2021
DOI: 10.1007/978-3-030-78092-0_13
|View full text |Cite
|
Sign up to set email alerts
|

Disadvantaged by Disability: Examining the Accessibility of Cyber Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…This shows that BA increased usability for people without disabilities yet remains inaccessible for people with disabilities. Others have also found this, e.g., Blanco-Gonzalo et al [11] and Furnell et al [26], [27].…”
Section: Lack Of Accessible Authentication Forces Users With Disabili...mentioning
confidence: 64%
See 1 more Smart Citation
“…This shows that BA increased usability for people without disabilities yet remains inaccessible for people with disabilities. Others have also found this, e.g., Blanco-Gonzalo et al [11] and Furnell et al [26], [27].…”
Section: Lack Of Accessible Authentication Forces Users With Disabili...mentioning
confidence: 64%
“…For example, Blanco-Gonzalo et al [11] found that people with physical impairments have difficulties using BA and don't present an improvement over KBA for them. In a literature review and a survey of people with physical and other impairments as well as people working with them, Furnell et al [26], [27] found that KBA was used predominantly, despite showing the most issues regarding security and usability, and that TBA as well as BA do not constitute viable alternatives. Conducting semi-structured interviews with 8 adults with upper extremity impairments, Lewis and Venkatasubramanian [41] found that KBA presents a challenge to them.…”
Section: Disability and Authenticationmentioning
confidence: 99%
“…The sub-sections that follow expand upon the summary from Table 1, providing further commentary upon each of the ten ICF functions, and considering their potential relevance in the context of the different authentication categories. This discussion is an extended version of the initial assessment presented in Furnell et al (2021).…”
Section: Comparison Between Current Methods and Icf-list Featuresmentioning
confidence: 99%
“…The discussion in the sections that follow examine the range of user authentication approaches, considering their applicability from the disability perspective. It expands upon an initial assessment presented in Furnell et al (2021), which presents an initial review of methods in the context of the International Classification of Functioning, Disability and Health (ICF) checklist and presents an associated validation of user needs. The current paper presents a more substantial exploration of the issues, including a series of illustrative examples that highlight some of characteristic problems facing users with disabilities in the authentication context, supported by an extended discussion of security and usability issues set against the ICF criteria.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, inclusivity is related to: (1) physical access to digital devices, (2) skills to navigate the digital world, and (3) inequalities of access [45]. Furnell et al [46] used the International Classification of Functioning, Disability and Health (ICF) checklist to compare security and usability factors of different authentication methods. Challenges in usability or security were identified for all the authentication methods they considered.…”
Section: Accessibility and Inclusivitymentioning
confidence: 99%