Web accessibility initiative standards, Computer Network Security

Assignment Help:

Australian government sites were mandated to conform to at least single 'A' level of the World Wide Web Consortium (W3C) Web Accessibility Initiative (WAI) standards, by the end of 2001, seen as best practice in Australia (Sampson-Wild and Burmeister, 2001). Yet the recent call for tenders to audit compliance of government sites, which closed 20th June this year (Innes, 2002), is likely to find very few government sites complying with these standards. The following case assumes your organisation was the successful tenderer ...

Your client is a local government agency. You have been asked to develop an accessibility assurance strategy as part of a preliminary contract. You are keen to pick up the contract to build whatever you convince the government to do about accessibility testing, so you are wondering what to recommend. You realise that the agency wants to be told that its materials are accessible, rather than the converse, so you are wondering how high to set the bar for accessibility. You know there are automatic checks available for all the 508 requirements. You could not afford to offer to do all the manual checks required by the WCAG and anyway, suspect the agency's materials would not look good if tested by WCAG.

Like the earlier case, this one has multiple facets with no easy resolution. Recent scandals in the US have involved large accounting firm practices where auditors also have consulting roles, creating a conflict of interest that has caused various now well-publicised problems. Such conflicts are not peculiar to accounting, as is seen in this case.

As mentioned above, one use of scenario design is to explore the domain knowledge of participants. Both cases above involve the government. This was a deliberate, because it raises questions about the applicability of legislation concerning accessibility. Also, in the 2nd
case, are legal implications which can either be teased out by a facilitator or left to arise naturally in discussion by participants querying 'WCAG' or '508'. Thus, there is the possibility to discuss the boundaries between legal and ethical considerations. More is made of this point below.

The technique began in a student context, but to be more suitable for professionals, it should be extended. IT work today brings together people from different disciplines. This is especially common in complex systems design, typical when building web sites. The multi-disciplinary requirements of professionals might better be met with some additional modifications.

Q Who is affected?

There are some situations in which, in addition to asking 'who' is affected, it may also be appropriate to ask how the 'environment' is affected. Further, this need not be limited to the 'environment' outdoors, but could also refer to workplace culture, the connectedness of a community, or other situational circumstances. As stated above, it is significant the government is mentioned as the use of government funding or publication by the government may change the potential liability of the developers and publishers.

Another environmental consideration in Case 1 involves small rural schools that cannot afford specialist teachers, given their small class sizes. In that case, other kinds of accessibility considerations come to the fore, especially in terms of telecommunications access. Low bandwidth might have implications in Case 1 on the type of multimedia design. For instance, high-quality images, ideal for high-speed transmission, might not be appropriate. If a rural student is also disabled, then that further complicates the issues. One frequently employed multimedia technique involves the use of 'chat' environments, yet rural students with disabilities would possibly be totally excluded from participation in such class activities.

Q What can be done about it? - What options are there?

This question could be extended to include the following three sub-questions:

I. What would be 'the right thing' to do?

II. Who/what suffers if you do not do the right thing?

III. What additional costs will be incurred if you do the right thing?


Related Discussions:- Web accessibility initiative standards

Public key infrastructure (pki)-cryptography, Public Key Infrastructure (PK...

Public Key Infrastructure (PKI) It is integrated system of software, encryption methodologies, protocols, legal agreements, and 3rd-party services enabling users to communicate

Network security attacks, (a) Show four Network Security attacks. How do th...

(a) Show four Network Security attacks. How do they compromise security? (b) In what ways do the following devices or services contribute to security: (i) Firewall (ii) In

Tcp- reliable transport service, TCP-RELIABLE TRANSPORT SERVICE INTRO...

TCP-RELIABLE TRANSPORT SERVICE INTRODUCTION:  TCP is the major transport protocol architecture in the TCP/IP suite. It uses unreliable datagram function offered by IP whe

Problem of spam mail, Topic -Spam is an ever-growing problem, with some net...

Topic -Spam is an ever-growing problem, with some network administrators reporting that 90% or moreof the email delivered to their mail servers is spam. Identify and briefly evalua

Ip datagram format, IP DATAGRAM SIZE:  Datagrams may have different si...

IP DATAGRAM SIZE:  Datagrams may have different sizes i.e. Header area is generally fixed (20 octets) but can have various options. Data area may contain between 1 octet and 6

What do you understand by demilitarized zone, Problem 1: What does the ...

Problem 1: What does the SNMP access policy show? SNMP community diagram SNMP access policy Problem 2: Does there exist any formal functional specificat

TCP/ ip, Q1 (15 marks, 5 marks each part): This question has three parts: ...

Q1 (15 marks, 5 marks each part): This question has three parts: In a short paragraph (200-300 words) explain the fundamentals of Packet Switching and how it works. In a short pa

Distinguish between a mobile agent state and code, Question: (a) Disti...

Question: (a) Distinguish between a mobile agent "state" and "code". (b) Differentiate between "weak" and "strong" mobility. (c) Mobile agent systems are known to have

Data compression and the transport services, Da t a compre s sion a...

Da t a compre s sion and the trans p ort s e rvices,   The main purpose of the transport layer is to provide services which are efficient, reliable and cost-effecti

Security goals, what is relation ship between computer security goals?

what is relation ship between computer security goals?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd