Web accessibility initiative standards, Computer Network Security

Assignment Help:

Australian government sites were mandated to conform to at least single 'A' level of the World Wide Web Consortium (W3C) Web Accessibility Initiative (WAI) standards, by the end of 2001, seen as best practice in Australia (Sampson-Wild and Burmeister, 2001). Yet the recent call for tenders to audit compliance of government sites, which closed 20th June this year (Innes, 2002), is likely to find very few government sites complying with these standards. The following case assumes your organisation was the successful tenderer ...

Your client is a local government agency. You have been asked to develop an accessibility assurance strategy as part of a preliminary contract. You are keen to pick up the contract to build whatever you convince the government to do about accessibility testing, so you are wondering what to recommend. You realise that the agency wants to be told that its materials are accessible, rather than the converse, so you are wondering how high to set the bar for accessibility. You know there are automatic checks available for all the 508 requirements. You could not afford to offer to do all the manual checks required by the WCAG and anyway, suspect the agency's materials would not look good if tested by WCAG.

Like the earlier case, this one has multiple facets with no easy resolution. Recent scandals in the US have involved large accounting firm practices where auditors also have consulting roles, creating a conflict of interest that has caused various now well-publicised problems. Such conflicts are not peculiar to accounting, as is seen in this case.

As mentioned above, one use of scenario design is to explore the domain knowledge of participants. Both cases above involve the government. This was a deliberate, because it raises questions about the applicability of legislation concerning accessibility. Also, in the 2nd
case, are legal implications which can either be teased out by a facilitator or left to arise naturally in discussion by participants querying 'WCAG' or '508'. Thus, there is the possibility to discuss the boundaries between legal and ethical considerations. More is made of this point below.

The technique began in a student context, but to be more suitable for professionals, it should be extended. IT work today brings together people from different disciplines. This is especially common in complex systems design, typical when building web sites. The multi-disciplinary requirements of professionals might better be met with some additional modifications.

Q Who is affected?

There are some situations in which, in addition to asking 'who' is affected, it may also be appropriate to ask how the 'environment' is affected. Further, this need not be limited to the 'environment' outdoors, but could also refer to workplace culture, the connectedness of a community, or other situational circumstances. As stated above, it is significant the government is mentioned as the use of government funding or publication by the government may change the potential liability of the developers and publishers.

Another environmental consideration in Case 1 involves small rural schools that cannot afford specialist teachers, given their small class sizes. In that case, other kinds of accessibility considerations come to the fore, especially in terms of telecommunications access. Low bandwidth might have implications in Case 1 on the type of multimedia design. For instance, high-quality images, ideal for high-speed transmission, might not be appropriate. If a rural student is also disabled, then that further complicates the issues. One frequently employed multimedia technique involves the use of 'chat' environments, yet rural students with disabilities would possibly be totally excluded from participation in such class activities.

Q What can be done about it? - What options are there?

This question could be extended to include the following three sub-questions:

I. What would be 'the right thing' to do?

II. Who/what suffers if you do not do the right thing?

III. What additional costs will be incurred if you do the right thing?


Related Discussions:- Web accessibility initiative standards

Unguided media, Unguided Media This is the wireless media that transfe...

Unguided Media This is the wireless media that transfer electromagnetic waves without using a physical media. Waves are broadcast through the air. This is performing through r

Introduction to security and personnel, INTRODUCTION TO SECURITY AND PERSON...

INTRODUCTION TO SECURITY AND PERSONNEL When implementing information security, there are several human resource issues that should be addressed. They are •    Positioning and n

Cryptographic hash functions, (a) (i) Bob has public RSA key (n = 77, e...

(a) (i) Bob has public RSA key (n = 77, e = 7). Show that Bob's private key is (d = 43). (ii) Alice wants to send the message m = 13 to Bob. She encrypts the message usi

Need for security-information security, NEED FOR SECURITY Primary missio...

NEED FOR SECURITY Primary mission of information security to ensure that the systems and contents stay the same If no threats, could focus on improving the systems, resulting in

Different architectures for wireless networks, (a) What are the different a...

(a) What are the different architectures for wireless networks? (b) Explain how WEP authentication and encryption works, describe the vulnerability. (c) In what ways are secu

Difference between flow control and congestion control, (a) Describe briefl...

(a) Describe briefly the difference between flow control and congestion control in relation to a connection-oriented protocol such as TCP. (b)  What is the initial rate of data

ITC 571 Emerging Technologies and Innovation Assignment, Ask quProject brie...

Ask quProject brief template The project brief is a document upon which the full Project Proposal and Plan will be based. About me: Who are you? What do you do? What is your Exper

Access control matrix, You are provided with 3000 sample keystrokes for 5 u...

You are provided with 3000 sample keystrokes for 5 users mentioned above. You can find this data using the ‘Lab 2 User Data' link in the ‘Lab 2' folder on Blackboard. Please note t

CS, Discuss how developers should apply the following countermeasures to im...

Discuss how developers should apply the following countermeasures to improve the security of their code:

Differentiate between private key and public key encryption, Problem (...

Problem (a) Differentiate between private key and public key encryption. (b) What issue with private key encryption is resolved with public key encryption? (c) Describe

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd