Web accessibility initiative standards, Computer Network Security

Assignment Help:

Australian government sites were mandated to conform to at least single 'A' level of the World Wide Web Consortium (W3C) Web Accessibility Initiative (WAI) standards, by the end of 2001, seen as best practice in Australia (Sampson-Wild and Burmeister, 2001). Yet the recent call for tenders to audit compliance of government sites, which closed 20th June this year (Innes, 2002), is likely to find very few government sites complying with these standards. The following case assumes your organisation was the successful tenderer ...

Your client is a local government agency. You have been asked to develop an accessibility assurance strategy as part of a preliminary contract. You are keen to pick up the contract to build whatever you convince the government to do about accessibility testing, so you are wondering what to recommend. You realise that the agency wants to be told that its materials are accessible, rather than the converse, so you are wondering how high to set the bar for accessibility. You know there are automatic checks available for all the 508 requirements. You could not afford to offer to do all the manual checks required by the WCAG and anyway, suspect the agency's materials would not look good if tested by WCAG.

Like the earlier case, this one has multiple facets with no easy resolution. Recent scandals in the US have involved large accounting firm practices where auditors also have consulting roles, creating a conflict of interest that has caused various now well-publicised problems. Such conflicts are not peculiar to accounting, as is seen in this case.

As mentioned above, one use of scenario design is to explore the domain knowledge of participants. Both cases above involve the government. This was a deliberate, because it raises questions about the applicability of legislation concerning accessibility. Also, in the 2nd
case, are legal implications which can either be teased out by a facilitator or left to arise naturally in discussion by participants querying 'WCAG' or '508'. Thus, there is the possibility to discuss the boundaries between legal and ethical considerations. More is made of this point below.

The technique began in a student context, but to be more suitable for professionals, it should be extended. IT work today brings together people from different disciplines. This is especially common in complex systems design, typical when building web sites. The multi-disciplinary requirements of professionals might better be met with some additional modifications.

Q Who is affected?

There are some situations in which, in addition to asking 'who' is affected, it may also be appropriate to ask how the 'environment' is affected. Further, this need not be limited to the 'environment' outdoors, but could also refer to workplace culture, the connectedness of a community, or other situational circumstances. As stated above, it is significant the government is mentioned as the use of government funding or publication by the government may change the potential liability of the developers and publishers.

Another environmental consideration in Case 1 involves small rural schools that cannot afford specialist teachers, given their small class sizes. In that case, other kinds of accessibility considerations come to the fore, especially in terms of telecommunications access. Low bandwidth might have implications in Case 1 on the type of multimedia design. For instance, high-quality images, ideal for high-speed transmission, might not be appropriate. If a rural student is also disabled, then that further complicates the issues. One frequently employed multimedia technique involves the use of 'chat' environments, yet rural students with disabilities would possibly be totally excluded from participation in such class activities.

Q What can be done about it? - What options are there?

This question could be extended to include the following three sub-questions:

I. What would be 'the right thing' to do?

II. Who/what suffers if you do not do the right thing?

III. What additional costs will be incurred if you do the right thing?


Related Discussions:- Web accessibility initiative standards

Public key cryptography encryption, What do you understand by the term encr...

What do you understand by the term encryption? Also describe the public key cryptography Encryption: Encryption is a method of converting plain text into cipher text. Using thi

Bus topology, BUS TOPOLOGY In a bus topology all devices are attached ...

BUS TOPOLOGY In a bus topology all devices are attached to a single long cable and any device can send data to any other device. For this function, coordination is needed to d

The cost benefit analysis (cba) formula, The Cost Benefit Analysis (CBA) Fo...

The Cost Benefit Analysis (CBA) Formula CBA determines that whether the control alternative being evaluated is worth cost incurred to control vulnerability or not. CBA easily ca

Using Technology as Experience Framework, Write a two to three (2-3) page p...

Write a two to three (2-3) page paper in which you: Explain how the Web user interfaces help donors to make decisions. Relate the emotional thread demonstrated in the case study to

What is data spoliation, QUESTION (a) What do you meant by data spoli...

QUESTION (a) What do you meant by data spoliation? (b) Justify the following statement: "Disk imaging differs from creating a standard backup of disk." (c) Why do yo

Explain the encryption model or symmetric cipher model, With explain the en...

With explain the encryption model the help of diagram. Symmetric cipher model uses the secret-key or a single-key for encryption/decryption purposes. It employs a symmetric encr

Man-in-the-middle attacker, - Alice, Bob and Charlie have a secret key a=3,...

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order. - They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

Complexity of network systems, Computer networks is a complex subject due t...

Computer networks is a complex subject due to the given reasons: MANY DIFFERENT TECHNOLOGIES EXIST: The first reason for the complexity of networks is that there are s

Encryption key size-cryptography, Encryption Key Size When using ciphers...

Encryption Key Size When using ciphers, the size of crypto variable or key is quite important as the strength of many encryption applications and cryptosystems were measured by

Which authorization model could be ideal, Question: (a) Your office ad...

Question: (a) Your office administrator is being trained to take server backups. Which authorization model could be ideal for this situation: MAC, DAC or RBAC? Justify your a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd