Resources
Comprehensive resources for understanding trust, accessibility, and inclusive security in digital government services.
Key Research & Frameworks
Foundational theory and evidence base for inclusive digital services
Design Justice Network
Framework and network advocating that design processes must include those most impacted by design decisions. Provides principles for accountability, community leadership, and dismantling design's role in oppression. Essential foundation for this research's approach to centering seniors excluded by security design.
Visit ResourceAnnette Baier: Trust and Antitrust
Baier's work examines how trust operates in unequal power relationships and can facilitate abuse when built on invisible assumptions. Critical for understanding how security systems establish trust relationships with users who lack power to negotiate terms. Foundational theory for analyzing trust failures.
Visit ResourceEurostat: Population Structure and Ageing
Official statistics showing senior population trends across EU member states, projected to reach 29.4% by 2050. Provides evidence that designing digital services without considering seniors excludes a massive and growing demographic. Essential context for why this research matters.
Visit ResourceRuha Benjamin: Race After Technology
Benjamin's work reveals how supposedly neutral technology design choices embed discrimination and maintain power structures. Her "New Jim Code" framework applies directly to how security measures exclude based on age and ability. Demonstrates that technical choices are political choices with consequences.
Visit ResourceAccessibility & Security Standards
Legal requirements and compliance frameworks
European Accessibility Act
Mandates that authentication and security systems must be accessible to people with disabilities. Applies to banking, e-commerce, and government services. Relevant because many current security measures (CAPTCHAs, MFA, biometrics) violate these requirements. Enforcement beginning 2025 creates urgent need for documentation.
Visit ResourceBITV 2.0 (German Accessibility Law)
Requires WCAG 2.1 Level AA compliance for all German government websites and apps, including authentication flows. Establishes technical standards for keyboard navigation, screen reader compatibility, and adequate time limits. Provides enforcement mechanism for accessibility violations in government security systems.
Visit ResourceEU AI Act
Classifies fraud detection and biometric identification as "high-risk AI" requiring transparency, human oversight, and bias mitigation. Article 9 mandates risk assessment for vulnerable groups. Relevant because many security barriers come from AI systems that haven't assessed senior/disability exclusion risks.
Visit ResourceWCAG 2.1
Level AA compliance is legal requirement in most EU countries. Success Criterion 3.3.8 (Accessible Authentication) specifically addresses security barriers. Provides concrete technical guidance on what accessible authentication looks like. Reference standard for evaluating security system accessibility.
Visit ResourceW3C: Accessible Authentication Guidance
Details why cognitive function tests (CAPTCHAs, memory requirements) fail accessibility and what alternatives exist. Explains how to implement authentication that doesn't assume specific abilities. Critical resource for implementation teams trying to build inclusive security.
Visit ResourceSelf-Assessment: AI Literacy & Implementation Readiness
Tools for evaluating your understanding of AI trustworthiness and your team's readiness to implement inclusive security systems
AI Literacy Assessment
What it covers:
Evaluates knowledge of transparency requirements, accountability mechanisms, bias detection, and user rights in AI-powered authentication and fraud detection systems. Based on EU AI Act requirements and GDPR principles.
Who it's for:
Implementation team members, policy makers, procurement officers, anyone involved in selecting or deploying AI security systems.
Scenario-Based Learning Tool
What it covers:
Presents realistic scenarios where authentication, fraud detection, or consent systems create barriers. Players make design decisions and see consequences for different user groups. Reveals hidden assumptions in "secure by default" thinking.
Who it's for:
UX designers, product managers, developers, anyone designing security systems for public services.
Practitioner Tools & Guidelines
Implementation resources for building inclusive security systems
W3C: Accessible Authentication
Technical guidance for implementing authentication without cognitive function tests or ability assumptions. Provides practical alternatives to CAPTCHAs and complex password requirements.
Visit ResourceNIST Digital Identity Guidelines
Comprehensive technical framework including risk-based authentication and guidance on alternative verification methods. While US-focused, provides detailed implementation patterns applicable internationally. Includes considerations for users without smartphones or who need assisted authentication.
Visit ResourceGOV.UK: Assisted Digital Guidance
Practical framework for providing human assistance when digital-only approaches fail. Covers phone support, in-person help, proxy users, and designing services that work for people with low digital literacy. Evidence that governments recognize digital exclusion requires non-digital alternatives.
Visit Resource