Keywords

1 Introduction

Smartphones are increasingly being adopted in India [1]. As an information device, a smartphone is very personal and portable compared to desktop computers and laptops. Users tend to keep their phone with them at all times for a variety of personal information needs. It is always powered on and available on voice and data networks. This makes the smartphone attractive and vulnerable to security and privacy threats.

There is a large population of visually impaired users, who are increasingly using touchscreen-based smartphones. Visually impaired users earlier used Symbian phones which were quite accessible with their assistive features and tangible keypads. Currently we observe that market forces seem to drive users to shift to touchscreen-based smartphones, primarily Android and iPhone. There has been considerable development [2,3,4] in accessibility on these smartphone devices, both on iPhone and Android. Yet users still face usability challenges in certain situations where using the phone may be challenging (e.g. public transport, walking, crowded situations) [5] or simply due to unfamiliar or infrequently used interfaces. Considering the accessibility and usability challenges that visually impaired smartphone users face, we feel they are also more vulnerable with regards to privacy and security. E.g. using passwords and phone locks, or typing itself can be time consuming and error prone with currently available accessibility modes [6]. Users also perceive privacy concerns while using accessibility modes [7].

The global visually impaired population is of a considerable size [10], with around 5 million in India alone (some report 15 million) [11, 12]. The World Health Organization (WHO) reported an estimate of 8 million people with total blindness [13] in India in 2010 [10]. Mumbai, India, is reported to have a visually impaired population of around 0.12 million [14]. We found it imperative to include visually impaired smartphone users in smartphone security studies, to help understand threats that they may be exposed to and their current practices, eventually aiding in building better usable security for smartphones. For this study, we have only considered users with total blindness [51] users (rather than users with other visual impairment. As per American Foundation ® for Blind, total blindness refers to “an inability to see anything with either eye.” [51]. We feel blind users would face such security and privacy risks and challenges more severely than sighted users and users with other visual impairments. Investigating these challenges would hopefully help in addressing concerns other visually impaired users too.

In this paper, we present the findings of our contextual inquiry based interviews with 51 totally blind smartphone users in Mumbai, India, with regards to their security and privacy practices with smartphones (Android and iPhone), their coping strategies with security measures such as passwords and native access control measures such as PIN, pattern locks and slide locks. We first review the relevant previous research, present the method used in our study and then highlight the outcomes of the affinity analysis of the contextual inquiry discussed from the perspective of security and usability, followed by a discussion of implications for design.

2 Previous Research

There have been numerous studies with sighted users [9, 12, 13, 15, 19, 2123, 26] as well as visually impaired users [1, 2, 4, 10, 11, 20] with smartphones, laptops and internet on various aspects of usability, privacy and security, although we have not found relevant empirical studies with visually impaired or blind users in India with regards to their security and privacy practices and behavior with smartphones.

2.1 Mobile Security Studies with Sighted Smartphone Users

Studies with sighted users suggest that users are generally concerned about privacy and security on their smartphones (even more so than on laptops). They are often signed in to multiple accounts on their phone, and use the phone to perform financial and other private transactions [9, 23]. The indispensable, personal and highly portable nature of the smartphone demands that it be well protected from threats of data loss, compromise and privacy, including threats such as loss of phone due to damage, theft or misplacing; unauthorized access through malware or physical access; and location tracking [15].

Asokan and Kuo [26], Ben-Asher et al. [27] and Jakobsson [28], all argue that security approaches for mobile phone environments need to be revisited as the environment and usage differs markedly from traditional computers. Smartphones do provide some measures to mitigate risks [22], but the decisions are often delegated to the users themselves, who may not be sufficiently prepared or have the awareness to take correct decisions [21]. However, studies suggest that users are not well informed about security and privacy decisions [22] and may often take inappropriate decisions. Users often do not find security features essential and keep them disabled [16, 21]. People also root or jailbreak their phones (Android and iPhone terminology to enable the phone for root or administrative access), leaving the phones vulnerable [21]. Users avoid regularly upgrading the operating system, missing security patches. There are many apps available from non-official sources in the market places or app stores. In order to make decisions about installing apps, users tend to rely on the price (i.e. free or very cheap) and popularity based on recommendations from friends and user reviews, rather than studying the end user license agreements, privacy policies and app permissions [15]. Users do not pay much attention nor comprehend the policies and app permissions [29]. Uses exhibit a ‘click through’ behavior when faced with various information prompts. Users trust the app repository with misconceptions that apps are tested for security [21].

One common means of protecting information is using authentication means like passwords or phone locks. Yet many users do not use any phone locking mechanisms such as PINs or pattern locks simply due to usability issues and a need to access the phone quickly, despite the presence of private and sensitive content on the phone [19]. Users would rather keep the phone within sight at all times, without any password protection. This form of lock-based protection on phones provides an all-or-nothing access [18], and is quite risky considering passwords saved within apps are common [19] and users are not required to key-in passwords frequently. Users report that they use simple passwords such as names or dictionary words. Users also store their passwords on their phones as contacts in plain text [19].

Users consider data such as GPS tracking, SMS, Phonebook contacts, Multimedia content (such as videos, photos and recordings), emails, documents and notes as most private, valuable and sensitive [19]. They tend to not trust keeping private data in the cloud, and prefer storing data on their computers or hard disks unless the data is shareable [19]. People do share phones among themselves for music, entertainment and making calls, but would rather have the phone in sight and depend on their relationship with the other users. Users tend to consider it a higher threat to share phones with known people rather than with strangers [19]. Photographs and messages are kept private from known people and contacts private from strangers. Unauthorized access to the phone seems fairly common [20]. Chen et al. [30] also discuss Internet security practices of users in the context of users in a developing nation. Recent work by Alsaleh et al. [31] discusses smartphone security practices of users from the dimensions of behavioral change and provide persuasive approaches for addressing unsafe practices.

2.2 Mobile Security Studies with Visually Impaired Smartphone Users

Challenges of usability and accessibility enhance the security challenges faced by visually impaired users. Touchscreens lack tangible feedback, and users mostly depend on aural feedback or assistive devices (screen readers, zoom). There are various studies on security and privacy related aspects for visually impaired users [6, 2325] and considerable advancement [2,3,4] in accessibility on touchscreen. Commonly performed activities on smartphones (and computers) include reading and writing emails, browsing internet for entertainment, downloading/uploading files, education, listening to podcasts, instant messaging, and interacting on social media platforms [17]. Users also transact and bank online, but usually prefer using desktops and laptops over smartphones.

Azenkot et al. [6] found that visually impaired users are generally not aware or concerned about security, and often use their phones without password protection primarily due to inconveniences faced. For example, the phone allows passwords to be masked, i.e. the screen reader reads the characters as stars or clicks while the user types in the password. This however makes it near impossible for users to type, i.e. without text entry feedback on a touchscreen device, users are clueless about what they are typing. If the user chooses to not mask the passwords, the screen reader speaks the characters aloud, which is again not desirable for keeping the password private. Users also find password managers, password recovery mechanisms, and typing itself quite difficult [23]. Users often tend to store their password elsewhere written in Braille or in files, or save them within apps [23].

There is also a lack of sufficient feedback while browsing the Internet or using smartphones, using the assistive features available. Some users hence spend less time online [17]. For instance, browser do not highlight phishing in an easily accessible manner, and feedback about errors is poor. Often user interfaces change frequently [23], which means the user needs to learn how to use the interface again.

In terms of privacy, visually impaired users frequently face the risk of being eavesdropped, both aurally and visually, in almost all activities they perform on the phone as they are often not sure when people are in their vicinity [23]. They feel a lack of independence and have to rely on sighted users for assistance, often strangers where they need to disclose private information in various situations such as filling forms, or reading messages or letters. Some users hence prefer online transactions and online shopping over shopping in real stores, although they still have concerns of security [23]. Users have various strategies to maintain privacy like relying on close relations such as spouse, family or close friends; using assistive technology; using screen curtains to black out the display; using headphones; or using the screen reader at low volume or at a very fast talking rate where others would find it difficult to understand.

As seen in the background literature, visually impaired users as well as sighted users face quite a few security and privacy challenges with their smartphones. They risk and often fail to protect their data effectively. The lack of awareness and inconvenience due to which users do not take appropriate measures can be attributed to usability and accessibility issues in interfaces and mechanisms provided for achieving the goals of security and privacy. The security goals in themselves are not primary, although a single event of compromise of data or privacy can prove disastrous to users. The phone is shipped with security features but in the context of the user they are not usable.

2.3 Usability and Security

Usability can be defined as the: “extent to which a system, product or service can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of use.” (ISO 9241 210: 2010) [32, 33].

Products are generally created with goals of usability. There are various methods to assess usability such as Nielsen’s [34] usability heuristics or Joshi’s [35, 36] Usability Goals Tool (UGT). Usability goals could include: ease of use where the conceptual model is communicated clearly so that there is a match between users’ mental model and the product, without entry barriers and unnecessary tasks, minimizing user task load, and always accessible. Operation of the product should be error-free, should not induce errors and the user should be able to recover easily if and when errors do occur. The system should provide appropriate feedback, display current status and should be accessible at all times.

While security is another overarching and important goal, users might take it for granted or consider it coming in the way of their actual goals. So, when usability and security intersect there are additional considerations and methods for usability evaluation [3739]. Saltzer proposes design principles for data protection among which the following seem relevant for when intersected with usability: “economy of mechanism” where the design is to be as simple and small as possible; “fail-safe defaults” and “psychological acceptability”.

Whitten defines security software as usable, through four points as follows:

“Security software is usable if the people who are expected to use it:

  1. 1.

    are reliably made aware of the security tasks they need to perform;

  2. 2.

    are able to figure out how to successfully perform those tasks;

  3. 3.

    don’t make dangerous errors; and

  4. 4.

    are sufficiently comfortable with the interface to continue using it.” [39]

Whitten describes properties of security which make it difficult to get user interfaces right or usable, such as: “unmotivated user”, “abstraction”, “lack of feedback”, “barn door principle”, and “weakest link”. The unmotivated user property highlights that security is not the primary goal of the user. Instead, the user wants to achieve other tasks, and would easily not give much thought to security, assuming that they are safe. Abstraction refers to abstracted security rules for granting access which may not seem intuitive to most users. The lack of feedback property speaks about how it is difficult for security software to perform useful error checking and provide feedback that the user wants. The barn door property refers to leaving secrets accidently open, after which one can never be sure if any attacker might have accessed it or not. The weakest link property refers to security being strongest as the weakest component, which can be exploited by attackers. User interfaces for security places priority on ensuring that users understand security well enough, and they should be guided through all aspects [39].

We have considered these dimensions of usability and security as per Joshi et al. [35, 36], Whitten [38, 39] and Saltzer [37] in our analysis and discussion of our findings.

3 Method

The objective of this study was to gain insights into how total-blind [13] users used touchscreen-based smartphones, with a focus on privacy and information security issues they faced, their coping strategies and practices, and their conceptual models.

We interviewed 51 total blind smartphone users in Mumbai, India, using a Contextual Inquiry (CI) [40] approach. We chose to interview total blind and not users with other forms of visual impairments to have a homogenous group of users, assisting our analysis of responses and cause of their behavior and practices. The users were in the age group of 18 to 40 (averaging around 25 years). There were 36 male and 15 female participants. More detail about the participants is provided in the Table 1 below.

Table 1. Particpants details

A group of researchers individually visited users at their homes, colleges or workplaces, across Mumbai. The CI method recommends visiting the users in their context. The researchers first briefed the users about the study, sought consent and proceeded with the interview. The researchers simultaneously also noted observations about the user and their immediate environment. The researchers gathered basic information from the users such as their demographic details, phone models and prior experience with smartphones, and then gradually proceeded towards asking contextual questions focusing on their security practices with the smartphone. The interviews had a conversational format and the researchers played the role of an ‘apprentice’, where the user would demonstrate how they used certain security related features on their phones with as much detail as possible (e.g., how they set a phone lock, or how they unlocked their phone). The users were also nudged to retrospectively recite various security related situations they might have been in, and were probed to provide details. As far as possible, the researchers avoided speculative situations and relied on past situations which the user actually had been in.

The interviews primarily dwelled on the usability and security related practices and challenges blind users faced in their daily lives – i.e. beliefs, practices and challenges they faced with using the locking mechanisms, with setting locks, managing Privacy, and setting, managing and using Passwords for their online accounts and apps.

The interviews were recorded using voice recorders, and later transcribed where local language were not translated. The interviews were discussed for arriving at structured notes. The researchers read and familiarized themselves with the interview transcripts, photos and videos, and shortlisted notes that were particularly related to the focus on Smartphone Usability and Security for blind users. The notes were printed as paper chits which were shuffled around in a box. Researchers picked a chit from the box, read it out aloud or passed it around. From a discussion that ensued the researchers arrived at a consensus about a model explaining the observation in the note, and noted down the model on a Post-It™ note. The Post-It™ note was put on a table with the chit below it. The researchers continued picking up chits from the box, and arrived at more models or updated existing models on the table, till clusters and categories formed.

Once all notes were categorized, the researchers then identified key categories which had a larger number of chits and seemed highly relevant to our focus, or were novel. The researchers read through the chits one by one under that category and tried explaining it through a model which was written or sketched on Post-It™ notes on a wall. With every chit we either reclassified it with other categories on the table if appropriate or updated the model on the wall till a good understanding of observed phenomena emerged and was captured through models on the wall.

