Abstract
Access to information and communication using the Internet is still very limited for people with poor reading skills. Current mainstream web-applications such as email or web-shops are designed for people that have good reading skills. In our research we investigated the use of a web based email system by people with poor reading and writing skills. As literacy is not an absolute concept and people’s abilities differ by a great extent. Recent reports suggest that even in developed countries up to a quarter of the population have only elementary reading skills. In our research we investigate how web applications can be designed to be usable by this group of people. In this paper we report an analysis of a password based logon procedure and suggest an alternative. The development method use is based on the idea of participatory design, includes investigations and studies and lasted over about 4 months. In a study we could show that the login time can be significantly reduced for those users using an image based authentication method. Furthermore it showed that this method can be used by the users without help. For our experience with working with users we suggest general design guidelines for building UIs for people with a low level of literacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Corner, M., Noble, B.: Zero-interaction authentication. In: Proceedings of the Eighth International conference on Mobile Computing and Networking (MOBICOM 2002), pp. 1–11 (2002)
Cooper, A., Reimann, R.M.: About Face 2.0: The Essentials of Interaction Design, 2nd edn. John Wiley & Sons, Chichester (2003)
CPS August 2000. Home Computers and Internet Use in the United States: August 2000 (P23-207), http://www.census.gov/prod/2001pubs/p23-207.pdf
Dhamija, R., Perrig, A.: Déjà Vu: A User Study. Using Images for Authentication. In: Proceedings of the 9th USENIX Security Symposium, Denver, Colorado (August 2000)
Dhamija, R.: Déjà Vu: Using Images for User Authentication. Project Homepage, visited 2004-02-15 (2003), http://www.sims.berkeley.edu/~rachna/dejavu/
Nielsen, J. Molich, R.: Heuristic evaluation of user interfaces, Proceedings of ACM CHI 1990 Conf. Seattle, 1-5 April 1900, pp 249-256. additions at (1990), http://www.useit.com/papers/heuristic/
The OECD international program for student assessment. Homepage, visited 2004-02-15, http://www.pisa.oecd.org/
Stanat, Artelt, Baumert, Klieme, Neubrand, Prenzel, Schiefele, Schneider, Schümer, Tillmann, Weiß PISA 2000: Overview of the Study. Design, Method and Results (2000), http://www.mpib-berlin.mpg.de/pisa/PISA-2000_Overview.pdf
Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40(3) (2001)
Shneiderman, B.: Designing the User Interface: Strategies for Effective Human- Computer Interaction, 3rd edn. Addison-Wesley, Reading (1997)
Homepage of WEB.DE FreeMail, visited 2004-02-15 (2003), http://web.de
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Schmidt, A., Kölbl, T., Wagner, S., Straßmeier, W. (2004). Enabling Access to Computers for People with Poor Reading Skills. In: Stary, C., Stephanidis, C. (eds) User-Centered Interaction Paradigms for Universal Access in the Information Society. UI4ALL 2004. Lecture Notes in Computer Science, vol 3196. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30111-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-30111-0_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23375-6
Online ISBN: 978-3-540-30111-0
eBook Packages: Springer Book Archive