Abstract
The overarching goal of UA is affording all individuals, regardless of disabilities, geographic status, infrastructure, age or training background, the use and benefit of information technology. The goal of this paper is to raise awareness of the security and privacy cyber risks in the everyday use of UA technology. The challenge of UA technology transfer from the laboratory to real world setting leads us to identify vulnerabilities of UA users and to present examples of cyber security strategies to safeguard data. The principles of confidentiality, integrity and availability guide our non-exhaustive review of concrete UA approaches and their security and privacy implications for everyday use. We examine the cyber risks to privacy and security of brain computer interfaces and UA home networking and conclude with call to interdisciplinary collaboration between the security and UA expert communities to ensure the transitioning of safe and secure UA technologies to the end-users.
Chapter PDF
Similar content being viewed by others
Keywords
References
Universal access: theoretical perspectives, practice, and experience. In: Carbonell, N., Stephanidis, C. (eds.) 7th ERCIM International Workshop on User Interfaces for All. Springer, Berlin (2003)
User-centered interaction paradigms for universal access in the information society. In: Stary, C., Stephanidis, C. (eds.) 8th ERCIM Workshop on User Interfaces for All. Springer, Berlin (2004)
Stephanidis, C. (ed.): Universal access in HCI: Towards an information society for all, vol. 3. Lawrence Erlbaum Associates, Mahwah (2001)
Stephanidis, C. (ed.): User interfaces for all: concepts, methods, and tools. Lawrence Erlbaum Associates, Mahwah (2001)
Maybury, M.T.: Security and Privacy for Universal Access. In: Stephanidis, C. (ed.) The Universal Access Handbook, pp. 1–11. CRC Press, Boca Raton (2009)
Please Rob Me: Raising Awareness about Over-sharing, http://pleaserobme.com/ (retrieved January 7, 2011)
U.S. Department of Health & Human Services. Breaches Affecting 500 or More Individuals, http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/postedbreaches.html (retrieved February 6, 2011)
Frontline by PBS, http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/ (retrieved February 13, 2011)
Chas, R.: The Ungooglable Man. Reprinted with permission from The Cartoon Bank/Conde Nast, The New Yorker (March 22, 2010)
Falliere, N., Murchu, L.O., Chien, E.: W32.Stuxnet Dossier. Symantec Security Response, 1–69 (2011)
Pfleeger, C.P., Pfleeger, S.L.: Security in computing, 4th edn. Prentice Hall, Upper Saddle River (2006)
Mayron, L.M., Bahr, G.S., Balaban, C., Bell, M., Ford, R., Fox, K.L., Henning, R.R., Smith, W.B.: A hybrid cognitive-neurophysiological approach to resilient cyber security. In: The 2010 Military Communications Conference – Unclassified Program – Cyber Security and Network Management (MILCOM 2010-CSNM), San Jose, California (October 2010)
Cheswick, W., Bellovin, S., Rubin, A.: Firewalls and internet security: Repelling the wily hacker, 2nd edn. Addison-Wesley Longman Publishing Co., Inc., Boston (2003)
Mayron, L.M.: Secure Multimedia Communications. IEEE Security & Privacy 8(6), 76–79 (2010)
Bank of America, https://www.bankofamerica.com/ (retrieved January 7, 2011)
Schach, S.: Object-Oriented and Classical Software Engineering. McGraw-Hill, New York (2010)
Amoroso, E.: The Effects of Cyber Attacks. In: AT&T, Cyber Security, ch. 3. Silicon Press, Summit (2007)
Greene, S.S.: Security Policies and Procedures: Principles and Practices. Prentice Hall, Englewood Cliffs (2006)
Adams, R., Bahr, G.S., Moreno, B.: Brain Computer Interfaces: Psychology and Pragmatic Perspectives for the Future. In: Proceedings of the Artificial Intelligence and Simulation of Behaviour (AISB) 2008 Symposium on Brain Computer Interfaces and Human Computer Interaction: A Convergence of Ideas, vol. 5(1-6). The Society for the Study of Artificial Intelligence and Simulation of Behaviour, Aberdeen (2008)
U.S. Department of Health & Human Services. What does the HIPPA Privacy Rule do?, http://www.hhs.gov/ocr/privacy/hipaa/faq/privacy_rule_general_topics/187.html (retrieved February 6, 2011)
Asokan, N., Niemi, V., Nyberg, K.: Man-in-the-middle in tunnelled authentication protocols. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2003. LNCS, vol. 3364, pp. 28–41. Springer, Heidelberg (2005)
Thulasidas, M., Guan, C., Wu, J.: Neural Signal Process. Lab., & Inst. For Infocomm Res., Singapore. IEEE Transactions on Neural Systems and Rehabilitation Engineering on Robust classification for EEG signal for brain-computer interface 14(1), 24–29 (2006)
Augmented Cognition International Society, http://www.augmentedcognition.org/ (retrieved February 12, 2011)
Baillie, L., Pucher, M., Képesi, M.: A supportive multimodal mobile robot for the home. In: Stary, C., Stephanidis, C. (eds.) User-Centered Interaction Paradigms for Universal Access in the Information Society: 8th ERCIM Workshop on User Interfaces for All, pp. 375–383. Springer, Berlin (2004)
Becker, S.A., Webbe, F.M.: Designing for Older Adult Users of Handheld Technology. In: Proceedings of the 28th IEEE Engineering in Medicine and Biology Society Annual International Conference, pp. 3297–3300 (2006)
Cook, D., Das, S.: Smart Environments: Technology, Protocols and Applications in the Wiley Series on Parallel and Distributed Computing. Wiley-Interscience, Hoboken (2005)
Hacker spannt junge Mädchen per Webcam, http://www.stern.de/digital/online/150-faelle-hacker-spannt-junge-maedchen-per-webcam-1584091.html (retrieved January 6, 2011)
YouTube, http://www.youtube.com/ (retrieved January 6, 2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bahr, G.S., Mayron, L.M., Gacey, H.J. (2011). Cyber Risks to Secure and Private Universal Access. In: Stephanidis, C. (eds) Universal Access in Human-Computer Interaction. Design for All and eInclusion. UAHCI 2011. Lecture Notes in Computer Science, vol 6765. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21672-5_47
Download citation
DOI: https://doi.org/10.1007/978-3-642-21672-5_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21671-8
Online ISBN: 978-3-642-21672-5
eBook Packages: Computer ScienceComputer Science (R0)