To illustrate with an example: We clustered notes with observations such as how users used Talkback at low volumes, or at very fast rates, or strategies such as touching additional ‘fake’ characters while entering passwords to confuse eavesdroppers. These observations led us to arrive at models such as ‘Obscurity is used as a means to achieve privacy’. Such models after subsequent structuring, also developed into a primary category – ‘Assistive software is used as a layer of security’, which we discuss later in Sect. 4.3. In this way most of the categories and chits on the table were analyzed till we arrived at the most novel or relevant themes, in the views of the researchers, as described in the following sections. Figure 1 showcases the affinity diagramming.

Fig. 1.
figure 1

Affinity diagramming

4 Findings

4.1 Accessibility Challenges Lead to Predictable Passwords

Users expressed that virtual keypads were more difficult to use as compared to the Symbian based tangible keypad phones that they used earlier. Tangible keypads allowed speed and accuracy in typing as it was easy to find the correct keys. With touchscreen phones however, despite accessibility software such as Talkback or Voiceover, it is a challenge to locate keys accurately without the tangible feedback. Users often face breakdowns by accidentally pressing wrong keys or activating undesired operations. For instance, text entry usually involves three taps: one for scanning and reading out the letters on the keypad followed by a double-tap to enter the last key that was spoken out (there may be other such similar techniques). This is much slower than the tangible keypads where users could find and enter the desired keys easily, simply relying on their cognitive and muscle memory of the location of the key. With phone locks, issues are amplified as the users’ desire frequent and quick access to their phones, and the lock gets in the way. Hence we found users opting out of locks or using very simple-to-type PINs and Patterns.

“…the screen reader speaks numbers and symbols, but at times we accidently press the small button the side which changes the language… We don’t understand what’s happening then, and we have to re-enter the password.” – (NJ.U4.06)Footnote 1.

Our observations led us to believe that the typing difficulty on virtual keypads led users to keep passwords that are easier to type, which are also hence predictable – those which would have minimal resistance or ease of entry. We thus observe a conscious move towards predictability to lower the entry barrier, indicating that the user goals significantly outweigh behavior towards protection interventions. E.g., User AS03 (Fig. 2) demonstrated how they entered 111111 as a PIN on her iPhone. It simply required her to first scan and locate 1 (which was easy). After that they had to double tap multiple (12) times to enter six 1’s, which they did quite rapidly. We thus observe that the coping mechanisms deployed by the users significantly increases risk of compromise.

Fig. 2.
figure 2

User sets a PIN using a single digit

“It’s better to keep a single digit. I’ve kept 1 six times.” – (AS03)

Consider an alternate example, 135743. This would require the user to scan and locate each digit followed by a double tap, which is an increase in 5 taps, slowing the user. 111111 reduces the effort required to scan, locate digits and double tap. Users may not keep PINs that require them to move all over the keypad. A similar practice was noticed with using Patterns, where they resorted to starting at edges and preferring straight lines (L’s) or squares.

“One sleeping line goes over 3 points and one standing line goes over 2 points. I felt this is possible for blind people. I tried a lot, to at least make one sleeping line…on my phone as well on others, but I couldn’t figure it out. There are just 3 sleeping lines, but it is difficult. If there was only one sleeping line, then it could help blind people.” – (SKU412)

It appears that users focus on ease and speed of input for passwords and locking mechanisms, rather than recallability or non-guessability, when using touchscreen devices. If users perceive access control measures as reducing productivity, they deploy weaker protection measures which are predictable based on ease of entry. A related observation about predictability of passwords, was that users kept simple and recallable passwords based on their daily personal contextual data, or rather based on their ‘sign-up’ information. By this we mean that passwords were combinations of details such phone numbers, account numbers, names of friends, family or places, or names of favourite movies and games, or related to religion or beliefs (such as names of gods, or lucky numbers). This is not very different from what one would expect with sighted users’ passwords. The users however did demonstrate attempts to mix and combine names, numbers and characters to try keeping the passwords non-guessable.

“For Facebook, I’ve kept my password close to my name. In Gmail I have tweaked my phone number a little here and there. So that I don’t forget.” – (BBU215)

The other specific finding about password choices with blind users was that visually impaired users have a unique code for representing letters by number codes. E.g. User DTU6 encoded their passwords using this strategy, which could be a decent technique for setting a recallable password which is non-guessable at least outside the community.

“Actually, we speak a number language, which we call 123… I had just kept my name (as password)…in MarathiC means Cha. We call C (Cha) as 31. So, I had kept the password like 31 ** ** 12 (masked for privacy).” – (DTU614)

Literature highlights how the keyboard layouts and small form-factor of mobiles affect influence password choices [41, 42]. Our observations suggests that accessibility of the touchscreen interfaces also affects the password choices both in case on PINs as well as Patterns.

4.2 Migration Across Locking Mechanisms – No Lock to TouchID

Figure 3 below highlights how we interpreted users’ transition across various locking mechanisms, based on three dimensions – security, usability and accessibility. Users tend to start out with no phone locks when the phone is new, and might use the Swipe/Slide Lock or simply the power button to start the screen. Users commonly stated that there is nothing valuable on their phones to justify the absence of locks. They felt locks prevented hassle-free frequent access to their phones. They also feared getting locked out of their phones, in case they forgot the password. One user also believed that passwords would slow down the phone. Some users stated that they did not know how to or had not yet ‘learnt’ how to set the phone locks and might do so at some later point in time. Some users reported that in case of emergencies, others should be able to use and unlock their phones. They stick to the adopted mechanism (beginning with no-lock as in Fig. 3) till a trigger makes them change and adopt locks. These triggers are either from the dimension of security, usability or accessibility issues. The security trigger is usually an exposure to a risk situation where they may have lost data, faced privacy issues, etc. This prompts users to start employing a security measure, usually a PIN lock. Other reasons could be merely out of curiosity, e.g. trying out Patterns as it appears as an interesting challenge to blind users. Once they have adopted a security measure, again users would stick to it till they feel inconvenienced by usability or accessibility challenges with the mechanism, prompting them to try out other mechanisms or revert to no locks (or easier mechanisms like PINs). In case of biometric fingerprint based locks (Touch-ID on iPhones), we felt users did not revert to other mechanisms. (We did not observe users of biometric fingerprint locks on Android phones). This migration might take place till users find a good enough balance between accessibility, usability and security.

Fig. 3.
figure 3

Migration across phone locking mechanisms

“…Once, a family member met with a bike accident. Their phone was locked completely. No one was able to call the family members as the app lock couldn’t be unlocked. That’s one reason (for not keeping a lock.)” – (BBU716)

Users seem to need a strong trigger to begin using phone locks. These are often cases of thefts, shoulder surfing and being unable to assess if anyone is watching their screens, or sensitive information/applications such as net banking installed on the phone. Similar triggers also led users to change their current PINs (or passwords). Users explored the various security phone locking options and usually settled on PINs stating that numbers are easy and less tedious compared to Passwords or Patterns. Patterns were treated as impossible to understand for blind users. iPhone users however loved the biometric fingerprint option – TouchID.

“I had a friend sitting near me, who saw me opening my phone lock. She asked me for my password. I refused, but she was insistent. Then she said she knows my password. I told her to open my phone then if she could. She unlocked it! She was partially (blind) so she could see. I immediately changed the password.” – (RCU4)

Some users either preferred PINs over Patterns or Patterns over Pins due to perceptions about how they performed on speed and ease, especially during situations/context where the mechanism were difficult to use – such as being sleepy or travelling in public transport where the rides are bumpy.

“The problem with PIN was you had to double touch every time. I had kept mine (password) as 1234. So you have to type double 1, double 2 double 3, double 4 due to talkback. Talkback requires double touch. Sometimes when I’m on the road, I face difficulties. Then I changed to a Pattern. Since then my problems have reduced, because with this I can open my phone quickly.” – (BBU210)

iPhone users found the fingerprint biometric authentication – Touch-ID, as a very convenient option, despite occasional issues faced in fingerprint recognition. Users who used Touch-ID would not migrate back to no locks. They felt comfort with the presence of a fallback of a PIN when fingerprint recognition failed, so they did not have the fear of getting locked out of the phone. Most other (Android) users either used PINs or reverted to the swipe lock, or no lock or interestingly used accessibility features, such as Dim-Screen as a layer of security (discussed in the next section).

