Abstract
Today, we are living in a digitally dependent world. Through the use of digital technologies, life is meant to be easier and streamlined. This includes giving access to services that previously were unavailable to many due to disability. Although technology has evolved immensely over the past few decades, reducing the digital divide, authentication methods have changed very little. Authentication is the forefront of securing users’ information, services and technology, yet for many it still poses issues in terms of usability and security, due to specific characteristics of different disabilities. In this paper, drawing upon a literature review, a review of recognized disabilities, and the results of a small questionnaire study, we review the current authentication methods and discuss the potential issues that users with different disabilities face when interacting with these methods. We identify the specific aspects of disabilities that lead users to struggle to authenticate themselves. The results of this study lead to several recommendations, and suggestions for extending the existing inclusive technology framework to the authentication context. Through extending the framework, this could guide the development of future technologies, systems and services, ensuring that they are not only digitally inclusive in their function, but digitally inclusive in their security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Centre for Excellence in Universal Design (CEUD): The 7 Principles of Universal Design. http://universaldesign.ie/What-is-Universal-Design/The-7-Principles/. Accessed 31 March 2020
Chadwick, D.D., Chapman, M., Caton, S.: Digital inclusion for people with an intellectual disability. In: Attrill-Smith, A., Fullwood, C., Keep, M., Kuss, D.J. (eds.) The Oxford Handbook of Cyberpsychology. Oxford University Press, UK (2019)
Chadwick, D., Wesson, C.: Digital inclusion and disability. In: Attrill, A., Fullwood, C. (eds.) Applied Cyberpsychology. Palgrave Macmillan, London (2016)
Clarke, N.L., Furnell, S.M.: Advanced user authentication for mobile devices. Comput. Secur. 26(2), 109–119 (2007)
D’Aubin, A.: Working for barrier removal in the ICT area: creating a more accessible and inclusive Canada: a position statement by the council of Canadians with disabilities. Inf. Soc. 23(3), 193–201 (2007)
De. Angeli, A., Coventry, L., Johnson, G., Renaud, K.: Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. Int. J. Hum. Comput. Stud. 63(1–2), 128–152 (2005)
Disabled World: Types of disability list, Disability World. www.disabled-world.com/disability/types/. Accessed 12 March 2020
Dobransky, K., Hargittai, E.: The disability divide in internet access and use. Inf., Commun. (Soc., Spec. Issue: Disabil., Identity, Interdependence: ICTs New Soc. Forms) 9(3), 313–334 (2006)
European Accessibility Act (EEA): Directive (EU) 2019/882 of the European Parliament and of the Council of 17 April 2019 on the accessibility requirements for products and services (2019). https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:32019L0882
European Disability Strategy 2010–2020: A Renewed Commitment to a Barrier-Free Europe (2010). https://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2010:0636:FIN:en:PDF
Firger, J.: Handwriting changes can indicate Alzheimer’s progression (2013). https://www.everydayhealth.com/alzheimers/handwriting-changes-can-indicate-alzheimers-progression-8042.aspx
Foley, A., Ferri, B.A.: Technology for people, not disabilities: ensuring access and inclusion. J. Res. Spec. Educ. Needs 12(4), 192–200 (2012)
Haga, W.J., Zviran, M.: Question-and-answer passwords: an empirical evaluation. Inf. Syst. 16(3), 335–343 (1991)
Helkala, K.: Disabilities and authentication methods: usability and security. In: 7th International Proceedings on Availability, Reliability and Security, pp. 327–334. IEEE Computer Society, Prague, Czech Republic (2012)
Helkala, K., Snekkenes, E.: A method for ranking authentication products. In: 2nd International Proceedings on Human Aspects of Information Security & Assurance, pp. 80–93. Plymount, UK (2008)
Herley, C., Van Oorschot, P.: A research agenda acknowledging the persistence of passwords. IEEE Secur. Priv. 10(1), 28–36 (2012)
Hoppestad, B.S.: Current perspective regarding adults with intellectual and developmental disabilities accessing computer technology. Disabil. Rehabil. Assist. Technol. 8(3), 190–194 (2013)
Korać, D., Simić, D.: Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment. Comput. Secur. 85, 313–332 (2019)
Ma, W., Campbell, J., Tran, D., Kleeman, D.: Password entropy and password quality. In: 4th International Proceedings on Network and System Security, pp. 583–587. IEEE, Melbourne, Australia (2010)
NIST: Special Publication 800-63B, Digital Identity Guidelines: Authentication and Lifecycle Management (2017). https://doi.org/10.6028/NIST.SP.800-63b
Norman, K.L.: Cyberpsychology: An Introduction to Human-Computer Interaction. Cambridge University Press, UK (2017)
O’Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91(12), 2021–2040 (2003)
Ogbanufe, O., Kim, D.J.: Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment. Decision Support Systems. vol. 106, 1–14, (2018). ISSN 0167-9236
Ruggiero, T.E.: Uses and gratifications theory in the 21st century. Mass Commun. Soc. 3(1), 3–37 (2000)
Røssvoll, T.H., Fuglerud, K.S.: Best practice for efficient development of inclusive ICT. In: Stephanidis, C., Antona, M. (eds.) UAHCI 2013. LNCS, vol. 8009, pp. 97–106. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39188-0_11
Schneier, B.: Identification and Authentication. Secrets and Lies: Digital Security in a Networked World, pp. 135–150 (2015)
Seladi-Schulman, J.: How people who are deaf learn to talk. https://www.healthline.com/health/can-deaf-people-talk#nonverbal-communication. Accessed 09 Sep 2020
Song, J., Wang, D., Yun, Z., Han, X.: Alphapwd: a password generation strategy based on mnemonic shape. IEEE Access 7, 119052–119059 (2019)
Still, J., Cain, A., Schuster, D.: Human-centered authentication guidelines. Inf. Comput. Secur. 25(4), 437–453 (2017)
Stobert, E., Biddle, R.: Memory retrieval and graphical passwords. In: 9th International Proceedings of on Usable Privacy and Security, pp. 1–14, Newcastle, UK (2013)
Trokielewicz, M., Czajka, A., Maciejewicz, P.: Cataract influence on iris recognition performance. In: 35th International Proceedings on Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments, pp. 1–14. IEEE-SPIE (2014).
