Submitted:
02 December 2025
Posted:
04 December 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Literature Review
3. Methods
3.1. Overview
3.2. Participants
3.3. Interview Questions
3.4. Analysis Methodologies
3.5. Data Science Modelling Trends
4. Results
4.1. Overview
4.1.1. Categorization
4.1.2. Disability
4.2. Coding Results
4.2.1. General Findings from Stage 1 - Initial Coding
- Disability – There is a wide variety of disabilities that could be addressed by this Framework. Signs of accessibility issues begin to emerge in conversation;
- AT Devices – People tend to prefer authenticating themselves with only one device;
- Usability versus Security – while people prefer a usable platform, security is still a significant concern. Subsequently, this contradicts earlier theoretical research mentioned in the Introduction section that suggests usability is a larger problem than security; however, it could be accepted that this is more of a problem in the paradigm of an authentication machine’s functional capability, which contrasts with the user’s value-based and balanced perspective of the situation;
- Issues – time-based codes present the biggest challenge, specifically with physically reaching for a 2FA device;
- Desirable Features – simplified login is preferred with other features are recorded;
- Responsibility – the onus for privacy and security should lie with the service provider. A user’s own responsibility is also recognized.
4.2.2. Emerging Characteristics from Stage 2 - Focused Coding
- It is difficult to reduce the findings without overlooking small but perhaps relevant information;
- Some topics show much greater support from users than others;
- Some topics reveal an almost 50/50 split in opinions, leading to the assumption that there is no right or wrong answer for these questions.
- Most users identify problems logging in due to their disability;
- Although the research aims to make logging in easier for users, security is still important to them;
- There is considerable interest in a universal login system;
- There is interest in alternative devices to facilitate the log in process;
- Forgetting passwords is a common theme.
4.2.3. Formulation of empirical proofs from Stage 3 - Inductive Theorems
- General Device;
- Fingerprints;
- Facial recognition;
- Mobile phone (or tablet);
- USB key.
4.2.4. Qualitative Feedback
5. Discussion
6. Conclusions
Supplementary Materials
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
| 2FA | Two Factor Authentication |
| AA | Accessible Authentication |
| ACS | Access Control Systems |
| ADHD | Attention Deficit Hyperactivity Disorder |
| ASD | Autism Spectrum Disorder |
| AT | Assistive Technology |
| BU | Bournemouth University |
| CA | Certificate Authority |
| CAPTCHA | Completely Automated Public Turing test to tell Computers and Humans Apart |
| CCTV | Closed Circuit Television |
| CP | Cerebral Palsy |
| CT | Constructivist Theory |
| DevSecOps | Development, Security and Operations |
| eID | Electronic Identification |
| EUR | Europe |
| FHSD | Facioscapulohumeral Muscular Dystrophy |
| FIDO2 | Fast Identity Online 2 |
| GenAI | Generative Artificial Intelligence |
| GT | Grounded Theory |
| HCI | Human Computer Interaction |
| ID | Identification (physical) |
| IoT | Internet of Things |
| JWT | JSON Web Token |
| OCD | Obsessive Compulsive Disorder |
| SEND | Special Education Needs and Disability |
| TA | Thematic Analysis |
| TEE | Trusted Execution Environment |
| UEI | Upper Extremity Impairment |
| UI | User Interface |
| UK | United Kingdom |
| USA | United States of America |
| USB | Universal Serial Bus |
| WCAG | Web Content Accessibility Guidelines |
| QoS | Quality of Service |
Appendix A
Appendix A.1.
| Participant | Age Range | Geographic Location | Gender |
| participant 1 | 40-49 | Southern England, UK | Female |
| participant 2 | 30-39 | Florida, USA | Male |
| participant 3 | 30-39 | Mississippi, USA | Male |
| participant 4 | 30-39 | Philadelphia, USA | Female |
| participant 5 | 40-49 | Southern England, UK | Male |
| participant 6 | 16-19 | Southern England, UK | Male |
| participant 7 | 50+ | Southern England, UK | Female |
| participant 8 | 20-29 | Midlands, UK | Male |
| participant 9 | 20-29 | Southern England, UK | Male |
| participant 10 | 50+ | Southern England, UK | Female |
| participant 11 | 50+ | Southern England, UK | Male |
| participant 12 | 50+ | Southern England, UK | Male |
| participant 13 | 50+ | Southern England, UK | Male |
| participant 14 | 50+ | Southern England, UK | Male |
| participant 15 | 20-29 | France, EUR | Female |
Appendix A.2.
