- From: Rochford, John <john.rochford@umassmed.edu>
- Date: Tue, 18 Aug 2015 10:58:03 +0000
- To: "lisa.seeman" <lisa.seeman@zoho.com>, public-cognitive-a11y-tf <public-cognitive-a11y-tf@w3.org>
- Message-ID: <55BD19D83AA2BE499FBE026983AB2B58394A107F@ummscsmbx07.ad.umassmed.edu>
Hi Lisa, My second impression about this approach is that it could be combined with recommendations for what developers *should* do. Example: “Minimize the user’s memory load by making objects, actions, and options visible. The user should not have to remember information from one part of the dialogue to another. Instructions for use of the system should be visible or easily retrievable whenever appropriate.” Reference: Neilson 10 Principles at http://www.expressiveproductdesign.com/nielsens-10-usability-heuristics-user-interface-design/ , provided by Steve Lee to our list serve on 8/14. John John Rochford<http://profiles.umassmed.edu/profiles/display/132901> UMass Medical School/E.K. Shriver Center Director, INDEX Program Instructor, Family Medicine & Community Health www.DisabilityInfo.org Twitter: @ClearHelper<https://twitter.com/clearhelper> [Facebook Button]<http://www.facebook.com/pages/New-England-INDEXShriver-CenterUMass-Medical-School/227064920160>[Twitter Button]<https://twitter.com/NEINDEX> [WordPress Logo] <http://www.disabilityinfo.org/blog/> From: Rochford, John Sent: Tuesday, August 18, 2015 6:48 AM To: 'lisa.seeman' <lisa.seeman@zoho.com>; public-cognitive-a11y-tf <public-cognitive-a11y-tf@w3.org> Subject: RE: technique to include security Hi Lisa, My first impression about this approach is that it does not provide developers any recommendations about what they *should* do, which is the optimal approach. John John Rochford<http://profiles.umassmed.edu/profiles/display/132901> UMass Medical School/E.K. Shriver Center Director, INDEX Program Instructor, Family Medicine & Community Health www.DisabilityInfo.org Twitter: @ClearHelper<https://twitter.com/clearhelper> [Facebook Button]<http://www.facebook.com/pages/New-England-INDEXShriver-CenterUMass-Medical-School/227064920160>[Twitter Button]<https://twitter.com/NEINDEX> [WordPress Logo] <http://www.disabilityinfo.org/blog/> From: lisa.seeman [mailto:lisa.seeman@zoho.com] Sent: Tuesday, August 18, 2015 6:02 AM To: public-cognitive-a11y-tf <public-cognitive-a11y-tf@w3.org<mailto:public-cognitive-a11y-tf@w3.org>> Subject: technique to include security Hi I was thinking of the following technique as a way to include security and other considerations "Do not require cognitive abilities when it is avoidable" In security this may include: Requiring that the user has a good working memory or short term memory required to copy a code Requiring that the user can remember complex passwords Requiring that the user can remeber spelling of terms used in security questions such as how to spell a strange pets name Requiring that the user can remember visual patterns Having tokans, signing in via email account or face book, or biometrics are all alternatives to the above In voice systems this may include, * Requiring the user to understand categories, * Requiring the user to remember numbers * can all be used as a barrier to getting human help is is aviodable by having 0 as a reserved digit to access a human In the Web of things this may include: 1. remembering what symbols mean 2. remembering sequences to run certain tasks This is aviodable by having simple text with symbols and clear discovrability of how o complete each task and recovrability from errors All the best Lisa Seeman Athena ICT Accessibility Projects <http://accessibility.athena-ict.com> LinkedIn<http://il.linkedin.com/in/lisaseeman/>, Twitter<https://twitter.com/SeemanLisa>
Received on Tuesday, 18 August 2015 10:58:33 UTC