skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: “I...Got my Nose-Print. But it Wasn’t Accurate”: How People with Upper Extremity Impairment Authenticate on their Personal Computing Devices
Authentication has become increasingly ubiquitous for controlling access to personal computing devices (e.g., laptops, tablets, and smartphones). In this paper, we aim to understand the authentication process used by people with upper extremity impairment (UEI). A person with UEI lacks range of motion, strength, endurance, speed, and/or accuracy associated with arms, hands, or fingers. To this end, we conducted semi-structured interviews with eight (8) adults with UEI about their use of authentication for their personal computing devices. We found that our participants primarily use passwords and PINs as a verification credential during authentication. We found the process of authentication to have several accessibility issues for our participants. Consequently, our participants implemented a variety of workarounds that prioritized usability over security throughout the authentication process. Based on these findings, we present six broad subareas of research that should be explored in order to create more accessible authentication for people with UEI.  more » « less
Award ID(s):
1947022
PAR ID:
10296072
Author(s) / Creator(s):
;
Date Published:
Journal Name:
2021 CHI Conference on Human Factors in Computing Systems
Page Range / eLocation ID:
1 to 14
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. In this paper, we explore how computing device use by people with upper extremity impairment (UEI) was affected by COVID-19. Someone with UEI has reduced use of their shoulders, upper arms, forearms, hands, and/or fingers. We conducted six (6) semi-structured interviews with participants with UEI in the US. We found that people with UEI increased computing device use during COVID-19 not only for remote interactions but also in person. Additionally, social distancing for COVID-19 safety created the need for new assistive technology (AT), authentication requirements, and communication platforms, which introduced their own accessibility barriers. We also found that personal protective equipment (PPE) created new barriers during computing device use, which often caused people with UEI to choose COVID-19 safety over the usability of their computing devices. Based on these findings, we describe future opportunities to make computing devices more accessible for people with UEI to manage the shifts in computing device use introduced by COVID-19. 
    more » « less
  2. Current computing device authentication often presents accessibility barriers for people withupper extremity impairments (UEI). In this article, we present a framework calledAccessible image-Association-based Authentication for Computing devices (A3C), a novel recognition-based graphical authentication framework specifically designed for people with UEI to authenticate to their computing devices. A3C requires users to provide a set of primary images the user knows that are recognizable to them and subsequently associate each primary image with a secondary image. To evaluate the efficacy of the A3C framework, we instantiated the framework by implementing a version of A3C calledA3C-FA, which uses images of faces of people the user knows as the primary image and animal images as the secondary image. We then performed three studies to evaluate A3C-FA: a shoulder-surfing attack study (N\(=\)319), a close-adversary attack study (N\(=\)268), and a usability study with people with UEI (N\(=\)14). We found that A3C was robust against both shoulder-surfing and close-adversary attacks. We also performed a detailed study to evaluate the accessibility of A3C-FA. Our participants reported that A3C-FA was more usable and more secure than the authentication approaches with which they were familiar. Based on these findings, we suggest four areas of future research to further improve the design of the A3C framework. 
    more » « less
  3. In recent years, people with upper extremity impairment (UEI) have been using wearable Internet of Things (wIoT) devices like head-mounted devices (HMDs) for a variety of purposes such as rehabilitation, assistive technology, and gaming. Often such wIoT devices collect and display sensitive information such as information related to medical care and rehabilitation. It is therefore crucial that HMDs can authenticate the person wearing them so that appropriate access control can be implemented for the sensitive information they manage. In this paper, we explore a new authentication approach for people with upper extremity impairment (UEI) for wIoT devices head-mounted devices (HMDs). The approach works by leveraging ballistocardiograms - representations of the cardiac rhythm - derived from an accelerometer and a gyroscope, mounted on an HMD for authentication. The derived ballistocardiograms are then fed into six participant-specific convolutional neural networks (CNNs) which act as our authentication models. Analysis of our approach shows its viability. Using data from 6 participants with UEI (and 22 able-bodied participants, for evaluation), we show that we can authenticate a participant in 4 seconds with an average equal error rate of 4.02% and 10.02%, immediately after training and ~2 months later, respectively. 
    more » « less
  4. Children’s use of computing devices has increased over the past 15 years, requiring age-appropriate user authentication systems. This paper details a research study which investigates continuous authentication systems that do not require user-initiated interactions as an accessible authentication model for not only children users, but users across different age groups, with specific application on personal computing devices. 
    more » « less
  5. People often do not receive the reactions they desire when they use social networking sites to share data collected through personal tracking tools like Fitbit, Strava, and Swarm. Although some people have found success sharing with close connections or in finding online communities, most audiences express limited interest and rarely respond. We report on findings from a human-centered design process undertaken to examine how tracking tools can better support people in telling their story using their data. 23 formative interviews contribute design goals for telling stories of accomplishment, including a need to include relevant data. We implement these goals in Yarn, a mobile app that offers structure for telling stories of accomplishment around training for running races and completing Do-It-Yourself projects. 21 participants used Yarn for 4 weeks across two studies. Although Yarn’s structure led some participants to include more data or explanation in the moments they created, many felt like the structure prevented them from telling their stories in the way they desired. In light of participant use, we discuss additional challenges to using personal data to inform and target an interested audience 
    more » « less