| Topic (number of references) | Sub-topic | Description | References |
| AT devices (132) | General Device | Other or alternative devices | 40 |
| Fingerprints | Preference for fingerprint scanning | 17 | |
| Facial recognition | Desirable for login | 15 | |
| Mobile phone (or tablet) | User’ personal smartphone | 14 | |
| USB key | A security key that store certificates | 11 | |
| Voice recognition | User would like to see voice recognition | 7 | |
| Fob | An RF (Radio Frequency) device | 6 | |
| Text to speech | Text to speech conversion to aid login | 6 | |
| Speech to text | Closed captioning or text prompts | 4 | |
| Font change | Adaptations to font style | 4 | |
| Color changes | Adaptations to font color | 4 | |
| Eye tracking | Eye tracking device | 3 | |
| Sip-Puff Device | A device controlled with the users’ mouth | 1 | |
| Desirable features (89) | Universal login | Would want a universal system | 15 |
| Simplified login | Not too many obstacles or options | 15 | |
| Remain logged in | Be logged in when they get back | 11 | |
| Something you know | 2FA (Two Factor Authentication) | 8 | |
| Focused options | Options focused on the disability | 7 | |
| Happy with just a password | Would like to see just a password system only | 6 | |
| Passcode recording | System records time-based code for you | 5 | |
| Easier Recovery | Easier options to recover data | 5 | |
| Faster login | Quickest possible login preferred | 4 | |
| Delete information | Auto-remove old passcodes | 4 | |
| Speak to a person | Would prefer to speak to real person about login issues | 3 | |
| Show password | Option to show password | 2 | |
| Use of AI | Use of AI once info passed to organization | 2 | |
| Picture based authentication | Selecting pictures to login | 2 | |
| Disability (131) | Nature of disability | Name of Disability in question | 32 |
| Due to disability | User feels issue is due to disability | 29 | |
| Pass information | Happy to pass information to third parties | 22 | |
| Reluctant to divulge | Reluctance to divulge disability | 20 | |
| Not because of disability | User feels issue is not due to disability | 11 | |
| Deterioration | Concerns about a deteriorating or degenerative disability | 5 | |
| Issues1 (180, 127 G, 41 V, 12 L) | Privacy concerns G | Concerns about information or permissions | 27 |
| Frustrating G | Feelings of frustration due to authentication | 23 | |
| Identification G | Issues with being identifiable | 17 | |
| Forgotten password G | Unable to recall password | 11 | |
| Locked out G | No way to verify own account | 11 | |
| Distance from device G | Being far away/having to reach a 2FA device. | 11 | |
| Repeated attempts needed G | Repeated attempts needed to login or tired from repeatedly having to do it | 9 | |
| Time consuming G | Logging in is time consuming | 7 | |
| Password mismatching G | Inability to match passwords | 3 | |
| Distractions G | Environmental disabilities | 3 | |
| Number of accounts G | Extra complexity caused by quantity of different logins needed | 3 | |
| Character set G | Issues with character set | 2 | |
| Time based codes V | Two step authentication issues | 17 | |
| 2FA V | Two step authentication issues | 9 | |
| CAPTCHA issues V | Issues with Google (or other) image recognition test - characterized by use of traffic lights and stairs | 6 | |
| Authenticator issues V | Authenticator issues or delays | 4 | |
| Code retrieval delays V | Issues with biometric | 3 | |
| Fingerprints V | Time delays in emails or 2FA codes coming through | 1 | |
| Low difficulty L | Minor or no issues with authentication | 12 | |
| Responsibility (27) | Companies’ responsibility | The company is more responsible | 14 |
| Both responsible | Users and companies are equally responsible | 10 | |
| Users’ responsibility | The user is more responsible | 3 | |
| Usability v Security (85) | Security important | User feels security is important | 34 |
| Usability (and speed of access) important | User feels usability is important | 20 | |
| Balanced System | Users need a balance between security and usability | 18 | |
| Security Sacrifices | Willing to sacrifice security to make it easier to login | 13 |
Appendix B
Appendix B.1.
