Understanding How People with Upper Extremity Impairments Authenticate on Their Personal Devices

Understanding How People with Upper Extremity Impairments Authenticate on Their Personal Devices

CAE in Cybersecurity Community via YouTube Direct link

Introduction

1 of 17

1 of 17

Introduction

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Understanding How People with Upper Extremity Impairments Authenticate on Their Personal Devices

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Upper Extremity Impairments
  3. 3 Accessibility
  4. 4 Existing Authentication Processes
  5. 5 Authentication Process
  6. 6 Research Questions
  7. 7 Methodology
  8. 8 Authentication
  9. 9 Reasons for Authentication
  10. 10 Barriers
  11. 11 Complex passwords
  12. 12 Failure Resolution
  13. 13 Background
  14. 14 Safety Precautions
  15. 15 Future Research
  16. 16 Questions
  17. 17 Chat Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.