable and privacy-protective …

[PDF][PDF] Availability of voice-recognition devices to support visually impaired students in Saudi Arabian universities

YJ Khasawneh, MAS Khasawneh - Journal of Wireless Mobile Networks …, 2023 - jowua.com
This study investigates the availability of instructing visually impaired students utilizing
voicerecognition devices in universities in Saudi Arabia. The study also compares the …

A review of literature on accessibility and authentication techniques

S Andrew, S Watson, T Oh, GW Tigwell - Proceedings of the 22nd …, 2020 - dl.acm.org
Reliable and accessible authentication techniques are required to maintain privacy and
security. This is paramount as technology plays an increasing role in our lives. In this paper …

A tale of two studies: The best and worst of yubikey usability

J Reynolds, T Smith, K Reese… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Two-factor authentication (2FA) significantly improves the security of password-based
authentication. Recently, there has been increased interest in Universal 2nd Factor (U2F) …

Design and evaluation of inclusive email security indicators for people with visual impairments

Y Yu, S Ashok, S Kaushik, Y Wang… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Due to the challenges to detect and filter phishing emails, it is inevitable that some phishing
emails can still reach a user's inbox. As a result, email providers such as Gmail have …

Cooperative privacy and security: Learning from people with visual impairments and their allies

J Hayes, S Kaushik, CE Price, Y Wang - Fifteenth Symposium on Usable …, 2019 - usenix.org
To better inform privacy/security designs for people with disabilities, we “shadowed” people
with visual impairments and their allies (eg, friends, family members, and professional …

Addressing physical safety, security, and privacy for people with visual impairments

T Ahmed, P Shaffer, K Connelly, D Crandall… - Twelfth Symposium on …, 2016 - usenix.org
People with visual impairments face a variety of obstacles in their daily lives. Recent work
has identified specific physical privacy concerns of this population and explored how …

Non-visual cooking: exploring practices and challenges of meal preparation by people with visual impairments

FM Li, J Dorst, P Cederberg, P Carrington - Proceedings of the 23rd …, 2021 - dl.acm.org
The reliance on vision for tasks related to cooking and eating healthy can present barriers to
cooking for oneself and achieving proper nutrition. There has been little research exploring …

“It Feels Like Being Locked in A Cage”: Understanding Blind or Low Vision Streamers' Perceptions of Content Curation Algorithms

EZ Rong, MM Zhou, Z Lu, M Fan - … of the 2022 ACM Designing Interactive …, 2022 - dl.acm.org
Blind or low vision (BLV) people were recently reported to be live streamers on the online
platforms that employed content curation algorithms. Recent research uncovered perceived …

Accessible authentication: Assessing the applicability for users with disabilities

S Furnell, K Helkala, N Woods - Computers & security, 2022 - Elsevier
Access to the many benefits available from digital technology can often vary depending
upon the capabilities and facilities of the individual who is attempting to engage with it. Many …