1
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge

      research-article
      1 , , 2
      Sn Computer Science
      Springer Nature Singapore
      Accessibility, Cyber security, Vulnerability

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          It has been argued that human-centred security design needs to accommodate the considerations of three dimensions: (1) security, (2) usability and (3) accessibility. The latter has not yet received much attention. Now that governments and health services are increasingly requiring their citizens/patients to use online services, the need for accessible security and privacy has become far more pressing. The reality is that, for many, security measures are often exasperatingly inaccessible. Regardless of the outcome of the debate about the social acceptability of compelling people to access public services online, we still need to design accessibility into these systems, or risk excluding and marginalising swathes of the population who cannot use these systems in the same way as abled users. These users are particularly vulnerable to attack and online deception not only because security and privacy controls are inaccessible but also because they often struggle with depleted resources and capabilities together with less social, economic and political resilience. This conceptual paper contemplates the accessible dimension of human-centred security and its impact on the inclusivity of security technologies. We scope the range of vulnerabilities that can result from a lack of accessibility in security solutions and contemplate the nuances and complex challenges inherent in making security accessible. We conclude by suggesting a number of avenues for future work in this space.

          Related collections

          Most cited references62

          • Record: found
          • Abstract: not found
          • Article: not found

          The Aging Hand

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors

              Bookmark
              • Record: found
              • Abstract: found
              • Article: not found

              Blindness and visual impairment in an American urban population. The Baltimore Eye Survey.

              Data on the prevalence of blindness and visual impairment in multiracial urban populations of the United States are not readily available. The Baltimore Eye Survey was designed to address this lack of information and provide estimates of prevalence in age-race subgroups that had not been well studied in the past. A population-based sample of 5300 blacks and whites from east Baltimore, Md, received an ophthalmologic screening examination that included detailed visual acuity measurements. Blacks had, on average, a twofold excess prevalence of blindness and visual impairment than whites, irrespective of definition. Rates rose dramatically with age for all definitions of vision loss, but there was no difference in prevalence by sex. More than 50% of subjects improved their presenting vision after refractive correction, with 7.5% improving three or more lines. Rates in Baltimore are as high or higher than those reported from previous studies. National projections indicate that greater than 3 million persons are visually impaired, 890,000 of whom are bilaterally blind by US definitions.
                Bookmark

                Author and article information

                Contributors
                karen.renaud@strath.ac.uk
                Lizzie.Coles-Kemp@rhul.ac.uk
                Journal
                SN Comput Sci
                SN Comput Sci
                Sn Computer Science
                Springer Nature Singapore (Singapore )
                2662-995X
                2661-8907
                22 June 2022
                22 June 2022
                2022
                : 3
                : 5
                : 346
                Affiliations
                [1 ]GRID grid.11984.35, ISNI 0000000121138138, University of Strathclyde, Glasgow, UK Rhodes University, Grahamstown, South Africa University of South Africa, Pretoria, South Africa Abertay University, ; Dundee, UK
                [2 ]GRID grid.4970.a, ISNI 0000 0001 2188 881X, Royal Holloway University of London, ; Egham, UK
                Author information
                http://orcid.org/0000-0002-7187-6531
                Article
                1239
                10.1007/s42979-022-01239-1
                9215151
                35755325
                cc586a82-5a66-470a-9955-61058b8f5468
                © The Author(s) 2022

                Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

                History
                : 16 November 2021
                : 31 May 2022
                Categories
                Original Research
                Custom metadata
                © Springer Nature Singapore Pte Ltd 2022

                accessibility,cyber security,vulnerability
                accessibility, cyber security, vulnerability

                Comments

                Comment on this article