[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge

Published: 22 June 2022 Publication History

Abstract

It has been argued that human-centred security design needs to accommodate the considerations of three dimensions: (1) security, (2) usability and (3) accessibility. The latter has not yet received much attention. Now that governments and health services are increasingly requiring their citizens/patients to use online services, the need for accessible security and privacy has become far more pressing. The reality is that, for many, security measures are often exasperatingly inaccessible. Regardless of the outcome of the debate about the social acceptability of compelling people to access public services online, we still need to design accessibility into these systems, or risk excluding and marginalising swathes of the population who cannot use these systems in the same way as abled users. These users are particularly vulnerable to attack and online deception not only because security and privacy controls are inaccessible but also because they often struggle with depleted resources and capabilities together with less social, economic and political resilience. This conceptual paper contemplates the accessible dimension of human-centred security and its impact on the inclusivity of security technologies. We scope the range of vulnerabilities that can result from a lack of accessibility in security solutions and contemplate the nuances and complex challenges inherent in making security accessible. We conclude by suggesting a number of avenues for future work in this space.

References

[1]
Aal K, Weibert A, Talhouk R, Vlachokyriakos V, Fisher K, Wulf V. Refugees & technology: determining the role of hci research. In: Proceedings of the ACM conference on supporting groupwork, pp. 362–364 (2018)
[2]
Albrecht MR, Blasco J, Jensen RB, Mareková L. Collective Information Security in {Large-Scale} Urban Protests: the Case of Hong Kong. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 3363–3380 (2021)
[3]
Alkaldi N and Renaud K Migrant: modeling smartphone password manager adoption using migration theory ACM SIGMIS Datab DATABASE Adv Inf Syst 2022 53 2 63-95
[4]
Alzahrani L, Al-Karaghouli W, and Weerakkody V Investigating the impact of citizens’ trust toward the successful adoption of e-government: a multigroup analysis of gender, age, and internet experience Inf Syst Manag 2018 35 2 124-146
[5]
Anderson B. Lessons every organization can learn from surging accessibility lawsuits. https://codemantra.com/surging-accessibility-lawsuits/ Accessed 3 2020.
[6]
Anderson B. 2020—The Year of Digital Accessibility in the European Union (EU) (2020). https://codemantra.com/directive-eu-20162102-accessibility-law/ Accessed 5 2020.
[7]
Andrew S, Watson S, Oh T, Tigwell GW. A review of literature on accessibility and authentication techniques. In: The 22nd International ACM SIGACCESS conference on computers and accessibility, 2020, pp 1–4.
[8]
Ashenden D and Lawrence D Security dialogues: building better relationships between security and business IEEE Security Privacy 2016 14 3 82-87
[9]
Bennett CL A toolkit for facilitating accessible design with blind people ACM SIGACCESS Access Comput 2018 120 16-19
[10]
Black R, Waller A, Turner R, and Reiter E Supporting personal narrative for children with complex communication needs ACM Trans Comput Hum Interact (TOCHI) 2012 19 2 1-35
[11]
Boss SR, Galletta DF, Lowry PB, Moody GD, and Polak P What do systems users have to fear? using fear appeals to engender threats and fear that motivate protective security behaviors MIS Q 2015 39 4 837-864
[12]
Briggs P and Thomas L An inclusive, value sensitive design perspective on future identity technologies ACM Trans Comput Hum Interact (TOCHI) 2015 22 5 1-28
[13]
Brinkley J, Huff Jr EW. Inclusion by Design: A 75-Minute Crash Course on Accessible Design. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 64, pp. 831–835. SAGE Publications Sage CA: Los Angeles, CA 2020.
[14]
Cain AA, Edwards ME, and Still JD An exploratory study of cyber hygiene behaviors and knowledge J Inf Secur Appl 2018 42 36-45
[15]
Carmeli E, Patish H, and Coleman R The aging hand J Gerontol A Biol Sci Med Sci 2003 58 2 M146-M152
[16]
Carter J and Markel M Web accessibility for people with disabilities: an introduction for web developers IEEE Trans Prof Commun 2001 44 4 225-233
[17]
Chen MF Impact of fear appeals on pro-environmental behavior and crucial determinants Int J Advert 2016 35 1 74-92
[18]
Chiang MF, Cole RG, Gupta S, Kaiser GE, and Starren JB Computer and world wide web accessibility by visually disabled patients: problems and solutions Surv Ophthalmol 2005 50 4 394-405
[19]
Cho H. Unintended effects of fear appeals: The role of stage of change, threat, and efficacy. Ph.D. thesis, Mass Media PhD Program, Michigan State University 1999.
