W3C home > Mailing lists > Public > public-cognitive-a11y-tf@w3.org > August 2015

RE: technique to include security

From: Rochford, John <john.rochford@umassmed.edu>
Date: Tue, 18 Aug 2015 10:58:03 +0000
To: "lisa.seeman" <lisa.seeman@zoho.com>, public-cognitive-a11y-tf <public-cognitive-a11y-tf@w3.org>
Message-ID: <55BD19D83AA2BE499FBE026983AB2B58394A107F@ummscsmbx07.ad.umassmed.edu>
Hi Lisa,

My second impression about this approach is that it could be combined with recommendations for what developers *should* do.

Example:
“Minimize the user’s memory load by making objects, actions, and options visible. The user should not have to remember information from one part of the dialogue to another. Instructions for use of the system should be visible or easily retrievable whenever appropriate.”

Reference: Neilson 10 Principles at http://www.expressiveproductdesign.com/nielsens-10-usability-heuristics-user-interface-design/ , provided by Steve Lee to our list serve on 8/14.

John

John Rochford<http://profiles.umassmed.edu/profiles/display/132901>
UMass Medical School/E.K. Shriver Center
Director, INDEX Program
Instructor, Family Medicine & Community Health
www.DisabilityInfo.org
Twitter: @ClearHelper<https://twitter.com/clearhelper>
[Facebook Button]<http://www.facebook.com/pages/New-England-INDEXShriver-CenterUMass-Medical-School/227064920160>[Twitter Button]<https://twitter.com/NEINDEX> [WordPress Logo] <http://www.disabilityinfo.org/blog/>

From: Rochford, John
Sent: Tuesday, August 18, 2015 6:48 AM
To: 'lisa.seeman' <lisa.seeman@zoho.com>; public-cognitive-a11y-tf <public-cognitive-a11y-tf@w3.org>
Subject: RE: technique to include security

Hi Lisa,

My first impression about this approach is that it does not provide developers any recommendations about what they *should* do, which is the optimal approach.

John

John Rochford<http://profiles.umassmed.edu/profiles/display/132901>
UMass Medical School/E.K. Shriver Center
Director, INDEX Program
Instructor, Family Medicine & Community Health
www.DisabilityInfo.org
Twitter: @ClearHelper<https://twitter.com/clearhelper>
[Facebook Button]<http://www.facebook.com/pages/New-England-INDEXShriver-CenterUMass-Medical-School/227064920160>[Twitter Button]<https://twitter.com/NEINDEX> [WordPress Logo] <http://www.disabilityinfo.org/blog/>


From: lisa.seeman [mailto:lisa.seeman@zoho.com]
Sent: Tuesday, August 18, 2015 6:02 AM
To: public-cognitive-a11y-tf <public-cognitive-a11y-tf@w3.org<mailto:public-cognitive-a11y-tf@w3.org>>
Subject: technique to include security

Hi
I was thinking of the following technique as a way to include security and other considerations



"Do not require cognitive abilities when it is  avoidable"


In security this may include:
Requiring that the user has a good working memory or short term memory required to copy a code
Requiring that the user can remember complex passwords
Requiring that the user can remeber spelling of terms used in security questions such as how to spell a strange pets name
Requiring that the user can remember visual patterns

Having tokans, signing in via email account or face book, or biometrics are all alternatives to the above


In voice  systems this may include,

  *   Requiring the user to understand categories,
  *   Requiring the user to remember numbers
  *   can all be used as a barrier to getting human help
is is aviodable by having 0 as a reserved digit to access a human

In the Web of things this may include:

  1.  remembering what symbols mean
  2.  remembering sequences to run certain tasks
This is aviodable by having simple text with symbols and
clear discovrability of how o complete each task
and recovrability from errors



All the best

Lisa Seeman

Athena ICT Accessibility Projects <http://accessibility.athena-ict.com>
LinkedIn<http://il.linkedin.com/in/lisaseeman/>, Twitter<https://twitter.com/SeemanLisa>
Received on Tuesday, 18 August 2015 10:58:33 UTC

This archive was generated by hypermail 2.4.0 : Friday, 17 January 2020 19:13:28 UTC