2010 International Conference on Information Society 2010
DOI: 10.1109/i-society16502.2010.6018741
|View full text |Cite
|
Sign up to set email alerts
|

Accessible and secure? Design constraints on image and sound based passwords

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…The roles played by the various authentication systems on the internet are considered as how the users are being digitally divided and excluded. The primary factors that are considered and highlighted are psychological as well as material and skill-oriented barriers (Gibson et al, 2010). And it is observed that a number of disagreements of accessibility and security goals are exhibited in image-and sound-based authentication systems.…”
Section: Literature Surveymentioning
confidence: 99%
“…The roles played by the various authentication systems on the internet are considered as how the users are being digitally divided and excluded. The primary factors that are considered and highlighted are psychological as well as material and skill-oriented barriers (Gibson et al, 2010). And it is observed that a number of disagreements of accessibility and security goals are exhibited in image-and sound-based authentication systems.…”
Section: Literature Surveymentioning
confidence: 99%
“…Although awareness is growing, surrounding the need to design for diverse users, interface designers often find themselves in a situation where they are forced to choose security goals over their conflicting access-oriented goals [15]. Individuals who are blind favor performing tasks independently, rather than relying on sighted users to aid them with computing interactions.…”
Section: The Need For An Accessible Solutionmentioning
confidence: 99%