“Basically I use TouchID. I also have Passcode in place. The TouchID has a good biometric sensor, it works most of the time. When it doesn’t, then I use Passcode. I believe TouchID is the best, you know you need to place the thumb.” – (BBU105)

Existing studies [6, 16, 43] have found that most users (sighted) use locks for security and privacy, with PINs being prevalent. For those who do not use locks, it is usually due to a lack of motivation, lack of concern or inconvenience. Users tend to start using locks when prompted to (usually by a significant other) and would then stick to using the lock, despite inconveniences faced. Users seem to face more errors with Patterns, compared to PINS. Azenkot in an earlier study with visually impaired users found all their participants avoided lock, which is not the case in our study, but those who did not use locks claimed similar reasons of not knowing about it or inconveniences faced. Similarly, the use of Screen Curtain instead of a lock was prevalent in our study too. Users in our study however claimed avoiding headphones in public, contrary to Azenkot’s observation. While the studies have discussed users’ motivations to use locks, their choices of pass-codes, and also compared common options such as PINS, Patterns and Biometrics, further investigation of how people choose and migrate between various forms of locks might yield interesting insights, especially concerning usability and accessibility of the interfaces with visually impaired users.

4.3 Assistive Software as a Layer of Security

Users may not always find the existing accessibility features on their phone to effectively use the locking and security mechanisms effectively. For instance, the screen readers read the passwords aloud while entering passwords. There are settings where users can disable the screed reader from reading the passwords, but then they do not know what they are typing. This leaves them with the option of using headphones which is not suitable for frequent unlocking, and hence is a discomfort. Users also feel headphones are unsafe to use constantly as they depend on their aural senses for their activities. Users face issues of accuracy and speed with using the unlocking mechanisms as discussed in Sect. 4.1. Users tend to deal with these situations by doing away with phone locks altogether, or entering the code at low volume without headphones.

“A long time back I had tried passcode, but it used to just say dot-dot when I would enter any number. I could not know what number was pressed. That’s why I never set anything for screen lock.” – (ASU501)

Instead of depending on the locking mechanisms alone, users seem to also use the assistive features as an additional layer for security. For instance, when users are unable to assess if anyone is eavesdropping, then tend to obscure or hide their activity using physical means, i.e. holding the phone in a particular way or covering the screen with their hand. Another interesting way of obscuring was using the accessibility options on the phone, i.e. the Dim Screen or Screen Curtain option, or the screen reader set at a very fast speaking rate. With the Dim Screen option, the screen is totally turned off while operating so others are unable to see the screen. Hence users also went to the extent of not using a phone lock, as they felt Dim Screen was sufficient protection from snoopers.

“I use a feature present in TalkBack, called Dim Screen, so I don’t need to keep any password. Nobody can see anything. Because of this feature I do not require any screen security for my phone.” – (NSU215,16)

Again, the screen reader and other alternate gestures that they used when the phone is in accessibility mode were considered difficult for others, mainly sighted users. Hence they felt their phones were safe from others. They felt other users need to be skilled to use the phone with the accessibility mode on. They also kept the speech rate very high, making the speech indiscernible by others. This was another form of obscurity protecting their privacy in public. In the case where the screen readers speak the password/pin aloud, one user intentionally scanned over random keys while entering the password, thus obscuring the actual password. Although not fool proof, an untrained listener would find it difficult to understand which keys were merely scanned and which were actually entered.

“If I don’t want people to know what my PIN is, I create a false PIN by touching extra numbers. If I don’t release the touched numbers, they are not entered. So people do not know what PIN I entered. Generally, I keep in mind that when I enter my PIN, I hold my phone closer to me so that nobody can see anything. Even you didn’t get my PIN, did you?” – (BBU108)

In some cases users felt that keeping the screen reader at a very loud is useful, especially when the phone is not on their person. This allowed them to notice if somebody started interfering with their phone.

However, it is apparent that these approaches of depending on accessibility features for obscurity for privacy and protection is limited. It only protects them from sighted and untrained users. As the phone security features are not amenable out-of-the-box to the blind users, the users have coped up by using assistive features in interesting ways. We feel that it might be interesting and useful if designers could explore this further and consider enhancing assistive features for security and privacy too. While studies have highlighted the use of Screen Curtain for privacy [6], the phenomenon and opportunity of adapting assistive software of smartphones of security and privacy would be interesting to explore further.

4.4 Patterns – a Maze

Most users felt Patterns are impossible for them to use as they cannot understand them. They face difficulty in locating the dots and connecting them by gestures (lines). Patterns are not accessible enough although there are soft buzzes when the user touches the dots. The screen reader also provides a few instructions, but are mostly not helpful enough. Some users had explored patterns but did not adopt them as were unable to use them, despite feeling that Patterns could be faster to use than PINS. We feel users found it challenging to build a mental model of Patterns. It was also a new mechanism which was not available on earlier tangible phones.

