L Smith, S Prior, J Ophoff - International Conference on Human-Computer …, 2024 - Springer
The rapid growth of young online users requires greater attention to balancing security needs with age-appropriate user experiences. Despite the well-publicised benefits of multi …
The ongoing Covid-19 pandemic has impacted our everyday lives and demands everyone to take countermeasures such as wearing masks or disinfecting their hands. However, while …
A Binsedeeq, S Furnell, X Carpent… - … Conference on Human …, 2024 - Springer
The ability to use technology has become a necessity for everyone, including users with disabilities, who may encounter additional challenges. Security is one of the significant …
Usability and accessibility are significant authentication aspects for online applications. Despite the fact that there are ongoing efforts to improve the interface design, some existing …
Cloud computing can provide unlimited computing resources according to demand because of having high scalability as per its nature, which removes the requirements for the Cloud …
Phishing is a prevalent and increasingly sophisticated threat in the critical digital environment. Nowadays, measures to protect against phishing are highly dependent on …
L Moreno, H Petrie, S Schmeelk - 36th International BCS Human …, 2023 - scienceopen.com
Digital authentication is now an essential part of daily life, allowing users to manage the online security and privacy of their information and digital assets. However, the …
Authentication mechanisms (eg, login methods) help users to securely verify their identity and keep sensitive data stored on their devices private. Authentication mechanisms typically …
People diagnosed with ALS are often unable to authenticate themselves, due to disease progression and ability loss. Technology is used by differently-abled people as a strategy to …