- From: EA Draffan <ead@ecs.soton.ac.uk>
- Date: Tue, 25 Aug 2015 12:05:52 +0000
- To: Michael Pluke <Mike.Pluke@castle-consult.com>, "lisa.seeman" <lisa.seeman@zoho.com>, public-cognitive-a11y-tf <public-cognitive-a11y-tf@w3.org>
- Message-ID: <7181A95B72F5B04C94BEF10CEC91E796175E344C@SRV00047.soton.ac.uk>
Really has a good ring about it! I agree with Mike and would just deal with the typo… "Minimize the cognitive skills required to use the content when there is a known alternative." 3) Requiring the user to decipher indistinct letters or numbers against a complex background as seen in CAPTCHAs relies on good visual perceptual skills, visual acuity as well as decoding skills. These abilities are often affected by cognitive impairments. Best wishes E.A. Mrs E.A. Draffan WAIS, ECS , University of Southampton Mobile +44 (0)7976 289103 http://access.ecs.soton.ac.uk<http://access.ecs.soton.ac.uk/> UK AAATE rep http://www.aaate.net/ http://www.emptech.info<http://www.emptech.info/> From: Michael Pluke [mailto:Mike.Pluke@castle-consult.com] Sent: 25 August 2015 12:01 To: lisa.seeman <lisa.seeman@zoho.com>; public-cognitive-a11y-tf <public-cognitive-a11y-tf@w3.org> Subject: RE: wording for a success criteria to include security concerns and voice systems and others. Hi I think that this is a very good attempt. I think a few good examples would help people understand that this rule is regularly broken in the field of security e.g. 1) Requiring the user to enter a password relies on the user’s long-term memory and recall. In conditions such as Alzheimer’s, long-term memory and recall abilities will decrease which will force the user to write down the password and hence compromise their security. 2) Requiring the user to enter, say, the 3rd, 5th and 8th characters of a password or special word relies on counting, string processing and recognition abilities that are often severely impacted in conditions such as dyslexia and dyscalculia. Best regards Mike From: lisa.seeman [mailto:lisa.seeman@zoho.com] Sent: 25 August 2015 11:33 To: public-cognitive-a11y-tf <public-cognitive-a11y-tf@w3.org<mailto:public-cognitive-a11y-tf@w3.org>> Subject: wording for a success criteria to include security concerns and voice systems and others. Hi Following the call last night Ayelet and myself came out with the following wording for a technique or success criteria to include security concerns and voice systems and others. "Minimize the cognitive skills required to use the content when there is a know alternative." We can follow it with text and examples about alternatives in each topic and a link to the relevant issue paper. The advantage in citing examples is that the technique will endure even as technology and specifics change All the best Lisa Seeman Athena ICT Accessibility Projects <http://accessibility.athena-ict.com> LinkedIn<http://il.linkedin.com/in/lisaseeman/>, Twitter<https://twitter.com/SeemanLisa>
Received on Tuesday, 25 August 2015 12:06:30 UTC