Главная
Study mode:
on
1
Introduction
2
Upper Extremity Impairments
3
Accessibility
4
Existing Authentication Processes
5
Authentication Process
6
Research Questions
7
Methodology
8
Authentication
9
Reasons for Authentication
10
Barriers
11
Complex passwords
12
Failure Resolution
13
Background
14
Safety Precautions
15
Future Research
16
Questions
17
Chat Questions
Description:
Explore the challenges and solutions for device authentication faced by individuals with upper extremity impairments in this 23-minute talk by Brittany Lewis from the University of Rhode Island's Department of Computer Sciences and Statistics. Delve into existing authentication processes, research questions, and methodologies used to understand the unique barriers these users encounter. Learn about complex password issues, failure resolution strategies, and safety precautions implemented. Gain insights into future research directions and participate in a Q&A session to further discuss accessibility in cybersecurity for people with physical limitations.

Understanding How People with Upper Extremity Impairments Authenticate on Their Personal Devices

CAE in Cybersecurity Community
Add to list
0:00 / 0:00