COGA (accessibility for people with cognitive disabilities) Issue Paper

Keeping Users Safe Online

Unfortunately, the internet is not a safe place. Examples of types of criminals active on the internet include:

Challenges for People with Cognitive Disabilities

People with cognitive disabilities are particularly vulnerable to all types of cyber crime.

Hackers. People with cognitive disabilities may not be able to cope with the additional security measures such as two steps authentication or keep passwords safe and unique.

Ironically extra security precautions such as increasing the requirements of password strength often make this group more vulnerable to "human error". It can lead to a reduction in their security by encouraging inadvisable behaviour such as keeping a list of passwords on their desk which can be stolen by "helpers" or people who come into their room. Another case may be where people ask a helper or friend to assist with the completion of the security procedures, once again raising the risk of abuse.

Con-artists. People with impaired reasoning, attention or memory may be more vulnerable to con-artists who trick people into trusting them. People who do not understand social cues may also be more vulnerable, as they may find it harder to notice if something seems "out of place". Also at risk are people who are more likely to believe false information and will find it harder to validate facts.

Sexual predators. People with cognitive disabilities may be more at risk of being a victim of a sexual crime. This is more likely if:

Proposed Solutions

When making content accessibility for people with cognitive disabilities extra care should be applied at the same time to keep then safe.

General: All user information must be kept safe, to the fullest extent possible. Any clues that the user has cognitive disabilities (such as a request for a simplified version) should be protected information.

Hackers: Security should be strong AND easily used by those with cognitive disabilities, such as a biometrics option. For a full discussion see the issue paper on security.

Sexual predators and con-artists.

TO DO: find sources and consult with experts.

Jonathan Lazar, Libby Kumin, and Jinjuan Heidi Feng. 2011. Understanding the computer skills of adult expert users with down syndrome: an exploratory study. In The proceedings of the 13th international ACM SIGACCESS conference on Computers and accessibility (ASSETS '11). ACM, New York, NY, USA, 51-58. DOI=10.1145/2049536.2049548 http://doi.acm.org/10.1145/2049536.2049548 Available from: http://tacesoutheast.org/network/transition/pubs/doc/computer_skills_adult_ds.pdf

Interesting paper showing that those with Downs Syndrome do not necessarily have difficulties with CAPTCHAS.