[20]
Coles-Kemp L, Jensen RB. Accessing a new land: Designing for a social conceptualisation of access. In: Proceedings of the CHI conference on human factors in computing systems, pp. 1–12, 2019.
[21]
Coles-Kemp L, Jensen RB, Talhouk R. In a new land: mobile phones, amplified pressures and reduced capabilities. In: Proceedings of the CHI conference on human factors in computing systems, pp. 1–13, 2018.
[22]
Csontos B and Heckl I Accessibility, usability, and security evaluation of Hungarian government websites Univ Access Inf Soc 2021 20 1 139-156
[23]
Disability Rights Education & Defense Fund: NAD v. Netflix (2012). https://dredf.org/legal-advocacy/nad-v-netflix/ Accessed 5 2020.
[24]
Dosono B, Hayes J, and Wang Y Toward accessible authentication: learning from people with visual impairments IEEE Internet Comput 2018 22 2 62-70
[25]
Doty RL Immigration and the politics of security Secur Stud 1998 8 2–3 71-93
[26]
Duarte C, Costa D, and Carriço L Innovative accessible interfaces Wiley Handb Hum Comput Interact 2018 2 715-730
[27]
Dunphy P, Vines J, Coles-Kemp L, Clarke R, Vlachokyriakos V, Wright P, McCarthy J, Olivier P. Understanding the experience-centeredness of privacy and security technologies. In: Proceedings of the new security paradigms workshop, 2014; pp. 83–94.
[28]
Elisa N Usability, accessibility and web security assessment of e-government websites in Tanzania Int J Comput Appl 2020 164 5 42-48
[29]
Fajardo I, Vigo M, and Salmerón L Technology for supporting web information search and learning in sign language Interact Comput 2009 21 4 243-256
[30]
Freed D, Palmer J, Minchala D, Levy K, Ristenpart T, Dell N. “A Stalker’s Paradise” How Intimate Partner Abusers Exploit Technology. In: Proceedings of the CHI conference on human factors in computing systems, 2018; pp 1–13.
[31]
Gilbert RM Inclusive design for a digital world 2019 New York AEPress
[32]
Harmon K. Can you lose your fingerprints? (2009). Retrieved 13 Sep from https://www.scientificamerican.com/article/lose-your-fingerprints/
[33]
Hassanat A, Al-Awadi M, Btoush E, Al-Btoush A, Alhasanat E, and Altarawneh G New mobile phone and webcam hand images databases for personal authentication and identification Procedia Manuf 2015 3 4060-4067
[34]
Hayes J, Li X, Wang Y. “I Always Have to Think About It First” Authentication Experiences of People with Cognitive Impairments. In: Proceedings of the 19th International ACM SIGACCESS conference on computers and accessibility, 2017; pp 357–58.
[35]
Hielsher J, Kluge A, Menges U, Sasse MA. “Taking out the Trash”: why security behavior change requires intentional forgetting. In: New Security Paradigms Workshop. Online 2021.
[36]
Ho YL, Bendrissou B, Azman A, and Lau SH Blindlogin: a graphical authentication system with support for blind and visually impaired users on smartphones Am J Appl Sci 2017 14 5 551-559
[37]
Hooper P. Sheerness carer gemma day took thousands from sittingbourne couple with dementia 2021. https://www.kentonline.co.uk/medway/news/dementia-couples-carer-raided-bank-account-253766/.
[38]
Hutter L and Lawrence HM Promoting inclusive and accessible design in usability testing: a teaching case with users who are deaf Commun Design Quart Rev 2018 6 2 21-30
[39]
Jay C, Stevens R, Glencross M, Chalmers A, and Yang C How people use presentation to search for a link: expanding the understanding of accessibility on the web Univ Access Inf Soc 2007 6 3 307-320
[40]
Jeong H, Jung H. MonoPass: a password manager without master password authentication. In: 26th international conference on intelligent user interfaces, 2021; pp 52–4.
