{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T00:41:39Z","timestamp":1768005699582,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2026,10,22]],"date-time":"2026-10-22T00:00:00Z","timestamp":1792627200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2148080, 2126314, 2125925"],"award-info":[{"award-number":["2148080, 2126314, 2125925"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,26]]},"DOI":"10.1145\/3663547.3759688","type":"proceedings-article","created":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T16:29:36Z","timestamp":1761150576000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The Accessibility, Security, and Privacy Nexus: Trends and Opportunities"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6889-0244","authenticated-orcid":false,"given":"Kelly Avery","family":"Mack","sequence":"first","affiliation":[{"name":"Human Centered Design and Engineering, University of Washington, Seattle, Washington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2869-4764","authenticated-orcid":false,"given":"Yu-Jie","family":"Chen","sequence":"additional","affiliation":[{"name":"Human Centered Design and Engineering, University of Washington, Seattle, Washington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6315-9970","authenticated-orcid":false,"given":"Lotus","family":"Zhang","sequence":"additional","affiliation":[{"name":"Human Centered Design and Engineering, University of Washington, Seattle, Washington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1306-0283","authenticated-orcid":false,"given":"Danna","family":"Gurari","sequence":"additional","affiliation":[{"name":"Computer Science Department, University of Colorado Boulder, Boulder, Colorado, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1523-163X","authenticated-orcid":false,"given":"Tanusree","family":"Sharma","sequence":"additional","affiliation":[{"name":"College of Information Sciences and Technology, Pennsylvania State University, State College, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3641-8241","authenticated-orcid":false,"given":"Yang","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, Illinois, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5619-4452","authenticated-orcid":false,"given":"Leah","family":"Findlater","sequence":"additional","affiliation":[{"name":"Human Centered Design and Engineering, University of Washington, Seattle, Washington, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,10,22]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300692"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702334"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/2384916.2384945"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3373625.3417024"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3234695.3236342"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376749"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597638.3608379"},{"key":"e_1_3_3_2_9_2","first-page":"111","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)","author":"Fanelle Valerie","year":"2020","unstructured":"Valerie Fanelle, Sepideh Karimi, Aditi Shah, Bharath Subramanian, and Sauvik Das. 2020. Blind and human: Exploring more usable audio { CAPTCHA} designs. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). 111\u2013125."},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"William Grussenmeyer and Eelke Folmer. 2017. Accessible touchscreen technology for people with visual impairments: a survey. ACM Transactions on Accessible Computing (TACCESS) 9 2 (2017) 1\u201331.","DOI":"10.1145\/3022701"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3663548.3675620"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3234695.3239331"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3663548.3675641"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3373625.3416991"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3441852.3471208"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581337"},{"key":"e_1_3_3_2_17_2","first-page":"361","volume-title":"Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023)","author":"Kaushik Smirity","year":"2023","unstructured":"Smirity Kaushik, Nat\u00e3\u00a0M Barbosa, Yaman Yu, Tanusree Sharma, Zachary Kilhoffer, JooYoung Seo, Sauvik Das, and Yang Wang. 2023. { GuardLens} : Supporting safer online browsing for people with visual impairments. In Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023). 361\u2013380."},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208385"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376398"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581007"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445070"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"Elizabeth\u00a0R Lorah Ashley Parnell Peggy\u00a0Schaefer Whitby and Donald Hantula. 2015. A systematic review of tablet computers and portable media players as speech generating devices for individuals with autism spectrum disorder. Journal of autism and developmental disorders 45 (2015) 3792\u20133804.","DOI":"10.1007\/s10803-014-2314-4"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445412"},{"key":"e_1_3_3_2_24_2","unstructured":"Joshua Miele. 2024. Accessibility in the Open: Driving global disability equity through open source. (2024). https:\/\/www.youtube.com\/watch?v=vzAsBykLqrY Talk delivered at the University of Washington Paul G. Allen School Distinguished Lecture Series."},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3441852.3471205"},{"key":"e_1_3_3_2_26_2","first-page":"263","volume-title":"Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)","author":"Napoli Daniela","year":"2021","unstructured":"Daniela Napoli, Khadija Baig, Sana Maqsood, and Sonia Chiasson. 2021. \" I\u2019m Literally Just Hoping This Will { Work:\u2019} \u2019Obstacles Blocking the Online Security and Privacy of Users with Visual Disabilities. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). 263\u2013280."},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502017"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"crossref","unstructured":"Paola Pennisi Alessandro Tonacci Gennaro Tartarisco Lucia Billeci Liliana Ruta Sebastiano Gangemi and Giovanni Pioggia. 2016. Autism and social robotics: A systematic review. Autism Research 9 2 (2016) 165\u2013183.","DOI":"10.1002\/aur.1527"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580922"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"crossref","unstructured":"Katta Spiel Christopher Frauenberger Os Keyes and Geraldine Fitzpatrick. 2019. Agency of autistic children in technology research\u2014A critical literature review. ACM Transactions on Computer-Human Interaction (TOCHI) 26 6 (2019) 1\u201340.","DOI":"10.1145\/3344919"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517592"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"crossref","unstructured":"John Vines Gary Pritchard Peter Wright Patrick Olivier and Katie Brittain. 2015. An age-old problem: Examining the discourses of ageing in HCI and strategies for future research. ACM Transactions on Computer-Human Interaction (TOCHI) 22 1 (2015) 1\u201327.","DOI":"10.1145\/2696867"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300254"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/1878803.1878815"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642713"},{"key":"e_1_3_3_2_36_2","first-page":"417","volume-title":"Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023)","author":"Zhang Zhuohao\u00a0Jerry","year":"2023","unstructured":"Zhuohao\u00a0Jerry Zhang, Smirity Kaushik, JooYoung Seo, Haolin Yuan, Sauvik Das, Leah Findlater, Danna Gurari, Abigale Stangl, and Yang Wang. 2023. { ImageAlly} : A { Human-AI} Hybrid Approach to Support Blind People in Detecting and Redacting Private Image Content. In Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023). 417\u2013436."},{"key":"e_1_3_3_2_37_2","first-page":"381","volume-title":"Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023)","author":"Zhou Zhixuan","year":"2023","unstructured":"Zhixuan Zhou, Tanusree Sharma, Luke Emano, Sauvik Das, and Yang Wang. 2023. Iterative design of an accessible crypto wallet for blind users. In Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023). 381\u2013398."}],"event":{"name":"ASSETS '25: The 27th International ACM SIGACCESS Conference on Computers and Accessibility","location":"Denver Colorado USA","acronym":"ASSETS '25","sponsor":["SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Proceedings of the 27th International ACM SIGACCESS Conference on Computers and Accessibility"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3663547.3759688","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3663547.3759688","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T17:53:52Z","timestamp":1767981232000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3663547.3759688"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,22]]},"references-count":36,"alternative-id":["10.1145\/3663547.3759688","10.1145\/3663547"],"URL":"https:\/\/doi.org\/10.1145\/3663547.3759688","relation":{},"subject":[],"published":{"date-parts":[[2025,10,22]]},"assertion":[{"value":"2025-10-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}