[HTML][HTML] Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …

Technology-enhanced support for children with Down Syndrome: A systematic literature review

NMI Shahid, ELC Law, N Verdezoto - International Journal of Child …, 2022 - Elsevier
This paper presents a systematic literature review on technology-enhanced support for
children with Down Syndrome and young people who match the mental age of children …

[图书][B] Ensuring digital accessibility through process and policy

J Lazar, DF Goldstein, A Taylor - 2015 - books.google.com
Ensuring Digital Accessibility through Process and Policy provides readers with a must-have
resource to digital accessibility from both a technical and policy perspective. Inaccessible …

Using eye gaze data and visual activities to infer human cognitive styles: method and feasibility studies

GE Raptis, C Katsini, M Belk, C Fidas… - proceedings of the 25th …, 2017 - dl.acm.org
Recent research provides evidence that individual differences in human cognitive styles
affect user performance and experience in diverse application domains. However, state-of …

[HTML][HTML] Accessible and inclusive cyber security: a nuanced and complex challenge

K Renaud, L Coles-Kemp - SN Computer Science, 2022 - Springer
It has been argued that human-centred security design needs to accommodate the
considerations of three dimensions:(1) security,(2) usability and (3) accessibility. The latter …

The security & privacy acceptance framework (spaf)

S Das, C Faklaris, JI Hong… - Foundations and Trends …, 2022 - nowpublishers.com
How can we encourage end-user acceptance of expert recommended cybersecurity and
privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …

The interplay between humans, technology and user authentication: A cognitive processing perspective

M Belk, C Fidas, P Germanakos, G Samaras - Computers in Human …, 2017 - Elsevier
This paper investigates the interplay among human cognitive processing differences (field
dependence vs. field independence), alternative interaction device types (desktop vs. touch) …

The third wave? Inclusive privacy and security

Y Wang - Proceedings of the 2017 new security paradigms …, 2017 - dl.acm.org
The field of security and privacy has made steady progresses in developing technical
mechanisms, which I refer to as the first wave of security and privacy research. Since the …

A review of literature on accessibility and authentication techniques

S Andrew, S Watson, T Oh, GW Tigwell - Proceedings of the 22nd …, 2020 - dl.acm.org
Reliable and accessible authentication techniques are required to maintain privacy and
security. This is paramount as technology plays an increasing role in our lives. In this paper …

[PDF][PDF] Co-design process of a smart phone app to help people with down syndrome manage their nutritional habits

J Lazar, C Woglom, J Chung, A Schwartz… - Journal of usability …, 2018 - uxpajournal.org
People with Down syndrome (DS) often have trouble making healthy food choices. This
article describes the user-centered design process of developing a smart phone app that …