Understanding How People with Upper Extremity Impairments Authenticate on Their Personal Devices
CAE in Cybersecurity Community via YouTube
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the challenges and solutions for device authentication faced by individuals with upper extremity impairments in this 23-minute talk by Brittany Lewis from the University of Rhode Island's Department of Computer Sciences and Statistics. Delve into existing authentication processes, research questions, and methodologies used to understand the unique barriers these users encounter. Learn about complex password issues, failure resolution strategies, and safety precautions implemented. Gain insights into future research directions and participate in a Q&A session to further discuss accessibility in cybersecurity for people with physical limitations.
Syllabus
Introduction
Upper Extremity Impairments
Accessibility
Existing Authentication Processes
Authentication Process
Research Questions
Methodology
Authentication
Reasons for Authentication
Barriers
Complex passwords
Failure Resolution
Background
Safety Precautions
Future Research
Questions
Chat Questions
Taught by
CAE in Cybersecurity Community