Abstract
AbstractIt has been argued that human-centred security design needs to accommodate the considerations of three dimensions: (1) security, (2) usability and (3) accessibility. The latter has not yet received much attention. Now that governments and health services are increasingly requiring their citizens/patients to use online services, the need for accessible security and privacy has become far more pressing. The reality is that, for many, security measures are often exasperatingly inaccessible. Regardless of the outcome of the debate about the social acceptability of compelling people to access public services online, we still need to design accessibility into these systems, or risk excluding and marginalising swathes of the population who cannot use these systems in the same way as abled users. These users are particularly vulnerable to attack and online deception not only because security and privacy controls are inaccessible but also because they often struggle with depleted resources and capabilities together with less social, economic and political resilience. This conceptual paper contemplates the accessible dimension of human-centred security and its impact on the inclusivity of security technologies. We scope the range of vulnerabilities that can result from a lack of accessibility in security solutions and contemplate the nuances and complex challenges inherent in making security accessible. We conclude by suggesting a number of avenues for future work in this space.
Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Computer Networks and Communications,Computer Graphics and Computer-Aided Design,Computational Theory and Mathematics,Artificial Intelligence,General Computer Science
Reference118 articles.
1. Aal K, Weibert A, Talhouk R, Vlachokyriakos V, Fisher K, Wulf V. Refugees & technology: determining the role of hci research. In: Proceedings of the ACM conference on supporting groupwork, pp. 362–364 (2018)
2. Albrecht MR, Blasco J, Jensen RB, Mareková L. Collective Information Security in $$\{$$Large-Scale$$\}$$ Urban Protests: the Case of Hong Kong. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 3363–3380 (2021)
3. Alkaldi N, Renaud K. Migrant: modeling smartphone password manager adoption using migration theory. ACM SIGMIS Datab DATABASE Adv Inf Syst. 2022;53(2):63–95.
4. Alzahrani L, Al-Karaghouli W, Weerakkody V. Investigating the impact of citizens’ trust toward the successful adoption of e-government: a multigroup analysis of gender, age, and internet experience. Inf Syst Manag. 2018;35(2):124–46.
5. Anderson B. Lessons every organization can learn from surging accessibility lawsuits. https://codemantra.com/surging-accessibility-lawsuits/ Accessed 3 2020.
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献