United Nations Convention on the Rights of Persons with Disabilities (UN CRPD) (2008). https://www.un.org/development/desa/disabilities/convention-on-the-rights-of-persons-with-disabilities.html
Vapen, A., Shahmehri, N.: Security levels for web authentication using mobile phones. In: Fischer-Hübner, S., Duquenoy, P., Hansen, M., Leenes, R., Zhang, G. (eds.) Privacy and Identity 2010. IAICT, vol. 352, pp. 130–143. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20769-3_11
Wang, Y.ṇ: Universal Authentication: Towards Accessible Authentication for Everyone. https://cups.cs.cmu.edu/soups/2014/workshops/papers/accessible_wang_17.pdf. Accessed 01 Feb 2021
World Health Organization (WHO): International Classification of Functioning, Disability and Health. https://www.who.int/classifications/icf/en/. Accessed 10 Aug 2020
Zviran, M., Haga, W.J.: Password security: an empirical study. J. Manag. Inf. Syst. 15(4), 161–185 (1999)
Acknowledgements
The questionnaire is approved by the Norwegian Centre for Research Data and belongs to the project “Digitalisering, autentisering og funksjonshemning” (reference nr. 393208).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix
Appendix
The information letter, consent form and questionnaire were all originally written in Finnish and Norwegian. The following is a translated summary of the question text, in order to clarify the specific points that were covered.
-
1.
How has digitalization in general affected the quality of your life in the last 10 years? (A few tips: access to services, running things, socializing, working, studying, transport, traveling, etc.)
-
a.
Positive things
-
b.
Negative things
-
c.
Changes in general
-
a.
-
2.
What «login» methods do you have on digital devices? Why did you choose these methods (many devices have different options)?
-
a.
Computer (at work and at home)
-
b.
Telephone (at work and at home)
-
c.
Other smart device (e.g. tablet, clock)
-
a.
-
3.
Think of digital services (e.g. banking services, insurance company) and apps (e.g. VR mobile, Teams, Vilma) that you use via computer or phone.
-
a.
What «login» methods do you have for digital services or apps?
-
b.
Why did you choose these particular methods (many services and apps have many options)?
-
a.
-
4.
In Sects. 2 and 3, you listed the identification methods you used. I hope you will now evaluate their practicality for you.
-
a.
What make them difficult/easy to use?
-
b.
Are there differences in their use between a computer, phone and/or other smart device?
-
c.
How could their usability be improved?
-
a.
-
5.
What is your «dream» identification method? What would it be based on? What would it contain? «Your dream» does not have to be true or even achievable☺
-
6.
Security in the digital world is also enhanced by other methods, such as “are you a robot” questions, warning sounds, various messages and guidance. How practical are these for you? Are there examples of activities that are problematic for you?
Background information:
-
1.
How old are you?
-
2.
What disability do you have?
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Furnell, S., Helkala, K., Woods, N. (2021). Disadvantaged by Disability: Examining the Accessibility of Cyber Security. In: Antona, M., Stephanidis, C. (eds) Universal Access in Human-Computer Interaction. Design Methods and User Experience. HCII 2021. Lecture Notes in Computer Science(), vol 12768. Springer, Cham. https://doi.org/10.1007/978-3-030-78092-0_13
Download citation
DOI: https://doi.org/10.1007/978-3-030-78092-0_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78091-3
Online ISBN: 978-3-030-78092-0
eBook Packages: Computer ScienceComputer Science (R0)