Skip to main content

Disadvantaged by Disability: Examining the Accessibility of Cyber Security

  • Conference paper
  • First Online:
Universal Access in Human-Computer Interaction. Design Methods and User Experience (HCII 2021)

Abstract

Today, we are living in a digitally dependent world. Through the use of digital technologies, life is meant to be easier and streamlined. This includes giving access to services that previously were unavailable to many due to disability. Although technology has evolved immensely over the past few decades, reducing the digital divide, authentication methods have changed very little. Authentication is the forefront of securing users’ information, services and technology, yet for many it still poses issues in terms of usability and security, due to specific characteristics of different disabilities. In this paper, drawing upon a literature review, a review of recognized disabilities, and the results of a small questionnaire study, we review the current authentication methods and discuss the potential issues that users with different disabilities face when interacting with these methods. We identify the specific aspects of disabilities that lead users to struggle to authenticate themselves. The results of this study lead to several recommendations, and suggestions for extending the existing inclusive technology framework to the authentication context. Through extending the framework, this could guide the development of future technologies, systems and services, ensuring that they are not only digitally inclusive in their function, but digitally inclusive in their security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Centre for Excellence in Universal Design (CEUD): The 7 Principles of Universal Design. http://universaldesign.ie/What-is-Universal-Design/The-7-Principles/. Accessed 31 March 2020

  2. Chadwick, D.D., Chapman, M., Caton, S.: Digital inclusion for people with an intellectual disability. In: Attrill-Smith, A., Fullwood, C., Keep, M., Kuss, D.J. (eds.) The Oxford Handbook of Cyberpsychology. Oxford University Press, UK (2019)

    Google Scholar 

  3. Chadwick, D., Wesson, C.: Digital inclusion and disability. In: Attrill, A., Fullwood, C. (eds.) Applied Cyberpsychology. Palgrave Macmillan, London (2016)

    Google Scholar 

  4. Clarke, N.L., Furnell, S.M.: Advanced user authentication for mobile devices. Comput. Secur. 26(2), 109–119 (2007)

    Article  Google Scholar 

  5. D’Aubin, A.: Working for barrier removal in the ICT area: creating a more accessible and inclusive Canada: a position statement by the council of Canadians with disabilities. Inf. Soc. 23(3), 193–201 (2007)

    Article  Google Scholar 

  6. De. Angeli, A., Coventry, L., Johnson, G., Renaud, K.: Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. Int. J. Hum. Comput. Stud. 63(1–2), 128–152 (2005)

    Article  Google Scholar 

  7. Disabled World: Types of disability list, Disability World. www.disabled-world.com/disability/types/. Accessed 12 March 2020

  8. Dobransky, K., Hargittai, E.: The disability divide in internet access and use. Inf., Commun. (Soc., Spec. Issue: Disabil., Identity, Interdependence: ICTs New Soc. Forms) 9(3), 313–334 (2006)

    Google Scholar 

  9. European Accessibility Act (EEA): Directive (EU) 2019/882 of the European Parliament and of the Council of 17 April 2019 on the accessibility requirements for products and services (2019). https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:32019L0882

  10. European Disability Strategy 2010–2020: A Renewed Commitment to a Barrier-Free Europe (2010). https://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2010:0636:FIN:en:PDF

  11. Firger, J.: Handwriting changes can indicate Alzheimer’s progression (2013). https://www.everydayhealth.com/alzheimers/handwriting-changes-can-indicate-alzheimers-progression-8042.aspx

  12. Foley, A., Ferri, B.A.: Technology for people, not disabilities: ensuring access and inclusion. J. Res. Spec. Educ. Needs 12(4), 192–200 (2012)

    Article  Google Scholar 

  13. Haga, W.J., Zviran, M.: Question-and-answer passwords: an empirical evaluation. Inf. Syst. 16(3), 335–343 (1991)

    Article  Google Scholar 

  14. Helkala, K.: Disabilities and authentication methods: usability and security. In: 7th International Proceedings on Availability, Reliability and Security, pp. 327–334. IEEE Computer Society, Prague, Czech Republic (2012)

    Google Scholar 

  15. Helkala, K., Snekkenes, E.: A method for ranking authentication products. In: 2nd International Proceedings on Human Aspects of Information Security & Assurance, pp. 80–93. Plymount, UK (2008)

    Google Scholar 

  16. Herley, C., Van Oorschot, P.: A research agenda acknowledging the persistence of passwords. IEEE Secur. Priv. 10(1), 28–36 (2012)

    Article  Google Scholar 

  17. Hoppestad, B.S.: Current perspective regarding adults with intellectual and developmental disabilities accessing computer technology. Disabil. Rehabil. Assist. Technol. 8(3), 190–194 (2013)

    Article  Google Scholar 

  18. Korać, D., Simić, D.: Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment. Comput. Secur. 85, 313–332 (2019)

    Article  Google Scholar 

  19. Ma, W., Campbell, J., Tran, D., Kleeman, D.: Password entropy and password quality. In: 4th International Proceedings on Network and System Security, pp. 583–587. IEEE, Melbourne, Australia (2010)

    Google Scholar 

  20. NIST: Special Publication 800-63B, Digital Identity Guidelines: Authentication and Lifecycle Management (2017). https://doi.org/10.6028/NIST.SP.800-63b

