2022
DOI: 10.1007/s42979-022-01239-1
|View full text |Cite
|
Sign up to set email alerts
|

Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge

Abstract: It has been argued that human-centred security design needs to accommodate the considerations of three dimensions: (1) security, (2) usability and (3) accessibility. The latter has not yet received much attention. Now that governments and health services are increasingly requiring their citizens/patients to use online services, the need for accessible security and privacy has become far more pressing. The reality is that, for many, security measures are often exasperatingly inaccessible. Regardless of the outc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(17 citation statements)
references
References 93 publications
0
16
0
1
Order By: Relevance
“…Quantifying the impacts of cyberattacks on health care organizations can be a challenge as many factors should be considered. Among these are limited data (as these data tend be self-reported, which can limit the accuracy of results), the methodologies used (whether they consider direct costs or both direct and indirect costs), the cost variation (as it depends on factors such as the type of attack, downtime, organization size, and value of compromised data), or the context (how these incidents affect the organization’s daily operations, patient safety, and public trust) [ 24 , 25 ]. Moreover, the ramifications of cyberattacks transcend economic impacts, and health outcomes should also be considered, which may be more difficult to measure and quantify compared to the financial costs of such incidents [ 23 ].…”
Section: Discussionmentioning
confidence: 99%
“…Quantifying the impacts of cyberattacks on health care organizations can be a challenge as many factors should be considered. Among these are limited data (as these data tend be self-reported, which can limit the accuracy of results), the methodologies used (whether they consider direct costs or both direct and indirect costs), the cost variation (as it depends on factors such as the type of attack, downtime, organization size, and value of compromised data), or the context (how these incidents affect the organization’s daily operations, patient safety, and public trust) [ 24 , 25 ]. Moreover, the ramifications of cyberattacks transcend economic impacts, and health outcomes should also be considered, which may be more difficult to measure and quantify compared to the financial costs of such incidents [ 23 ].…”
Section: Discussionmentioning
confidence: 99%
“…populations". This results in a narrow picture of users that assumes they are fully abled, cognitively unimpaired, and have the necessary resources and required dexterity to interact with security systems [56]. Apart from recruitment, people with disabilities can effectively be excluded by the study designs, depending on the impairment.…”
Section: Inclusive and Accessible Security And Privacymentioning
confidence: 99%
“…Apart from recruitment, people with disabilities can effectively be excluded by the study designs, depending on the impairment. Lack of research and support can leave them more vulnerable in the realm of S&P [56], [72] -and may violate existing guidelines and regulations [72]. In 2017, Wang [72] advocated for a third wave of security research, aiming at designing S&P mechanisms "that are inclusive to people with various characteristics, abilities, needs and values".…”
Section: Inclusive and Accessible Security And Privacymentioning
confidence: 99%
See 2 more Smart Citations