“It would just speak ‘Pattern Area’. I would draw the wrong pattern. The phone would never unlock. I had to take somebody else’s help. So, I stopped using patterns.” – (SKU409)

We found a couple of users who used patterns easily. We observed that user BBU2 had developed a strategy to locate the first dot, after which they could locate the rest and reach a speed similar to sighted users in unlocking the phone. The user held the phone in a unique way with the thumb and fingers positioned possibly to locate the first dot accurately, i.e. on the right top edge of the pattern grid (Fig. 4). However, we noticed that the few users who used Patterns appeared to use quite predictable patterns to enable accurate and quick access. The tendency was to start at edges, as they needed an anchoring point. They relied on straight paths and avoided diagonals, to avoid accidentally touching the wrong dots. This resulted in simple shapes – ‘sleeping lines’ or L’s, and squares (a C) on the 3 × 3 grid. Similar to the concerns people had with PINS, users also found using Patterns accurately in certain situations where attention is difficult (e.g. sleepy or travelling).

Fig. 4.
figure 4

User using a Pattern lock accurately identifying the dots

“…I would want to connect four dots only. I don’t want to connect more. So, I’m telling you that I would keep an L or Square.” – (BBU215)

Despite its apparent difficulty, Patterns could be widely adopted by blind users if the accessibility was improved. Example, it should be easier to locate and anchor to the starting dot in the pattern. E.g. Buzzi et al. have discussed approaches how visually challenges users can orient themselves on touchscreens more easily [44, 45]. Otherwise, for most users the Patterns is currently a maze – they need to be really motivated to attempt to understand and develop a strategy to find their way through.

Existing studies [4648] are inconclusive about preferences of Patterns over PINs. Patterns seem to have a higher rate of errors. Yet users tend to prefer Patterns as they perceive better feedback, ease of use, efficiency and memorability. We were unable to find detailed studies discussing the use and accessibility of Patterns by visually impaired users. Users seem to need to orient themselves better on the screen to be able to use Patterns more effectively.

4.5 Password Backups and Fallback Users

Users frequently seek assistance from others, usually sighted users, to set up their online accounts for email, Facebook, etc. They often require assistance as they are unfamiliar with the interface, and also find CAPTCHAs challenging. They usually seek assistance from people they consider tech-savvy – e.g. trainers as blind institutions, phone vendors, or family members. While seeking assistance, they often share personal information including passwords. Some users reported that they did not change the passwords later, as they trusted the person who helped them and expected him or her to forget about it. However, some users who appeared more tech-savvy and security paranoid did change the passwords later. Some even deleted their account and set up a new account as they were now familiar with the process.

“I had faced a problem with my Gmail account. I had entered username properly, but when I tried to enter password, it would speak out star-star… I didn’t know what to do. Then I took a sighted person’s help for logging in using email id and password” – (ASU101)

Users face similar challenges in resetting passwords, and need assistance. To prevent forgetting passwords, especially important ones, users resort to sharing passwords with a trusted person, as a backup. This trusted person is usually a family member or a close friend, who may also sometimes assist the user with operating the account. Sharing passwords is also seen in an existing study by Singh et al. [49] an emerging trend, especially among married couples, disabled users and indigenous communities. The authors [49] also highlight principles for Design considering such a phenomenon.

“My friend knows my password because he needs it to fill some forms for me. He is the only person who knows my password.” – (RSU412)

They also resort to keeping the password written down in a diary at home or in a password-protected file on their laptop. Users also maintained a list of passwords that they cycled through across various accounts. Other users however relied on using the “forgot password” option to reset the password instead of taking measures to remember, store or share passwords. Some used drastic measures such as creating a new account, rather than attempting recovery. Similar reactions are reported in a study with less-literate users [50].

The motivation to share or store passwords seems to stem from the difficulty faced in recalling passwords as well as in resetting their passwords. The passwords that were shared or backed up were usually those that were important and infrequently used (e.g. those related to the college/university or banking).

“My university password… I’ve written it in 2-3 places. It is written on my mobile, at home, and on my wall calendar as well.” – (RSU714)

Table 2 provides a summary of number of notes considered supporting the themes that emerged.

Table 2. Key themes and supporting notes considered

5 Discussion and Design Recommendations

We assessed our findings using the framework of UGT [35, 36] to define the users’ usability goals and also considered usable security related aspects from Whitten [38] and Saltzer [37]. We considered the usability and security goals for blind smartphone users as (1) being able to protect their data and privacy using the security mechanisms on their phone appropriately, (2) being able to protect their online accounts with good password practices supported by the phone interfaces.

