[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2384916.2384973acmconferencesArticle/Chapter ViewAbstractPublication PagesassetsConference Proceedingsconference-collections
poster

Investigating authentication methods used by individuals with down syndrome

Published: 22 October 2012 Publication History

Abstract

Although there have been numerous studies investigating password usage by neurotypical users, a paucity of research has been conducted to examine the use of authentication methods used by individuals with cognitive impairment. In this paper, we report a longitudinal study that investigates how individuals with Down syndrome interact with three user authentication mechanisms. It confirms that many individuals with DS are capable of using traditional alphanumeric passwords as well as learning other authentication methods. Contrary to previous belief, the result suggests that mnemonic passwords may not be easier to remember for individuals with DS during initial usage.

References

[1]
Adams, A. and Sasse, A. (1999). Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures. Communications of the ACM, 42(12), 40--46.
[2]
Brostoff, S. and Sasse, A. (2000). Are Passfaces More Usable Than Passwords? A Field Trial Investigation. Proceedings of HCI 2000, 405--424.
[3]
Feng, J., Lazar, J., Kumin, L., and Ozok, A. (2010). Computer usage by children with Down syndrome: Challenges and future research. ACM Transactions on Accessible Computing. Vol. 2(3). 13--56.
[4]
Grawemeyer, B. and Johnson, H. (2011). Using and managing multiple passwords: A week to a view. Interacting with Computers. Vol. 23(3). 256--267.
[5]
Kuo, C., Romanosky, S., and Cranor, L. (2006). Human selection of mnemonic phrase-based passwords. Proceedings of SOUPS 2006. 67--68.

Cited By

View all
  • (2024)A3C: An Image-Association-Based Computing Device Authentication Framework for People with Upper Extremity ImpairmentsACM Transactions on Accessible Computing10.1145/365252217:2(1-37)Online publication date: 19-Mar-2024
  • (2024)Investigating the Potential of User Interface Shortcuts and Control Panes to Support Mobile Phone Use by People with Mild Dementia – a Diary StudyExtended Abstracts of the CHI Conference on Human Factors in Computing Systems10.1145/3613905.3651039(1-7)Online publication date: 11-May-2024
  • (2022)Technology-enhanced support for children with Down SyndromeInternational Journal of Child-Computer Interaction10.1016/j.ijcci.2021.10034031:COnline publication date: 1-Mar-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ASSETS '12: Proceedings of the 14th international ACM SIGACCESS conference on Computers and accessibility
October 2012
321 pages
ISBN:9781450313216
DOI:10.1145/2384916

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 October 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. authentication
  2. cognitive impairment
  3. down syndrome

Qualifiers

  • Poster

Conference

ASSETS '12
Sponsor:

Acceptance Rates

Overall Acceptance Rate 436 of 1,556 submissions, 28%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A3C: An Image-Association-Based Computing Device Authentication Framework for People with Upper Extremity ImpairmentsACM Transactions on Accessible Computing10.1145/365252217:2(1-37)Online publication date: 19-Mar-2024
  • (2024)Investigating the Potential of User Interface Shortcuts and Control Panes to Support Mobile Phone Use by People with Mild Dementia – a Diary StudyExtended Abstracts of the CHI Conference on Human Factors in Computing Systems10.1145/3613905.3651039(1-7)Online publication date: 11-May-2024
  • (2022)Technology-enhanced support for children with Down SyndromeInternational Journal of Child-Computer Interaction10.1016/j.ijcci.2021.10034031:COnline publication date: 1-Mar-2022
  • (2022)Accessible PrivacyModern Socio-Technical Perspectives on Privacy10.1007/978-3-030-82786-1_13(293-313)Online publication date: 9-Feb-2022
  • (2021)“I...Got my Nose-Print. But it Wasn’t Accurate”: How People with Upper Extremity Impairment Authenticate on their Personal Computing DevicesProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445070(1-14)Online publication date: 6-May-2021
  • (2020)A Review of Literature on Accessibility and Authentication TechniquesProceedings of the 22nd International ACM SIGACCESS Conference on Computers and Accessibility10.1145/3373625.3418005(1-4)Online publication date: 26-Oct-2020
  • (2018)BraillePassword: accessible web authentication technique on touchscreen devicesJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-018-0860-x10:6(2375-2391)Online publication date: 19-May-2018
  • (2016)Accessibility barriers to online education for young adults with intellectual disabilitiesProceedings of the 13th International Web for All Conference10.1145/2899475.2899481(1-10)Online publication date: 11-Apr-2016
  • (2015)Employment in Adults with Down Syndrome in the United States: Results from a National SurveyJournal of Applied Research in Intellectual Disabilities10.1111/jar.1218229:4(330-345)Online publication date: 6-Apr-2015
  • (2013)Investigating User Behavior for Authentication MethodsACM Transactions on Accessible Computing10.1145/2493171.24931734:4(1-27)Online publication date: 1-Jul-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media