- From: Michael Pluke <Mike.Pluke@castle-consult.com>
- Date: Tue, 25 Aug 2015 11:00:43 +0000
- To: lisa.seeman <lisa.seeman@zoho.com>, public-cognitive-a11y-tf <public-cognitive-a11y-tf@w3.org>
- Message-ID: <A48C91EB13E45544B16FBC94C9298D8D1B8F43@S11MAILD013N2.sh11.lan>
Hi I think that this is a very good attempt. I think a few good examples would help people understand that this rule is regularly broken in the field of security e.g. 1) Requiring the user to enter a password relies on the user’s long-term memory and recall. In conditions such as Alzheimer’s, long-term memory and recall abilities will decrease which will force the user to write down the password and hence compromise their security. 2) Requiring the user to enter, say, the 3rd, 5th and 8th characters of a password or special word relies on counting, string processing and recognition abilities that are often severely impacted in conditions such as dyslexia and dyscalculia. Best regards Mike From: lisa.seeman [mailto:lisa.seeman@zoho.com] Sent: 25 August 2015 11:33 To: public-cognitive-a11y-tf <public-cognitive-a11y-tf@w3.org> Subject: wording for a success criteria to include security concerns and voice systems and others. Hi Following the call last night Ayelet and myself came out with the following wording for a technique or success criteria to include security concerns and voice systems and others. "Minimize the cognitive skills required to use the content when there is a know alternative." We can follow it with text and examples about alternatives in each topic and a link to the relevant issue paper. The advantage in citing examples is that the technique will endure even as technology and specifics change All the best Lisa Seeman Athena ICT Accessibility Projects <http://accessibility.athena-ict.com> LinkedIn<http://il.linkedin.com/in/lisaseeman/>, Twitter<https://twitter.com/SeemanLisa>
Received on Tuesday, 25 August 2015 11:01:18 UTC