{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T22:30:13Z","timestamp":1767652213672,"version":"3.41.0"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030780913"},{"type":"electronic","value":"9783030780920"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-78092-0_13","type":"book-chapter","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T23:20:19Z","timestamp":1625268019000},"page":"197-212","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Disadvantaged by Disability: Examining the Accessibility of Cyber Security"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0984-7542","authenticated-orcid":false,"given":"Steven","family":"Furnell","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3698-4585","authenticated-orcid":false,"given":"Kirsi","family":"Helkala","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5692-5163","authenticated-orcid":false,"given":"Naomi","family":"Woods","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"key":"13_CR1","unstructured":"Centre for Excellence in Universal Design (CEUD): The 7 Principles of Universal Design. http:\/\/universaldesign.ie\/What-is-Universal-Design\/The-7-Principles\/. Accessed 31 March 2020"},{"key":"13_CR2","volume-title":"The Oxford Handbook of Cyberpsychology","author":"DD Chadwick","year":"2019","unstructured":"Chadwick, D.D., Chapman, M., Caton, S.: Digital inclusion for people with an intellectual disability. In: Attrill-Smith, A., Fullwood, C., Keep, M., Kuss, D.J. (eds.) The Oxford Handbook of Cyberpsychology. Oxford University Press, UK (2019)"},{"key":"13_CR3","volume-title":"Applied Cyberpsychology","author":"D Chadwick","year":"2016","unstructured":"Chadwick, D., Wesson, C.: Digital inclusion and disability. In: Attrill, A., Fullwood, C. (eds.) Applied Cyberpsychology. Palgrave Macmillan, London (2016)"},{"issue":"2","key":"13_CR4","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.cose.2006.08.008","volume":"26","author":"NL Clarke","year":"2007","unstructured":"Clarke, N.L., Furnell, S.M.: Advanced user authentication for mobile devices. Comput. Secur. 26(2), 109\u2013119 (2007)","journal-title":"Comput. Secur."},{"issue":"3","key":"13_CR5","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1080\/01972240701323622","volume":"23","author":"A D\u2019Aubin","year":"2007","unstructured":"D\u2019Aubin, A.: Working for barrier removal in the ICT area: creating a more accessible and inclusive Canada: a position statement by the council of Canadians with disabilities. Inf. Soc. 23(3), 193\u2013201 (2007)","journal-title":"Inf. Soc."},{"issue":"1\u20132","key":"13_CR6","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.ijhcs.2005.04.020","volume":"63","author":"A De Angeli","year":"2005","unstructured":"De. Angeli, A., Coventry, L., Johnson, G., Renaud, K.: Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. Int. J. Hum. Comput. Stud. 63(1\u20132), 128\u2013152 (2005)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"13_CR7","unstructured":"Disabled World: Types of disability list, Disability World. www.disabled-world.com\/disability\/types\/. Accessed 12 March 2020"},{"issue":"3","key":"13_CR8","first-page":"313","volume":"9","author":"K Dobransky","year":"2006","unstructured":"Dobransky, K., Hargittai, E.: The disability divide in internet access and use. Inf., Commun. (Soc., Spec. Issue: Disabil., Identity, Interdependence: ICTs New Soc. Forms) 9(3), 313\u2013334 (2006)","journal-title":"Inf., Commun. (Soc., Spec. Issue: Disabil., Identity, Interdependence: ICTs New Soc. Forms)"},{"key":"13_CR9","unstructured":"European Accessibility Act (EEA): Directive (EU) 2019\/882 of the European Parliament and of the Council of 17 April 2019 on the accessibility requirements for products and services (2019). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/ALL\/?uri=CELEX:32019L0882"},{"key":"13_CR10","unstructured":"European Disability Strategy 2010\u20132020: A Renewed Commitment to a Barrier-Free Europe (2010). https:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=COM:2010:0636:FIN:en:PDF"},{"key":"13_CR11","unstructured":"Firger, J.: Handwriting changes can indicate Alzheimer\u2019s progression (2013). https:\/\/www.everydayhealth.com\/alzheimers\/handwriting-changes-can-indicate-alzheimers-progression-8042.aspx"},{"issue":"4","key":"13_CR12","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1111\/j.1471-3802.2011.01230.x","volume":"12","author":"A Foley","year":"2012","unstructured":"Foley, A., Ferri, B.A.: Technology for people, not disabilities: ensuring access and inclusion. J. Res. Spec. Educ. Needs 12(4), 192\u2013200 (2012)","journal-title":"J. Res. Spec. Educ. Needs"},{"issue":"3","key":"13_CR13","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1016\/0306-4379(91)90005-T","volume":"16","author":"WJ Haga","year":"1991","unstructured":"Haga, W.J., Zviran, M.: Question-and-answer passwords: an empirical evaluation. Inf. Syst. 16(3), 335\u2013343 (1991)","journal-title":"Inf. Syst."},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Helkala, K.: Disabilities and authentication methods: usability and security. In: 7th International Proceedings on Availability, Reliability and Security, pp. 327\u2013334. IEEE Computer Society, Prague, Czech Republic (2012)","DOI":"10.1109\/ARES.2012.19"},{"key":"13_CR15","unstructured":"Helkala, K., Snekkenes, E.: A method for ranking authentication products. In: 2nd International Proceedings on Human Aspects of Information Security & Assurance, pp. 80\u201393. Plymount, UK (2008)"},{"issue":"1","key":"13_CR16","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2011.150","volume":"10","author":"C Herley","year":"2012","unstructured":"Herley, C., Van Oorschot, P.: A research agenda acknowledging the persistence of passwords. IEEE Secur. Priv. 10(1), 28\u201336 (2012)","journal-title":"IEEE Secur. Priv."},{"issue":"3","key":"13_CR17","doi-asserted-by":"publisher","first-page":"190","DOI":"10.3109\/17483107.2012.723239","volume":"8","author":"BS Hoppestad","year":"2013","unstructured":"Hoppestad, B.S.: Current perspective regarding adults with intellectual and developmental disabilities accessing computer technology. Disabil. Rehabil. Assist. Technol. 8(3), 190\u2013194 (2013)","journal-title":"Disabil. Rehabil. Assist. Technol."},{"key":"13_CR18","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1016\/j.cose.2019.05.011","volume":"85","author":"D Kora\u0107","year":"2019","unstructured":"Kora\u0107, D., Simi\u0107, D.: Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment. Comput. Secur. 85, 313\u2013332 (2019)","journal-title":"Comput. Secur."},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Ma, W., Campbell, J., Tran, D., Kleeman, D.: Password entropy and password quality. In: 4th International Proceedings on Network and System Security, pp. 583\u2013587. IEEE, Melbourne, Australia (2010)","DOI":"10.1109\/NSS.2010.18"},{"key":"13_CR20","doi-asserted-by":"publisher","unstructured":"NIST: Special Publication 800-63B, Digital Identity Guidelines: Authentication and Lifecycle Management (2017). https:\/\/doi.org\/10.6028\/NIST.SP.800-63b","DOI":"10.6028\/NIST.SP.800-63b"},{"key":"13_CR21","doi-asserted-by":"publisher","DOI":"10.1017\/9781316212554","volume-title":"Cyberpsychology: An Introduction to Human-Computer Interaction","author":"KL Norman","year":"2017","unstructured":"Norman, K.L.: Cyberpsychology: An Introduction to Human-Computer Interaction. Cambridge University Press, UK (2017)"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"O\u2019Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91(12), 2021\u20132040 (2003)","DOI":"10.1109\/JPROC.2003.819611"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Ogbanufe, O., Kim, D.J.: Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment. Decision Support Systems. vol. 106, 1\u201314, (2018). ISSN 0167-9236","DOI":"10.1016\/j.dss.2017.11.003"},{"issue":"1","key":"13_CR24","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1207\/S15327825MCS0301_02","volume":"3","author":"TE Ruggiero","year":"2000","unstructured":"Ruggiero, T.E.: Uses and gratifications theory in the 21st century. Mass Commun. Soc. 3(1), 3\u201337 (2000)","journal-title":"Mass Commun. Soc."