Diversity, Accessibility and Inclusivity are important considerations for cyber security, to ensure that security mechanisms are suitable for all users, who could have differing abilities as a result of physical or cognitive impairments. One way this can be achieved is by implementing accessible authentication, which is recommended as part of the Web Content Accessibility Guidelines (WCAG 2.1) defined by the World Wide Web Consortium (W3C). There have been recent examples where authentication has presented challenges for people with disabilities (BBC News, 2020). Other considerations include, deriving heuristics during the design of systems, to ensure that the accessibility requirements of potential users are satisfied. This Workshop will investigate the recent developments that aim to ensure cyber security is accessible and inclusive to all users. It will discuss the methods that can be implemented to develop such systems. It will also become a forum for researchers in the domains of accessibility, cyber security, human computer interaction, human centred design and System of Systems. Discussions during the Workshop will lead to the creation of a road map to enhance the diversity, accessibility and inclusivity of cyber security.
D AsliL KlapperD SingerS AnsarJ Hess 2018 The Global Findex Database 2017: Measuring Financial Inclusion and the Fintech Revolution
Assistive Technology Industry Association 2021 What is AT? https://www.atia.org/atresources/what-is-at/ (retrieved 10th March 2021)
BBC News 2020 Blind woman’s campaign leads to police ID scheme launch https://www.bbc.co.uk/news/uk-englandhampshire-54337929 (retrieved 12th March 2021)
Bournemouth University (BU) Research Blog 2018 The inaugural Assistive Living Technologies Symposium 21st May 2018 https://blogs.bournemouth.ac.uk/research/2018/06/07/the-inaugural-assistive-living-technologiessymposium-21st-may-2018/ (retrieved 12th March 2021)
Bournemouth University (BU) Research Blog 2019 Assistive Technology Symposium 2019 https://blogs.bournemouth.ac.uk/research/2019/09/04/assistive-technology-symposium-2019-2/ (retrieved 12th March 2021)
Bournemouth University 2016 Human Centred Design for Intelligent Environments, Workshop at HCI 2016 http://dec.bournemouth.ac.uk/hci/workshop/ (retrieved 12th March 2021).
B. H ChengJ. M Atlee 2009 Current and future research directions in requirements engineering Design requirements engineering: A ten-year perspective Springer 11 43
N Kostanjsek 2011 Use of The International Classification of Functioning, Disability and Health as a conceptual Framework and common language for disability statistics and health information systems BMC Public Health 11 4 1 6
M Shetty 2018 Banks warn of new mobile malware, 232 banking apps in danger https://timesofindia.indiatimes.com/business/india-business/banks-warn-of-new%20mobilemalware/articleshow/62436145.cms (retrieved 10th March 2021)
Statista 2021 Global smartphone penetration rate as share of population from 2016 to 2020 https://www.statista.com/statistics/203734/global-smartphone-penetration-per-capita-since-2005/(retrieved 21st March 2021)
C.M StoneT ChothiaF.D Garcia 2017 Spinner: “Semi-automatic detection of pinning without hostname verification” In Proceedings of the 33rd Annual Computer Security Applications Conference 176 188 ACM
Y Wang 2018 Inclusive security and privacy IEEE Security & Privacy 16 4 82 87
R WestC MayhornJ HardeeJ Mendel 2009 The Weakest Link: A Psychological Perspective on Why Users Make Poor Security Decisions
WikiCFP 2021 HCDIE 2018: 2nd Workshop on Human Centred Design for Intelligent Environments http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=75743©ownerid=115319 (retrieved 12th March 2021)
World Wide Web Consortium 2020 Making content usable for people with cognitive and learning disabilities https://www.w3.org/TR/coga-usable/ (retrieved 12th March 2021)
World Wide Web Consortium 2021 Understanding Success Criterion 3.3.7: Accessible Authentication https://www.w3.org/WAI/WCAG22/Understanding/accessible-authentication (retrieved 10th March 2021)