“…While this impairment has a limited scope in terms of the most authentication methods, there can be issues with regards to voice/speaker recognition, as speech is explicitly required (Lewis et al 2020). If a user is unable to speak, or unable to do so consistency, then this method will be inaccessible.…”