[41]
Kalysch A, Bove D, Müller T. How Android’s UI security is undermined by accessibility. In: Proceedings of the 2nd reversing and offensive-oriented trends symposium, 2018; pp 1–10.
[42]
Kaur A, Dani D, Agrawal G. Evaluating the accessibility, usability and security of Hospitals websites: an exploratory study. In: 7th international conference on cloud computing, data science & engineering confluence, 2017; pp 674–80. IEEE.
[43]
Kazansky B “It depends on your threat model”: the anticipatory dimensions of resistance to data-driven surveillance Big Data Soc 2021 8 1 2053951720985557
[44]
Kerkmann F and Lewandowski D Accessibility of web search engines Libr Rev 2012 61 8/9 608-621
[45]
Kokila B, Pravinthraja S, Saranya K, Savitha S, and Kavitha N Continuous authentication system using multiple modalities Int J Pure Appl Math 2017 117 15 1129-1142
[46]
Kushalnagar R Yesilada Y and Harper S Deafness and hearing loss Web accessibility 2019 New York Springer 35-47
[47]
Kuzma JM Accessibility design issues with UK e-government sites Government Inf Quart. 2010 27 2 141-6
[48]
Le Dantec CA. Exploring mobile technologies for the urban homeless. In: CHI’10 extended abstracts on human factors in computing systems, 2010; pp 2883–6.
[49]
Levin N, Hepler J. Digital literacy insights can help improve privacy experiences (2022). TTC Labs https://www.ttclabs.net/research/digital-literacy-insights-can-help-improve-privacy-experiences.
[50]
Lewis L, Sharpe S, Cooper Z. Designing out disability: providing insights into the transport needs of disabled rail passengers. In: 7th international rail human factors conference. Online (2021). https://www.researchgate.net/publication/352836626_Designing_out_disability_Providing_insights_into_the_transport_needs_of_disabled_rail_passengers.
[51]
Lobo S, Hirom U, Shyama V, Basumatori M, Doke P. Coping with accessibility challenges for security - a user study with blind smartphone users. In: ifip conference on human-computer interaction, pp. 3–22. Springer (2017).
[52]
Ma Y, Feng J, Kumin L, and Lazar J Investigating user behavior for authentication methods: a comparison between individuals with Down syndrome and neurotypical users ACM Trans Access Comput (TACCESS) 2013 4 4 1-27
[53]
Matthews T, O’Leary K, Turner A, Sleeper M, Woelfer JP, Shelton M, Manthorne C, Churchill EF, Consolvo S. Stories from survivors: privacy & security practices when coping with intimate partner abuse. In: Proceedings of the CHI conference on human factors in computing systems, pp. 2189–201 (2017).
[54]
McCarthy JE and Swierenga SJ What we know about dyslexia and web accessibility: a research review Univ Access Inf Soc 2010 9 2 147-152
[55]
McDonald N, Mentis HM. Building for ‘we’: safety settings for couples with memory concerns. In: Proceedings of the CHI conference on human factors in computing systems, 2021; pp. 1–11.
[56]
Mcdonald N and Mentis HM “Citizens Too”: safety setting collaboration among older adults with memory concerns ACM Trans Comput Hum Interact (TOCHI) 2021 28 5 1-32
[57]
McGuire M McGuire MR and Holt TJ Technology crime and technology control: contexts and history The Routledge handbook of technology, crime and justice 2017 Oxon Routledge 35-60
[58]
Mentis HM, Madjaroff G, Massey AK. Upside and downside risk in online security for older adults with mild cognitive impairment. In: Proceedings of the CHI conference on human factors in computing systems, 2019. pp. 1–13.
[59]
Mi N, Cavuoto LA, Benson K, Smith-Jackson T, and Nussbaum MA A heuristic checklist for an accessible smartphone interface design Univ Access Inf Soc 2014 13 4 351-365
[60]
Morbey H, Harding AJ, Swarbrick C, Ahmed F, Elvish R, Keady J, Williamson PR, and Reilly ST Involving people living with dementia in research: an accessible modified Delphi survey for core outcome set development Trials 2019 20 1 1-10
[61]
Morris Z, Goodman N, McGarity S. Living with a disability is very expensive—even with government assistance (2021). https://theconversation.com/living-with-a-disability-is-very-expensive-even-with-government-assistance-157283.