  21. Norman, K.L.: Cyberpsychology: An Introduction to Human-Computer Interaction. Cambridge University Press, UK (2017)

    Book  Google Scholar 

  22. O’Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91(12), 2021–2040 (2003)

    Google Scholar 

  23. Ogbanufe, O., Kim, D.J.: Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment. Decision Support Systems. vol. 106, 1–14, (2018). ISSN 0167-9236

    Google Scholar 

  24. Ruggiero, T.E.: Uses and gratifications theory in the 21st century. Mass Commun. Soc. 3(1), 3–37 (2000)

    Article  Google Scholar 

  25. Røssvoll, T.H., Fuglerud, K.S.: Best practice for efficient development of inclusive ICT. In: Stephanidis, C., Antona, M. (eds.) UAHCI 2013. LNCS, vol. 8009, pp. 97–106. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39188-0_11

    Chapter  Google Scholar 

  26. Schneier, B.: Identification and Authentication. Secrets and Lies: Digital Security in a Networked World, pp. 135–150 (2015)

    Google Scholar 

  27. Seladi-Schulman, J.: How people who are deaf learn to talk. https://www.healthline.com/health/can-deaf-people-talk#nonverbal-communication. Accessed 09 Sep 2020

  28. Song, J., Wang, D., Yun, Z., Han, X.: Alphapwd: a password generation strategy based on mnemonic shape. IEEE Access 7, 119052–119059 (2019)

    Article  Google Scholar 

  29. Still, J., Cain, A., Schuster, D.: Human-centered authentication guidelines. Inf. Comput. Secur. 25(4), 437–453 (2017)

    Article  Google Scholar 

  30. Stobert, E., Biddle, R.: Memory retrieval and graphical passwords. In: 9th International Proceedings of on Usable Privacy and Security, pp. 1–14, Newcastle, UK (2013)

    Google Scholar 

  31. Trokielewicz, M., Czajka, A., Maciejewicz, P.: Cataract influence on iris recognition performance. In: 35th International Proceedings on Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments, pp. 1–14. IEEE-SPIE (2014).

    Google Scholar 

  32. United Nations Convention on the Rights of Persons with Disabilities (UN CRPD) (2008). https://www.un.org/development/desa/disabilities/convention-on-the-rights-of-persons-with-disabilities.html

  33. Vapen, A., Shahmehri, N.: Security levels for web authentication using mobile phones. In: Fischer-Hübner, S., Duquenoy, P., Hansen, M., Leenes, R., Zhang, G. (eds.) Privacy and Identity 2010. IAICT, vol. 352, pp. 130–143. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20769-3_11

    Chapter  Google Scholar 

  34. Wang, Y.ṇ: Universal Authentication: Towards Accessible Authentication for Everyone. https://cups.cs.cmu.edu/soups/2014/workshops/papers/accessible_wang_17.pdf. Accessed 01 Feb 2021

  35. World Health Organization (WHO): International Classification of Functioning, Disability and Health. https://www.who.int/classifications/icf/en/. Accessed 10 Aug 2020

  36. Zviran, M., Haga, W.J.: Password security: an empirical study. J. Manag. Inf. Syst. 15(4), 161–185 (1999)

    Article  Google Scholar 

Download references

Acknowledgements

The questionnaire is approved by the Norwegian Centre for Research Data and belongs to the project “Digitalisering, autentisering og funksjonshemning” (reference nr. 393208).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Steven Furnell .

Editor information

Editors and Affiliations

Appendix

Appendix

The information letter, consent form and questionnaire were all originally written in Finnish and Norwegian. The following is a translated summary of the question text, in order to clarify the specific points that were covered.

  1. 1.

    How has digitalization in general affected the quality of your life in the last 10 years? (A few tips: access to services, running things, socializing, working, studying, transport, traveling, etc.)

    1. a.

      Positive things

    2. b.

      Negative things

    3. c.

      Changes in general

  2. 2.

    What «login» methods do you have on digital devices? Why did you choose these methods (many devices have different options)?

    1. a.

      Computer (at work and at home)

    2. b.

      Telephone (at work and at home)

    3. c.

      Other smart device (e.g. tablet, clock)

  3. 3.

    Think of digital services (e.g. banking services, insurance company) and apps (e.g. VR mobile, Teams, Vilma) that you use via computer or phone.

    1. a.

      What «login» methods do you have for digital services or apps?

    2. b.

      Why did you choose these particular methods (many services and apps have many options)?

  4. 4.

    In Sects. 2 and 3, you listed the identification methods you used. I hope you will now evaluate their practicality for you.

    1. a.

      What make them difficult/easy to use?

    2. b.

      Are there differences in their use between a computer, phone and/or other smart device?

    3. c.

      How could their usability be improved?

  5. 5.

    What is your «dream» identification method? What would it be based on? What would it contain? «Your dream» does not have to be true or even achievable☺

  6. 6.

    Security in the digital world is also enhanced by other methods, such as “are you a robot” questions, warning sounds, various messages and guidance. How practical are these for you? Are there examples of activities that are problematic for you?

Background information:

  1. 1.

    How old are you?

  2. 2.

    What disability do you have?

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Furnell, S., Helkala, K., Woods, N. (2021). Disadvantaged by Disability: Examining the Accessibility of Cyber Security. In: Antona, M., Stephanidis, C. (eds) Universal Access in Human-Computer Interaction. Design Methods and User Experience. HCII 2021. Lecture Notes in Computer Science(), vol 12768. Springer, Cham. https://doi.org/10.1007/978-3-030-78092-0_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78092-0_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78091-3

  • Online ISBN: 978-3-030-78092-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics