Skip to main content
Top

2021 | OriginalPaper | Chapter

Disadvantaged by Disability: Examining the Accessibility of Cyber Security

Authors : Steven Furnell, Kirsi Helkala, Naomi Woods

Published in: Universal Access in Human-Computer Interaction. Design Methods and User Experience

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Today, we are living in a digitally dependent world. Through the use of digital technologies, life is meant to be easier and streamlined. This includes giving access to services that previously were unavailable to many due to disability. Although technology has evolved immensely over the past few decades, reducing the digital divide, authentication methods have changed very little. Authentication is the forefront of securing users’ information, services and technology, yet for many it still poses issues in terms of usability and security, due to specific characteristics of different disabilities. In this paper, drawing upon a literature review, a review of recognized disabilities, and the results of a small questionnaire study, we review the current authentication methods and discuss the potential issues that users with different disabilities face when interacting with these methods. We identify the specific aspects of disabilities that lead users to struggle to authenticate themselves. The results of this study lead to several recommendations, and suggestions for extending the existing inclusive technology framework to the authentication context. Through extending the framework, this could guide the development of future technologies, systems and services, ensuring that they are not only digitally inclusive in their function, but digitally inclusive in their security.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
2.
go back to reference Chadwick, D.D., Chapman, M., Caton, S.: Digital inclusion for people with an intellectual disability. In: Attrill-Smith, A., Fullwood, C., Keep, M., Kuss, D.J. (eds.) The Oxford Handbook of Cyberpsychology. Oxford University Press, UK (2019) Chadwick, D.D., Chapman, M., Caton, S.: Digital inclusion for people with an intellectual disability. In: Attrill-Smith, A., Fullwood, C., Keep, M., Kuss, D.J. (eds.) The Oxford Handbook of Cyberpsychology. Oxford University Press, UK (2019)
3.
go back to reference Chadwick, D., Wesson, C.: Digital inclusion and disability. In: Attrill, A., Fullwood, C. (eds.) Applied Cyberpsychology. Palgrave Macmillan, London (2016) Chadwick, D., Wesson, C.: Digital inclusion and disability. In: Attrill, A., Fullwood, C. (eds.) Applied Cyberpsychology. Palgrave Macmillan, London (2016)
4.
go back to reference Clarke, N.L., Furnell, S.M.: Advanced user authentication for mobile devices. Comput. Secur. 26(2), 109–119 (2007)CrossRef Clarke, N.L., Furnell, S.M.: Advanced user authentication for mobile devices. Comput. Secur. 26(2), 109–119 (2007)CrossRef
5.
go back to reference D’Aubin, A.: Working for barrier removal in the ICT area: creating a more accessible and inclusive Canada: a position statement by the council of Canadians with disabilities. Inf. Soc. 23(3), 193–201 (2007)CrossRef D’Aubin, A.: Working for barrier removal in the ICT area: creating a more accessible and inclusive Canada: a position statement by the council of Canadians with disabilities. Inf. Soc. 23(3), 193–201 (2007)CrossRef
6.
go back to reference De. Angeli, A., Coventry, L., Johnson, G., Renaud, K.: Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. Int. J. Hum. Comput. Stud. 63(1–2), 128–152 (2005)CrossRef De. Angeli, A., Coventry, L., Johnson, G., Renaud, K.: Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. Int. J. Hum. Comput. Stud. 63(1–2), 128–152 (2005)CrossRef
8.
go back to reference Dobransky, K., Hargittai, E.: The disability divide in internet access and use. Inf., Commun. (Soc., Spec. Issue: Disabil., Identity, Interdependence: ICTs New Soc. Forms) 9(3), 313–334 (2006) Dobransky, K., Hargittai, E.: The disability divide in internet access and use. Inf., Commun. (Soc., Spec. Issue: Disabil., Identity, Interdependence: ICTs New Soc. Forms) 9(3), 313–334 (2006)
12.
go back to reference Foley, A., Ferri, B.A.: Technology for people, not disabilities: ensuring access and inclusion. J. Res. Spec. Educ. Needs 12(4), 192–200 (2012)CrossRef Foley, A., Ferri, B.A.: Technology for people, not disabilities: ensuring access and inclusion. J. Res. Spec. Educ. Needs 12(4), 192–200 (2012)CrossRef
13.
go back to reference Haga, W.J., Zviran, M.: Question-and-answer passwords: an empirical evaluation. Inf. Syst. 16(3), 335–343 (1991)CrossRef Haga, W.J., Zviran, M.: Question-and-answer passwords: an empirical evaluation. Inf. Syst. 16(3), 335–343 (1991)CrossRef
14.
go back to reference Helkala, K.: Disabilities and authentication methods: usability and security. In: 7th International Proceedings on Availability, Reliability and Security, pp. 327–334. IEEE Computer Society, Prague, Czech Republic (2012) Helkala, K.: Disabilities and authentication methods: usability and security. In: 7th International Proceedings on Availability, Reliability and Security, pp. 327–334. IEEE Computer Society, Prague, Czech Republic (2012)