[62]
Murbach K. Self-efficacy in information security: a mixed methods study of deaf end-users. Ph.D. thesis, Dakota State University 2019.
[63]
Napoli D. Developing accessible and usable security (ACCUS) heuristics. In: Extended abstracts of the CHI conference on human factors in computing systems, 2018. pp. 1–6.
[64]
Nielsen J. Finding usability problems through heuristic evaluation. In: Proceedings of the SIGCHI conference on human factors in computing systems, 1992. pp. 373–80.
[65]
Noble SU Algorithms of oppression 2018 New York New York University Press
[66]
Numans W, Regenmortel TV, Schalk R, and Boog J Vulnerable persons in society: an insider’s perspective Int J Qual Stud Health Well Being 2021 16 1 1863598
[67]
O’Neil C. Weapons of math destruction: how big data increases inequality and threatens democracy. Broadway Books 2016.
[68]
Owens K, Cobb C, Cranor L. “You Gotta Watch What You Say”: surveillance of Communication with Incarcerated People. In: Proceedings of the CHI conference on human factors in computing systems, 2021. pp. 1–18.
[69]
Parkin S, Patel T, Lopez-Neira I, Tanczer L. Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse. In: Proceedings of the new security paradigms workshop, 2019. pp. 1–15. Online.
[70]
Persson H, Åhman H, Yngling AA, and Gulliksen J Universal design, inclusive design, accessible design, design for all: different concepts-one goal? on the concept of accessibility-historical, methodological and philosophical aspects Univ Access Inf Soc 2015 14 4 505-526
[71]
Reddington J, Coles-Kemp L. Trap hunting: finding personal data management issues in next generation aac devices. In: Proceedings of the second workshop on speech and language processing for assistive technologies, 2011. pp. 32–42.
[72]
Reeves A, Delfabbro P, and Calic D Encouraging employee engagement with cybersecurity: how to tackle cyber fatigue SAGE Open 2021 11 1 21582440211000049
[73]
Renaud K. Accessible cyber security: the next frontier? In: Mori P, Gabriele L, Furnell S. (eds.) Proceedings of the 7th international conference on information systems security and privacy (ICISSP), 2020. pp. 9–18. https://doi.org/10.5220/0010419500090018.
[74]
Renaud K, Dupuis M. Cyber security fear appeals: unexpectedly complicated. In: Proceedings of the new security paradigms workshop, 2019. pp. 42–56.
[75]
Renaud K, Flowerday S, Warkentin M, Cockshott P, and Orgeron C Is the responsibilization of the cyber security risk reasonable and judicious? Comput Secur 2018 78 198-211
[76]
Renaud K, Johnson G, and Ophoff J Accessible authentication: dyslexia and password strategies Inf Comput Secur 2021 29 4 604-624
[77]
Renaud K, Otondo R, and Warkentin M “This is the way ‘I’ create my passwords” ... does the endowment effect deter people from changing the way they create their passwords? Comput Secur 2019 82 241-260
[78]
Renaud K, Zimmermann V, Schürmann T, and Böhm C Exploring cybersecurity-related emotions and finding that they are challenging to measure Humanit Soc Sci Commun 2021 8 1 1-17
[79]
Roe P The ‘value’ of positive security Rev Int Stud 2008 34 4 777-794
[80]
Rosner D, Taylor A, Wiberg M, and Windle A The urgency for access Interactions 2021 28 3 5-5
[81]
Roth M. Hardening the build through the inclusion of people with disabilities and accessible design. In: APHA’s 2020 Virtual Annual Meeting and Expo (Oct. 24–28). American Public Health Association 2020.
[82]
Rui Z and Yan Z A survey on biometric authentication: toward secure and privacy-preserving identification IEEE Access 2018 7 5994-6009
[83]
SCOPE: Social model of disability (2021). https://www.scope.org.uk/about-us/social-model-of-disability/. Accessed 17 Sep 2021.
[84]
Scott IU, Feuer WJ, and Jacko JA Impact of graphical user interface screen features on computer task accuracy and speed in a cohort of patients with age-related macular degeneration Am J Ophthalmol 2002 134 6 857-862
[85]
Scottish Government: NHS Recovery Plan (2021). https://www.gov.scot/publications/nhs-recovery-plan/. Accessed 4 Sep 2021.