},{"key":"13_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-642-39188-0_11","volume-title":"Universal Access in Human-Computer Interaction. Design Methods, Tools, and Interaction Techniques for eInclusion","author":"TH R\u00f8ssvoll","year":"2013","unstructured":"R\u00f8ssvoll, T.H., Fuglerud, K.S.: Best practice for efficient development of inclusive ICT. In: Stephanidis, C., Antona, M. (eds.) UAHCI 2013. LNCS, vol. 8009, pp. 97\u2013106. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39188-0_11"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Schneier, B.: Identification and Authentication.\u00a0Secrets and Lies: Digital Security in a Networked World, pp. 135\u2013150 (2015)","DOI":"10.1002\/9781119183631.ch9"},{"key":"13_CR27","unstructured":"Seladi-Schulman, J.: How people who are deaf learn to talk. https:\/\/www.healthline.com\/health\/can-deaf-people-talk#nonverbal-communication. Accessed 09 Sep 2020"},{"key":"13_CR28","doi-asserted-by":"publisher","first-page":"119052","DOI":"10.1109\/ACCESS.2019.2937030","volume":"7","author":"J Song","year":"2019","unstructured":"Song, J., Wang, D., Yun, Z., Han, X.: Alphapwd: a password generation strategy based on mnemonic shape. IEEE Access 7, 119052\u2013119059 (2019)","journal-title":"IEEE Access"},{"issue":"4","key":"13_CR29","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1108\/ICS-04-2016-0034","volume":"25","author":"J Still","year":"2017","unstructured":"Still, J., Cain, A., Schuster, D.: Human-centered authentication guidelines. Inf. Comput. Secur. 25(4), 437\u2013453 (2017)","journal-title":"Inf. Comput. Secur."},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Stobert, E., Biddle, R.: Memory retrieval and graphical passwords. In: 9th International\u00a0Proceedings of on Usable Privacy and Security, pp. 1\u201314, Newcastle, UK (2013)","DOI":"10.1145\/2501604.2501619"},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Trokielewicz, M., Czajka, A., Maciejewicz, P.: Cataract influence on iris recognition performance. In: 35th International Proceedings on Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments, pp. 1\u201314. IEEE-SPIE (2014).","DOI":"10.1117\/12.2076040"},{"key":"13_CR32","unstructured":"United Nations Convention on the Rights of Persons with Disabilities (UN CRPD) (2008). https:\/\/www.un.org\/development\/desa\/disabilities\/convention-on-the-rights-of-persons-with-disabilities.html"},{"key":"13_CR33","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-642-20769-3_11","volume-title":"Privacy and Identity Management for Life","author":"A Vapen","year":"2011","unstructured":"Vapen, A., Shahmehri, N.: Security levels for web authentication using mobile phones. In: Fischer-H\u00fcbner, S., Duquenoy, P., Hansen, M., Leenes, R., Zhang, G. (eds.) Privacy and Identity 2010. IAICT, vol. 352, pp. 130\u2013143. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20769-3_11"},{"key":"13_CR34","unstructured":"Wang, Y.\u1e47: Universal Authentication: Towards Accessible Authentication for Everyone. https:\/\/cups.cs.cmu.edu\/soups\/2014\/workshops\/papers\/accessible_wang_17.pdf. Accessed 01 Feb 2021"},{"key":"13_CR35","unstructured":"World Health Organization (WHO): International Classification of Functioning, Disability and Health. https:\/\/www.who.int\/classifications\/icf\/en\/. Accessed 10 Aug 2020"},{"issue":"4","key":"13_CR36","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1080\/07421222.1999.11518226","volume":"15","author":"M Zviran","year":"1999","unstructured":"Zviran, M., Haga, W.J.: Password security: an empirical study. J. Manag. Inf. Syst. 15(4), 161\u2013185 (1999)","journal-title":"J. Manag. Inf. Syst."}],"container-title":["Lecture Notes in Computer Science","Universal Access in Human-Computer Interaction. Design Methods and User Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-78092-0_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:33:58Z","timestamp":1751495638000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-78092-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030780913","9783030780920"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-78092-0_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}