Individual management of personal reachability in mobile communication
SEC'97 Proceedings of the IFIP TC11 13 international conference on Information Security (SEC '97) on Information security in research and business
Communications of the ACM
Design and implementation of the idemix anonymous credential system
Proceedings of the 9th ACM conference on Computer and communications security
Usability meets security - the Identity-Manager as your personal security assistant for the Internet
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Telling humans and computers apart automatically
Communications of the ACM - Information cities
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Authentication interface evaluation and design for mobile devices
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Security and usability: the case of the user authentication methods
IHM '06 Proceedings of the 18th International Conferenceof the Association Francophone d'Interaction Homme-Machine
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
The relationship between accessibility and usability of websites
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The Seven Flaws of Identity Management: Usability and Security Challenges
IEEE Security and Privacy
Web toolkits accessibility study
ACM SIGACCESS Accessibility and Computing
Efficient oblivious augmented maps: location-based services with a payment broker
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Privacy for profitable location based services
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Human identification through image evaluation using secret predicates
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
The barriers to and benefits of use of ICT for people with visual impairment
UAHCI'11 Proceedings of the 6th international conference on Universal access in human-computer interaction: design for all and eInclusion - Volume Part I
Use of social media by people with visual impairments: usage levels, attitudes and barriers
ICCHP'12 Proceedings of the 13th international conference on Computers Helping People with Special Needs - Volume Part I
Trustworthy and inclusive identity management for applications in social media
HCI'13 Proceedings of the 15th international conference on Human-Computer Interaction: users and contexts of use - Volume Part III
Hi-index | 0.00 |
The article argues for a shift of perspective in identity management (IDM) research and development. Accessibility and usability issues affect identity management to such an extent that they demand a reframing and reformulation of basic designs and requirements of modern identity management systems. The rationale for the traditional design of identity management systems and mechanisms has been security concerns as defined in the field of security engineering. By default the highest security level has been recommended and implemented, often without taking end-user needs and accessibility issues into serious consideration. The article provides a conceptual framework for inclusive IDM, a brief overview of the regulatory status of inclusive IDM and a taxonomy of inclusive identity management methods. Several widespread IDM approaches, methods and techniques are analyzed and discussed from the perspective of inclusive design. Several important challenges are identified and some ideas for solutions addressing the challenges are proposed and discussed.