| Index | Question | Format | Relevance/Reasoning | Category |
| 01 | Name | Text | Indexing/Storage | DE1 |
| 02 | Age Range * | 16-19 20-29 30-39 40-49 50+ |
Age verification, categorisation | DE2 |
| 03 | Gender | Woman Man Transgender Non-binary/non-conforming Prefer to define myself as … Prefer not to say |
Demographic | DE3 |
| 04 | Geographic Location | Text | Classification / Diversity | DE4 |
| 05 | Disability * | Text | Classification / Relevance / Application options | DR1 |
| 06 | Do you find authentication (i.e. logging into websites or applications) difficult because of your disability? | Yes / No / Maybe | Perception of an issue | DR2/U2 |
| 07 | In what ways (if any) does your disability make authentication hard for you to do? What are the main difficulties that you face when you log in to systems that do not take your disability into account? |
Text | Context on current issues. Difficulty related to disability. |
U3/DR3 |
| 08 | How important is it for you to get logged in quickly? | Scalar value 1-5 Not very important Not important Not fussed Important Very important |
Need for speed / ease of use. | U4 |
| 09 | How highly do you rate the importance of security? | Scalar value 1-5 Not very important Not important Not fussed Important Very important |
Need for security. | S1 |
| 10 | How often do you sacrifice security to make logging in easier? E.g. easy passwords, reuse passwords, no 2-Factor Authentication (2FA), etc. | Scalar value 1-5 Not very often Not often Occasionally Often Very often |
Willingness to sacrifice security. | DR4/S2 |
| 11 | Do you sacrifice security because it’s too difficult to authenticate with your disability? Is there anything that could make this easier? | Text | Does lack of usability bar security? | DR5/S3/U5 |
| 12 | If you had to choose, would you prefer more security or an easier or faster login? | Scalar value 1-5 Much easier Easier Balanced Secure More Secure |
Preferences. | S4/U6 |
| 13 | Would you like to have one system that you could use to log into most of your websites and applications? | Yes / No / Maybe | Is it wanted? Single sign on (SSO) needed? | U7 |
| 14 | When you log in to a site or service, would you like to have details of your disability passed across so that they can automatically adapt their user experience for you? | Yes / No / Maybe | Need for passing data parameters to third party. | DR6 |
| 15 | Would you like to have the options to choose which elements of your disability are revealed to each third party that you log into? | Yes / No / Maybe | Level of disclosure to third party. | DR7/P1 |
| 16 | How do you feel about trusting a company with information about your disability and what benefits or negative side effects do you think it could have? | Text | Trust, privacy and confidence. | DR8/P2 |
| 17 | Would you like to see a login system that could work with a variety of inputs including paddles, sip/puff, audio / text-to-speech devices, optical / head movement or other assistive technology devices? | Yes / No / Maybe | Application hardware interfacing. | U8 |
| 18 | In relation to the above question, which alternative or assistive technologies would you like to be able to do this with? | Text | Classify hardware options. | U9 |
| 19 | Would you like to or currently use assistive technology (AT) such as a paddle or switch to authenticate with? Please specify which AT device you would use. | Text | Use of AT for verification/ 2FA. | U10/DR9 |
| 20 | Would you say that that you are currently happy with the way you have to login to sites currently? | Text | Overall satisfaction with current technology. | E1 |
| 21 | Do you find it frustrating or have any reservations when logging into systems (e.g. Loss of data, privacy, access denial, difficulty logging in)? | Text | Negative Emotional states. | P3 |
| 22 | What strengths do you think a good login system should have, and how would you feel if you could use a system like this? | Text | Positive Emotional states. | E2 |
| 23 | Do you sometimes think that a company should automatically know who you are, or do you welcome the fact that there is a layer of security always protecting your data? Do you think authentication systems need to be more intelligent? | Text | Security levels, individual recognition, AI detection. | P4/S5 |
| 24 | Do you feel that security is an organization’s responsibility, that of the user or a bit of both? | Text | Placement of responsibilities | S6/P5 |
| 25 | Would you consider using an on-person device for verification and if so, which would you prefer? E.g. Key fob, USB key, Bluetooth switch, biometric device or maybe just a mobile phone | Text | Would they be prepared to carry a device with them for verification? | U11 |
| 26 | Would you like the opportunity to be included in any future research questions in relation to this PhD? | Yes / No Please fill out the separate contact questionnaire if ‘Yes’ |
Opportunity to participate in further testing systems, reviews or general questionnaires. | DE5 |
| 27 | Any further comments | Text | Qualitative / vocalization of ideas. | All |
References
- How to Meet WCAG (Quick Reference). Available online: https://www.w3.org/WAI/WCAG22/quickref/ (accessed on 29 May 2025).