[86]
Seabright P The company of strangers 2010 Princeton Princeton University Press
[87]
Shinn M, Gottlieb J, Wett JL, Bahl A, Cohen A, and Baron Ellis D Predictors of homelessness among older adults in New York City: disability, economic, human and social capital and stressful events J Health Psychol 2007 12 5 696-708
[88]
Shinohara K, Bennett CL, Pratt W, and Wobbrock JO Tenets for social accessibility: Towards humanizing disabled people in design ACM Transactions on Accessible Computing (TACCESS) 2018 11 1 1-31
[89]
Shirali-Shahreza S. Shirali-Shahreza MH. Accessibility of CAPTCHA methods. In: Proceedings of the 4th ACM workshop on security and artificial intelligence, 2011. pp. 109–10.
[90]
Sleeper M, Matthews T, O’Leary K, Turner A, Woelfer JP, Shelton M, Oplinger A, Schou, A, Consolvo S. Tough times at transitional homeless shelters: Considering the impact of financial insecurity on digital security and privacy. In: Proceedings of the CHI conference on human factors in computing systems, 2019. pp. 1–12.
[91]
Slupska J, Dawson Duckworth SD, Ma L, Neff G. Participatory threat modelling: exploring paths to reconfigure cybersecurity. In: Extended abstracts of the CHI conference on human factors in computing systems, 2021. pp. 1–6.
[92]
Slupska J, Tanczer LM. Threat modeling intimate partner violence: tech abuse as a cybersecurity challenge in the internet of things. In: The emerald international handbook of technology facilitated violence and abuse. Emerald Publishing Limited 2021.
[93]
Sonowal G and Kuppusamy K MMSPHID: a phoneme based phishing verification model for persons with visual impairments Inf Comput Secur 2018 26 5 613-636
[94]
Stanford B Barriers at the ballot box: the (In)accessibility of UK polling stations Coventry Law J 2019 24 1 87-92
[95]
Sternthal B and Craig CS Fear appeals: revisited and revised J Consumer Res 1974 1 3 22-34
[96]
Stowers GN Becoming cyberactive: state and local governments on the world wide web Gov Inf Q 1999 16 2 111-127
[97]
Strohmayer A, Clamen J, Laing M. Technologies for social justice: lessons from sex workers on the front lines. In: Proceedings of the CHI conference on human factors in computing systems, 2019. pp. 1–14.
[98]
Talhouk R, Coles-Kemp L, Jensen RB, Balaam M, Garbett A, Ghattas H, Araujo-Soares V, Ahmad B, and Montague K Food aid technology: the experience of a Syrian refugee community in coping with food insecurity Proc ACM Hum Comput Interact 2020 4 CSCW2 1-25
[99]
Tanaka A and Benjamin Knapp R Jensenius AR and Lyons MJ 2002: multimodal interaction in music using the electromyogram and relative position sensing A NIME reader: fifteen years of new interfaces for musical expression 2017 Cham Springer International Publishing 45-58
[100]
Tian H, Kanich C, Polakis J, Patil S. Tech pains: characterizations of lived cybersecurity experiences. In: 2020 IEEE European symposium on security and privacy workshops (EuroS &PW), pp. 250–259. IEEE 2020.
[101]
Tielsch JM, Sommer A, Witt K, Katz J, and Royall RM Blindness and visual impairment in an American urban population: the Baltimore Eye Survey Arch Ophthalmol 1990 108 2 286-290
[102]
Torres L, Pina V, and Acerete B E-government developments on delivering public services among eu cities Gov Inf Q 2005 22 2 217-238
[103]
Traynor L, Nicholson A. Two years ‘not enough’ for carer who stole £22k from pensioners (2021). https://www.liverpoolecho.co.uk/news/liverpool-news/two-years-not-enough-carer-21423445.
[104]
Trendafilova ZK Discussing cybersecurity safeguards between older adults with mild cognitive impairment and their caregivers 2019 Baltimore University of Maryland
[105]
Van Dijk J The network society 2020 4 London Sage
[106]
Van Dijk JA. Digital divide: impact of access. The international encyclopedia of media effects 2017. pp. 1–11.