15.
go back to reference Helkala, K., Snekkenes, E.: A method for ranking authentication products. In: 2nd International Proceedings on Human Aspects of Information Security & Assurance, pp. 80–93. Plymount, UK (2008) Helkala, K., Snekkenes, E.: A method for ranking authentication products. In: 2nd International Proceedings on Human Aspects of Information Security & Assurance, pp. 80–93. Plymount, UK (2008)
16.
go back to reference Herley, C., Van Oorschot, P.: A research agenda acknowledging the persistence of passwords. IEEE Secur. Priv. 10(1), 28–36 (2012)CrossRef Herley, C., Van Oorschot, P.: A research agenda acknowledging the persistence of passwords. IEEE Secur. Priv. 10(1), 28–36 (2012)CrossRef
17.
go back to reference Hoppestad, B.S.: Current perspective regarding adults with intellectual and developmental disabilities accessing computer technology. Disabil. Rehabil. Assist. Technol. 8(3), 190–194 (2013)CrossRef Hoppestad, B.S.: Current perspective regarding adults with intellectual and developmental disabilities accessing computer technology. Disabil. Rehabil. Assist. Technol. 8(3), 190–194 (2013)CrossRef
18.
go back to reference Korać, D., Simić, D.: Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment. Comput. Secur. 85, 313–332 (2019)CrossRef Korać, D., Simić, D.: Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment. Comput. Secur. 85, 313–332 (2019)CrossRef
19.
go back to reference Ma, W., Campbell, J., Tran, D., Kleeman, D.: Password entropy and password quality. In: 4th International Proceedings on Network and System Security, pp. 583–587. IEEE, Melbourne, Australia (2010) Ma, W., Campbell, J., Tran, D., Kleeman, D.: Password entropy and password quality. In: 4th International Proceedings on Network and System Security, pp. 583–587. IEEE, Melbourne, Australia (2010)
21.
go back to reference Norman, K.L.: Cyberpsychology: An Introduction to Human-Computer Interaction. Cambridge University Press, UK (2017)CrossRef Norman, K.L.: Cyberpsychology: An Introduction to Human-Computer Interaction. Cambridge University Press, UK (2017)CrossRef
22.
go back to reference O’Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91(12), 2021–2040 (2003) O’Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91(12), 2021–2040 (2003)
23.
go back to reference Ogbanufe, O., Kim, D.J.: Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment. Decision Support Systems. vol. 106, 1–14, (2018). ISSN 0167-9236 Ogbanufe, O., Kim, D.J.: Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment. Decision Support Systems. vol. 106, 1–14, (2018). ISSN 0167-9236
24.
go back to reference Ruggiero, T.E.: Uses and gratifications theory in the 21st century. Mass Commun. Soc. 3(1), 3–37 (2000)CrossRef Ruggiero, T.E.: Uses and gratifications theory in the 21st century. Mass Commun. Soc. 3(1), 3–37 (2000)CrossRef
26.
go back to reference Schneier, B.: Identification and Authentication. Secrets and Lies: Digital Security in a Networked World, pp. 135–150 (2015) Schneier, B.: Identification and Authentication. Secrets and Lies: Digital Security in a Networked World, pp. 135–150 (2015)
28.
go back to reference Song, J., Wang, D., Yun, Z., Han, X.: Alphapwd: a password generation strategy based on mnemonic shape. IEEE Access 7, 119052–119059 (2019)CrossRef Song, J., Wang, D., Yun, Z., Han, X.: Alphapwd: a password generation strategy based on mnemonic shape. IEEE Access 7, 119052–119059 (2019)CrossRef
29.
go back to reference Still, J., Cain, A., Schuster, D.: Human-centered authentication guidelines. Inf. Comput. Secur. 25(4), 437–453 (2017)CrossRef Still, J., Cain, A., Schuster, D.: Human-centered authentication guidelines. Inf. Comput. Secur. 25(4), 437–453 (2017)CrossRef
30.
go back to reference Stobert, E., Biddle, R.: Memory retrieval and graphical passwords. In: 9th International Proceedings of on Usable Privacy and Security, pp. 1–14, Newcastle, UK (2013) Stobert, E., Biddle, R.: Memory retrieval and graphical passwords. In: 9th International Proceedings of on Usable Privacy and Security, pp. 1–14, Newcastle, UK (2013)
31.
go back to reference Trokielewicz, M., Czajka, A., Maciejewicz, P.: Cataract influence on iris recognition performance. In: 35th International Proceedings on Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments, pp. 1–14. IEEE-SPIE (2014). Trokielewicz, M., Czajka, A., Maciejewicz, P.: Cataract influence on iris recognition performance. In: 35th International Proceedings on Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments, pp. 1–14. IEEE-SPIE (2014).
36.
go back to reference Zviran, M., Haga, W.J.: Password security: an empirical study. J. Manag. Inf. Syst. 15(4), 161–185 (1999)CrossRef Zviran, M., Haga, W.J.: Password security: an empirical study. J. Manag. Inf. Syst. 15(4), 161–185 (1999)CrossRef
Metadata
Title
Disadvantaged by Disability: Examining the Accessibility of Cyber Security
Authors
Steven Furnell
Kirsi Helkala
Naomi Woods
Copyright Year
2021
DOI
https://doi.org/10.1007/978-3-030-78092-0_13