- Meet the requirements of equality and accessibility regulations. Available online: https://www.gov.uk/guidance/meet-the-requirements-of-equality-and-accessibility-regulations (accessed on 29 May 2025).
- Equality Act 2010. Available online: https://www.legislation.gov.uk/ukpga/2010/15/contents (accessed on 29 May 2025).
- Cropley, D.; Whittington, P.; Dogan, H. A Systematic Literature Review for Facilitating Authentication for the Disabled. In Proceedings of the IEEE International Conference on e-Business Engineering (ICEBE), Fudan University, Shanghai, China, 11th-13th October 2024; pp. 218–225. [Google Scholar] [CrossRef]
- Furnell, S.; Helkala, K.; Woods, N. Accessible authentication: assessing the applicability for users with disabilities. Computers & Security 2022, 113, 102561. [Google Scholar] [CrossRef]
- Laamanen, M.; Ladonlahti, T; Uotinen, S; Okada, A.; Bañeres, D.; Koçdar, S. Acceptability of the e-authentication in higher education studies: views of students with special needs and disabilities. Int J Educ Technol High Educ 2021, 18. [Google Scholar] [CrossRef] [PubMed]
- Di Campi, A.M.; Luccio, F.L. Accessible authentication methods for persons with diverse cognitive abilities. Univ Access Inf Soc 2025. [Google Scholar] [CrossRef]
- Andrew, S.; Watson, D.; Oh, T.; Tigwell, G. W. A review of literature on accessibility and authentication techniques. ACM Assets ’20 2020, 5, 1–4. [Google Scholar] [CrossRef]
- Alnfiai, M.; Sampalli, S. BraillePassword: accessible web authentication technique on touchscreen devices. J Ambient Intell Human Comput 2019, 10, 2375–2391. [Google Scholar] [CrossRef]
- Lewis, B.; Kirupaharan, P.; Ranalli, T-M.; Venkatasubramanianl, K. A3C: An Image-Association-Based Computing Device Authentication Framework for People with Upper Extremity Impairments. ACM Trans. Access. Comput. 2024, 17, 6. [Google Scholar] [CrossRef]
- NVivo (#1 qualitative analysis software for 30 years). Available online: https://lumivero.com/products/nvivo/ (accessed on 17 June 2025).
- Grimes, R. Introduction. In Hacking Multifactor Authentication; John Wiley & Sons: Indiana, USA, 2021; p. xxvii. [Google Scholar]
- Gibson, P. Thought (Chapter 8). In Philosophy; Arcturus: London, UK, 2021; p. 126. [Google Scholar]
- Mohajan, D.; Mohajan, H. Memo Writing Procedures in Grounded Theory Research Methodology. Studies in Social Science & Humanities 2022, 1, 10–18. [Google Scholar] [CrossRef]
- Braun, V.; Clarke, V. Can I use TA? Should I use TA? Should I not use TA? Comparing reflexive thematic analysis and other pattern-based qualitative analytic approaches. Couns Psychother Res 2021, 21, 37–47. [Google Scholar] [CrossRef]
- Mathematical Induction. Available online: https://www.math.wustl.edu/~freiwald/310induction1.pdf (accessed on 1 October 2025).
- Chun Tie, Y.; Birks, M.; Francis, K. Grounded theory research: A design framework for novice researchers. SAGE Open Medicine 2019. [Google Scholar] [CrossRef] [PubMed]
- Brink, E.; Dellve, L.; Hallberg, U.; Abrahamsson, K.; Klingberg, G.; Wentz, K. Constructing grounded theory. A practical guide through qualitative analysis. BOOK REVIEW. SAGE Open Medicine 2019, 1. [Google Scholar] [CrossRef]
- Data science vs data analytics: Unpacking the differences. Available online: https://www.ibm.com/think/topics/data-science-vs-data-analytics (accessed on 14 June 2025).
- Thompson, G. Products – assistive and accessible technologies. In Digital Assistive Technology; Awde, N., Banes, D., Banes, K., Eds.; Millenium Community Solutions: King’s Lynn, UK, 2022; pp. 74–235. [Google Scholar]
- Bhandari, G.; Lyth, A.; Shalaginov, A.; Grønli, T.-M. Distributed Deep Neural-Network-Based Middleware for Cyber-Attacks Detection in Smart IoT Ecosystem: A Novel Framework and Performance Evaluation Approach. Electronics 2023, 12, 298. [Google Scholar] [CrossRef]
- Rich, E.; Knight, K. Connectionist Models (Chapter 18). In Artificial Intelligence, 2nd ed.; Shapiro, D. M., Murphy, J. F., Eds.; McGraw-Hill: New York, USA, 1991; p. 492. [Google Scholar]
- The future of artificial intelligence. Available online: https://www.ibm.com/think/insights/artificial-intelligence-future (accessed on 12 November 2025).
