Sarah Andrew, Stacey Watson, T. Oh, Garreth W. Tigwell
{"title":"A Review of Literature on Accessibility and Authentication Techniques","authors":"Sarah Andrew, Stacey Watson, T. Oh, Garreth W. Tigwell","doi":"10.1145/3373625.3418005","DOIUrl":null,"url":null,"abstract":"Reliable and accessible authentication techniques are required to maintain privacy and security. This is paramount as technology plays an increasing role in our lives. In this paper, we examine the previous work on accessible authentication techniques for blind/low vision people, deaf/hard-of-hearing people, people with cognitive impairments, and people with motor impairments. We seek to identify gaps in the current research to advocate where future efforts are needed to create authentication techniques that will work for everyone. We found a lot of variability in prior work investigating the accessibility of authentication techniques, including shortfalls and gaps in the literature. We make recommendations on the directions future research should take.","PeriodicalId":433618,"journal":{"name":"Proceedings of the 22nd International ACM SIGACCESS Conference on Computers and Accessibility","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 22nd International ACM SIGACCESS Conference on Computers and Accessibility","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3373625.3418005","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
Reliable and accessible authentication techniques are required to maintain privacy and security. This is paramount as technology plays an increasing role in our lives. In this paper, we examine the previous work on accessible authentication techniques for blind/low vision people, deaf/hard-of-hearing people, people with cognitive impairments, and people with motor impairments. We seek to identify gaps in the current research to advocate where future efforts are needed to create authentication techniques that will work for everyone. We found a lot of variability in prior work investigating the accessibility of authentication techniques, including shortfalls and gaps in the literature. We make recommendations on the directions future research should take.