User Interfaces for All: Concepts, Methods, and Tools
User Interfaces for All: Concepts, Methods, and Tools
Firewalls and Internet Security: Repelling the Wily Hacker
Firewalls and Internet Security: Repelling the Wily Hacker
Smart Environments: Technology, Protocols and Applications (Wiley Series on Parallel and Distributed Computing)
Security in Computing (4th Edition)
Security in Computing (4th Edition)
Security Policies and Procedures: Principles and Practices (Prentice Hall Security Series)
Security Policies and Procedures: Principles and Practices (Prentice Hall Security Series)
Object-Oriented and Classical Software Engineering
Object-Oriented and Classical Software Engineering
Secure Multimedia Communications
IEEE Security and Privacy
Man-in-the-middle in tunnelled authentication protocols
Proceedings of the 11th international conference on Security Protocols
Secure, usable biometric authentication systems
UAHCI'13 Proceedings of the 7th international conference on Universal Access in Human-Computer Interaction: design methods, tools, and interaction techniques for eInclusion - Volume Part I
Hi-index | 0.00 |
The overarching goal of UA is affording all individuals, regardless of disabilities, geographic status, infrastructure, age or training background, the use and benefit of information technology. The goal of this paper is to raise awareness of the security and privacy cyber risks in the everyday use of UA technology. The challenge of UA technology transfer from the laboratory to real world setting leads us to identify vulnerabilities of UA users and to present examples of cyber security strategies to safeguard data. The principles of confidentiality, integrity and availability guide our non-exhaustive review of concrete UA approaches and their security and privacy implications for everyday use. We examine the cyber risks to privacy and security of brain computer interfaces and UA home networking and conclude with call to interdisciplinary collaboration between the security and UA expert communities to ensure the transitioning of safe and secure UA technologies to the end-users.