- MacKenzie, I. S. Modelling Interaction (Chapter 8). In Human-Computer Interaction, 1st ed.; Morgan Kaufmann: Massachusetts, USA, 2013; pp. 249–255. [Google Scholar]
- Whittington, P.; Dogan, H. Authentibility Pass: An accessible authentication gateway for people with reduced abilities. In Proceedings of the IEEE International Conference on e-Business Engineering (ICEBE), Sydney, Australia, 4th-6th November 2023; pp. 155–162. [Google Scholar] [CrossRef]
- Schwartz, S.; Maciej, M. SAML (Chapter 3). In Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software; Apress: Berkeley, CA, 2020; p. 65. [Google Scholar] [CrossRef]
- Dash, S. K. Federated Authentication-II (Chapter 5). In Web Authentication Handbook; Orange Education: Delhi, India, 2023; pp. 167–169. [Google Scholar]
- Barker, J. Why physical space matters in cybersecurity (Chapter 7). In Confident Cyber Security; Kogan Page: London, UK, 2018; pp. 121–130. [Google Scholar]
- Firouzi, A.; Dadkhah, S.; Maret, S.A.; Ghorbani, A.A. DataSense: A Real-Time Sensor-Based Benchmark Dataset for Attack Analysis in IIoT with Multi-Objective Feature Selection. Electronics 2025, 14, 4095. [Google Scholar] [CrossRef]
- Intrusion detection evaluation dataset (CIC-IDS2017). Available online: https://www.unb.ca/cic/datasets/ids-2017.html (accessed on 4 November 2025).
- Li, Y.; Li, Y.; Wang, G.; Hu, H. An Adaptive Dynamic Defense Strategy for Microservices Based on Deep Reinforcement Learning. Electronics 2025, 14, 4096. [Google Scholar] [CrossRef]
- Zawadzki, P.; Dziwoki, G.; Kucharczyk, M.; Machniewski, J.; Sułek, W.; Izydorczyk, J.; Izydorczyk, W.; Kłosowski, P.; Dustor, A.; Filipowski, W.; et al. Quantum Enabled Data Authentication Without Classical Control Interaction. Electronics 2025, 188, 104810. [Google Scholar] [CrossRef]
- Battey, H.S.; Cox, D. R. Some aspects of non-standard multivariate analysis. Journal of Multivariate Analysis 2022, 14, 4096. [Google Scholar] [CrossRef]
- Ghorbani Lyastani, S; Schilling, M.; Neumayr, M.; Backes, M.; Bugiel, S. Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication. IEEE Symposium on Security and Privacy (SP) 2020, 268–285. [Google Scholar] [CrossRef]
- Disability. Available online: https://www.who.int/health-topics/disability#tab=tab_1 (accessed on 6 November 2025).
- Designing Remote Keyless Entry (RKE) Systems. Available online: https://www.analog.com/en/resources/technical-articles/designing-remote-keyless-entry-rke-systems.html (accessed on 14 November 2025).




| Disability Category | Nature of Disability |
| Physical | C6 Tetraplegia (Quadriplegia); Spinal Cord Injury; Muscular Dystrophy; Hand Dexterity1; Curved Spine1; Asthma; Spinal Problems1; Dyspraxia; Cerebral Palsy; Williams Syndrome2; Stroke2. |
| Cognitive | Dyslexia; Dyspraxia2; ADHD; Attention Issues1; Obsessive Compulsive Disorder (OCD) 1; Schizophrenia; Learning Disabilities1; Autism; Spectrum Disorder; Depression; Anxiety, Williams Syndrome2; Dementia; Stroke2. |
| 1 | Legend: G = General issues. V = Verification issues. L = Lack of issues. |
| 2 |
Questions marked with a * are mandatory, failing to complete this will invalidate your submission.
Other questions are optional, but if all are completed this will aid the research more.
Categorization key for the questions is as follows:
DE - Demographics
U - Usability
S - Security
DR - Disability Related
E - Effectiveness (of Authentication System)
P - Privacy
All - All categories
|
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
