W3C home > Mailing lists > Public > w3c-wai-ig@w3.org > October to December 2006

Re: [WebAIM] More data on accesskeys (New article written Nov. 1)

From: Joshue O Connor <joshue.oconnor@ncbi.ie>
Date: Fri, 03 Nov 2006 10:32:02 +0000
Message-ID: <454B1AA2.7050804@ncbi.ie>
To: ac@nomensa.com
Cc: foliot@wats.ca, w3c-wai-ig@w3.org, WebAIM Discussion List <webaim-forum@list.webaim.org>

Thanks for that Alastair.

All the best

Josh

Alastair Campbell wrote:
> Josh wrote:
>> At the risk of upsetting a hornets nest here, can you please point to
>> any resources which indicate exactly what UA key combinations are
> mostly 
>> effected by user defined access keys?
> 
> There's a list of browser, OS & access technology keys here:
> http://www.wats.ca/show.php?contentid=43
> 
> Colin wrote:
>> I would be curious to read about any user or users who either use the 
>> feature or who have tried and found it unhelpful.
> 
> There are some, you might find such a reply in the WAI-IG archive
> somewhere, but it is rare. 
> 
> When testing client sites with a variety of people with different
> abilities and access technologies, I've not found one who spontaneously
> used accesskeys when they were available. 
> 
> When asked after the tasks if they noticed the accesskeys or used them
> on other sites, replies varied between "what accesskeys", "what are
> accesskeys", and "yes, but I've never used them". Given the poor
> implementations both in browsers and in sites (e.g. one that gave
> 'helpful' hidden text that spelt them phonetically, but then they didn't
> work anyway), those type of results are hardly surprising.
> 
> I'd love to make this sort of data available, but 1) It's confidential
> to each client, and 2) we asked out of curiosity, the tasks were to find
> or use things on the site. Accesskeys were not the focus, which I guess
> is quite realistic!
> 
> I can see good uses for often used applications (e.g. intranet apps or
> webmail clients), but they would still have to be user defined. For
> general sites, the @role style methods are the way forward.
> 
> Kind regards,
> 
> -Alastair
> 


********************************************************************

NOTICE: The information contained in this email and any attachments 
is confidential and may be privileged.  If you are not the intended 
recipient you should not use, disclose, distribute or copy any of 
the content of it or of any attachment; you are requested to notify 
the sender immediately of your receipt of the email and then to 
delete it and any attachments from your system.

NCBI endeavours to ensure that emails and any attachments generated 
by its staff are free from viruses or other contaminants.  However, 
it cannot accept any responsibility for any such which are 
transmitted.  We therefore recommend you scan all attachments.

Please note that the statements and views expressed in this email 
and any attachments are those of the author and do not necessarily 
represent the views of NCBI


********************************************************************
Received on Friday, 3 November 2006 10:32:19 UTC

This archive was generated by hypermail 2.3.1 : Wednesday, 5 February 2014 07:13:31 UTC