Security in Computing
Individuality of Handwriting: A Validation Study
ICDAR '01 Proceedings of the Sixth International Conference on Document Analysis and Recognition
Web usability and age: how design changes can improve performance
CUU '03 Proceedings of the 2003 conference on Universal usability
How universal is good design for older users?
CUU '03 Proceedings of the 2003 conference on Universal usability
A study of web usability for older adults seeking online health resources
ACM Transactions on Computer-Human Interaction (TOCHI)
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Déjà Vu: a user study using images for authentication
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
VIP: a visual approach to user authentication
Proceedings of the Working Conference on Advanced Visual Interfaces
Guidelines for designing graphical authentication mechanism interfaces
International Journal of Information and Computer Security
Review: Computer use by older adults: A multi-disciplinary review
Computers in Human Behavior
The influence of password restrictions and mnemonics on the memory for passwords of older adults
HCI International'13 Proceedings of the 15th international conference on Human Interface and the Management of Information: information and interaction design - Volume Part I
Faces and Pictures: Understanding age differences in two types of graphical authentications
International Journal of Human-Computer Studies
Hi-index | 0.00 |
The Web offers facilities which can make a huge difference to the lives of users with reduced mobility, something that affects many older users. Users have to be authorized to access restricted websites. This involves a two-step process: identification and authentication. These issues have received scant attention when considering the needs of specific user groups. Web identification and authentication is often treated as a one-size-fits-all problem with ubiquitous use of the password as an authenticator and a variety of different identification mechanisms being used. Neither is tailored to the needs of either the website or the target users. This paper discusses problems related to identification and authentication of older web users, and reports on experiences with field tests of initial solutions.