Users tend to find existing phone locking mechanisms error-prone due to lack of tangibility and ineffective feedback, affecting accuracy, speed and ease of use. Although users are often motivated to learn the locking mechanisms, apparent from how they have explored the various options, they often find it difficult to understand the mechanisms and are not comfortable with the interfaces. Users also face barriers in locating and learning the settings for setting up the locks, especially without assistance from sighted users. This activity of setting a lock is infrequent, and being unfamiliar with the interface, users tend to have a certain amount of fear to set up locks. Frequent errors while using the locks also lead to the fear of getting locked out of their own phone (‘dangerous errors’). Tapping on areas accidentally also messes up the interaction (Economy of mechanism’ and ‘Psychological acceptability’). Hence, users either opt to not using locks at all, or adopt very simplistic predictable passwords (‘unmotivated user’). Additionally they adopt accessibility features as means to obscure and protect privacy. Accessibility concerns seem to be the key issue that affects secure adoption of phone locks by blind users. Improved accessibility and biometric approaches could improve adoption. Among the locking mechanisms available, finger print recognition seems to have the best ‘economy of mechanism’ and ‘psychological acceptability’. However, it can be argued that biometric authentication still needs to evolve for better security [51]. Patterns is another promising quick approach, if accessibility could be improved. Poor accessibility also leads the user to take assistance from others – blind and sighted (‘weakest link’, ‘barn door’). They even write and sharing their passwords or accounts, leaving themselves exposed and vulnerable to attacks. Hence, improving the accessibility of especially of security features is of prime importance.

We also found that the users have an attitude of continual learning and have a close-knit community among themselves. They are informed about good practices and share tips among themselves via workshops conducted by organizations for blind or via WhatsApp and other online communities. As users seem open to technology and share information and good practices, we feel quick dissemination of security solutions and awareness is possible. Being tech savvy and explorative, alternative interfaces could be explored which might be usable and effective to visually impaired users. Researchers such as Kane, Leporini, Buzzi, Azenkot and Guerreiro have discussed novel approaches for usable and accessible interfaces on smartphones [8, 45, 5257].

A primary challenge with visually impaired users using touchscreen smartphone interfaces is the lack of tangibility and visual cues. Sighted users usually rely on subtle or direct visual cues while interacting with user interfaces. This channel is blocked out for blind users. Instead they depend on the audio channel, which is either missing or minimal, and is usually incidental and not specifically designed for accessibility. At the most there is minimal haptic feedback through buzzes, and the screen reader but does not provide a sense of a user interface that visual cues do. In current interfaces, there seems to be little or no mapping or information redundancy between the visual and audio channels. A transfer of feedback from the visual to an aural and tangible channel is required for appropriate feedback as recommended for usability of the interfaces. Users could then subconsciously process information while interacting with the interface. Such interfaces could be translated to have a parallel aural and haptic interface. For instance a Morse-like code which vibrates privately in the hand. Vibration and aural standards could be defined as alternatives to visual interfaces, over and above screen reader which are essentially text to speech. For example, some existing studies investigate providing prosodic cues with screen readers [58, 59].

Accessible security interfaces should focus on achieving better speed and ease-of-use. Occasionally used screens such as Settings or Account creation should be accessible enough to avoid assistance from sighted users – or at least designed to allow mediation and assistance but maintaining privacy of the users wherever required.

New accessible phone locks can be explored – again focusing on ease and speed of use for visually impaired or eyes-free access. For existing phone locks, fallbacks could be introduced: e.g. Touch-ID to PIN. Instead of locking out phones after unsuccessful attempts to unlock the phones (caused by errors in input), users could be given a secondary lock interface. Anchoring points could be developed or overlaid on touch screens (as in the mark on the ‘5’-key on earlier phones) which could assist users to orient and anchor themselves to use visual/spatial interfaces such as PINS. There is scope for the pattern locks to be improved for accessibility. Potentially, there are a lot of cues from the earlier tangible Symbian phones, and how blind users used them, which could transition into the newer touchscreen smartphones.

Users currently use the accessibility settings for privacy, such as a rapidly speaking screen reader or dim screen. The accessibility features could be enhanced to embrace this behaviour, and designed for better obscurity, allowing privacy from blind and sighted users alike.

6 Conclusions

We believe that the area of security interventions for smartphones in the context of usability can be better aligned. Users face constant difficulties due to accessibility shortcomings. This affects their productivity and they opt out of using locking mechanisms. They cope up by appropriating the assistive features as obscurity for privacy. Improvement in the accessible phone locks, password recovery and account creation, could vastly assist them being independent and secure.