Mapping 20 years of accessibility research in HCI: A co-word analysis

Z Sarsenbayeva, N van Berkel, D Hettiachchi… - International Journal of …, 2023 - Elsevier
We employ hierarchical clustering, strategic diagrams, and network core–periphery analysis
to assess and visualise the intellectual progress of accessibility research within HCI in the …

Accessible and inclusive cyber security: a nuanced and complex challenge

K Renaud, L Coles-Kemp - SN Computer Science, 2022 - Springer
It has been argued that human-centred security design needs to accommodate the
considerations of three dimensions:(1) security,(2) usability and (3) accessibility. The latter …

OneButtonPIN: A single button authentication method for blind or low vision users to improve accessibility and prevent eavesdropping

MV Kamarushi, SL Watson, GW Tigwell… - Proceedings of the ACM …, 2022 - dl.acm.org
A Personal Identification Number (PIN) is a widely adopted authentication method used by
smartphones, ATMs, etc. PINs offer strong security and can be reset when compromised …

“As Usual, I Needed Assistance of a Seeing Person”: Experiences and Challenges of People with Disabilities and Authentication Methods

A Erinola, A Buckmann, J Friedauer… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
According to the World Health organization, about 16% of the world's population live with a
disability. While they could benefit from digital products and services, users with disabilities …

Authentication Challenges in Customer Service Settings Experienced by Deaf and Hard of Hearing People

S Andrew, SL Watson, T Oh, GW Tigwell - Extended Abstracts of the …, 2023 - dl.acm.org
Customer services are important for answering questions, providing information, and
handling issues. Often people want to connect with a customer service representative, yet …

“I... Got my Nose-Print. But it Wasn't Accurate”: How People with Upper Extremity Impairment Authenticate on their Personal Computing Devices

B Lewis, K Venkatasubramanian - … of the 2021 CHI Conference on …, 2021 - dl.acm.org
Authentication has become increasingly ubiquitous for controlling access to personal
computing devices (eg, laptops, tablets, and smartphones). In this paper, we aim to …

Cognitive function vs. accessible authentication: insights from dyslexia research

J Ophoff, G Johnson, K Renaud - … of the 18th International Web for All …, 2021 - dl.acm.org
The most common authentication mechanism, the password, requires a user to recall a
secret. Users take this memorisation, or cognitive function, test on a daily basis in order to …

I Don't Want to Sound Rude, but it's None of their Business: Exploring Security and Privacy Concerns Around Assistive Technology Use in Educational Settings

A Marsh, LR Milne - ACM Transactions on Accessible Computing, 2024 - dl.acm.org
Students with disabilities often use assistive technology to gain equal access to educational
content. However, using this technology can lead to security and privacy concerns, including …

Machine Learning–Based Identity and Access Management for Cloud Security

H Jamil, A Ali, M Ammi, R Kirichek… - Secure Edge and Fog …, 2024 - Springer
Cloud computing has the potential to offer an abundance of computing resources on
demand due to its high scalability, which eliminates the need for providers to plan far in …

Investigating the Accessibility and Usability of Multi-factor Authentication for Young People

L Smith, S Prior, J Ophoff - International Conference on Human-Computer …, 2024 - Springer
The rapid growth of young online users requires greater attention to balancing security
needs with age-appropriate user experiences. Despite the well-publicised benefits of multi …