[107]
Vaniea KE, Rader E, Wash R. Betrayed by updates: how negative experiences affect future security. In: Proceedings of the SIGCHI conference on human factors in computing systems, 2014. pp. 2671–74.
[108]
Vigo M, Arrue M, Brajnik G, Lomuscio R, Abascal J. Quantitative metrics for measuring web accessibility. In: Proceedings of the international cross-disciplinary conference on web accessibility (W4A), 2007. pp. 99–107.
[109]
Vigo M and Harper S Coping tactics employed by visually disabled users on the web Int J Hum Comput Stud 2013 71 11 1013-1025
[110]
W3C: Accessibility (2018). https://www.w3.org/standards/webdesign/accessibility Accessed 26 2020.
[111]
W3C: Web Content Accessibility Guidelines (WCAG) 2.1 (2018). https://www.w3.org/TR/WCAG21/
[112]
W3C: Understanding Success Criterion 3.3.7: Accessible Authentication (2020). https://www.w3.org/WAI/WCAG22/Understanding/accessible-authentication
[113]
Wang Y. The third wave? Inclusive privacy and security. In: Proceedings of the 2017 new security paradigms workshop, 2017. pp. 122–30.
[114]
Warner S. It’s All About Self-Confidence and Self-Esteem. Scott Warner 2021.
[115]
WCAG: Understanding success criterion 3.3.7: Accessible authentication (2015). https://www.w3.org/WAI/WCAG22/Understanding/accessible-authentication
[116]
Wevers R. Unmasking biometrics’ biases: facing gender, race, class and ability in biometric data collection. TMG J Media History 2018;21(2).
[117]
Xie I, Babu R, Lee TH, Castillo MD, You S, and Hanlon AM Enhancing usability of digital libraries: designing help features to support blind and visually impaired users Inf Process Manag 2020 57 3 102110
[118]
Zimmermann G and Vanderheiden G Accessible design and testing in the application development process: considerations for an integrated approach Univ Access Inf Soc 2008 7 1 117-128

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image SN Computer Science
SN Computer Science  Volume 3, Issue 5
Aug 2022
1292 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 22 June 2022
Accepted: 31 May 2022
Received: 16 November 2021

Author Tags

  1. Accessibility
  2. Cyber security
  3. Vulnerability

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Building Cyber Attack Trees with the Help of My LLM? A Mixed Method StudyProceedings of the 2024 12th International Conference on Computer and Communications Management10.1145/3688268.3688288(132-138)Online publication date: 19-Jul-2024
  • (2024)Inclusive Internet of Things Privacy LabelsIEEE Security and Privacy10.1109/MSEC.2024.341781922:5(32-39)Online publication date: 1-Sep-2024
  • (2024)Inclusive Involvement of At-Risk Users in Cybersecurity ResearchIEEE Security and Privacy10.1109/MSEC.2024.341687822:5(13-22)Online publication date: 1-Sep-2024
  • (2023)‘Ought’ should not assume ‘Can’? Basic Capabilities in Cybersecurity to Ground Sen’s Capability ApproachProceedings of the 2023 New Security Paradigms Workshop10.1145/3633500.3633506(76-91)Online publication date: 18-Sep-2023
  • (2023)A Network Security Test Evaluation Model of Automobile Digital KeyProceedings of the 8th International Conference on Cyber Security and Information Engineering10.1145/3617184.3630131(193-199)Online publication date: 22-Sep-2023
  • (2023)Would US citizens accept cybersecurity deresponsibilization? Perhaps notComputers and Security10.1016/j.cose.2023.103301131:COnline publication date: 1-Aug-2023
  • (2023)Towards Human-Centric Endpoint SecuritySecurity Protocols XXVIII10.1007/978-3-031-43033-6_21(211-219)Online publication date: 27-Mar-2023
  • (2023)Privacy, Safety, and Security in Extended Reality: User Experience Challenges for Neurodiverse UsersHCI for Cybersecurity, Privacy and Trust10.1007/978-3-031-35822-7_33(511-528)Online publication date: 23-Jul-2023
  • (2022)From Utility to Capability: A New Paradigm to Conceptualize and Develop Inclusive PETsProceedings of the 2022 New Security Paradigms Workshop10.1145/3584318.3584323(60-74)Online publication date: 24-Oct-2022

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media