SlideShare una empresa de Scribd logo
1 de 81
Cyberethics and Accessibility
Ian Pouncey

2012-03-02
✤   Introduction

✤   What are Cyberethics?

✤   Dilemmas

✤   Priorities

✤   Accessibility Cyberethics
Introduction
Introduction

 ✤   Who am I?
Introduction

 ✤   Who am I?

 ✤   Who are you?
Why are you interested in
accessibility?
Why are you interested in
accessibility?
 ✤   Enlightened self-interest
Why are you interested in
accessibility?
 ✤   Enlightened self-interest

 ✤   Professionalism
Why are you interested in
accessibility?
 ✤   Enlightened self-interest

 ✤   Professionalism

 ✤   Legal
Why are you interested in
accessibility?
 ✤   Enlightened self-interest

 ✤   Professionalism

 ✤   Legal

 ✤   Unique selling point
Why are you interested in
accessibility?
 ✤   Enlightened self-interest

 ✤   Professionalism

 ✤   Legal

 ✤   Unique selling point

 ✤   Technical challenge
Why are you interested in
accessibility?
 ✤   Enlightened self-interest

 ✤   Professionalism

 ✤   Legal

 ✤   Unique selling point

 ✤   Technical challenge

 ✤   Ethical thing to do
What are Cyberethics?

The study of ethics pertaining to computer networks:

  ✤   Acceptable behaviour for using the Internet

  ✤   Storage and display of personal data

  ✤   Ownership of digital data

  ✤   Access to adult content

  ✤   The right to access Internet content
Internet Engineering Task Force:
RFC 1087
Defines as unethical anything which:

  ✤   Seeks to gain unauthorised access to the resources of the Internet.

  ✤   Disrupts the intended use of the Internet.

  ✤   Wastes resources (people, capacity, computer) through such
      actions.

  ✤   Destroys the integrity of computer-based information, or

  ✤   Compromises the privacy of users
Ten Commandments of Computer
Ethics
 1. Thou shalt not use a computer to harm other people.

 2. Thou shalt not interfere with other people's computer work.

 3. Thou shalt not snoop around in other people's computer files.

 4. Thou shalt not use a computer to steal.

 5. Thou shalt not use a computer to bear false witness.
Ten Commandments of Computer
Ethics
 6. Thou shalt not copy or use proprietary software for which you
    have not paid.

 7. Thou shalt not use other people's computer resources without
    authorisation or proper compensation.

 8. Thou shalt not appropriate other people's intellectual output.

 9. Thou shalt think about the social consequences of the program you
    are writing or the system you are designing.

 10.Thou shalt always use a computer in ways that ensure
   consideration and respect for your fellow humans
The Code of Fair Information
Practices
 1. There must be no personal data record-keeping systems whose
    very existence is secret.

 2. There must be a way for a person to find out what information
    about the person is in a record and how it is used.

 3. There must be a way for a person to prevent information about the
    person that was obtained for one purpose from being used or made
    available for other purposes without the person's consent.
The Code of Fair Information
Practices
 4. There must be a way for a person to correct or amend a record of
    identifiable information about the person.

 5. Any organisation creating, maintaining, using, or disseminating
    records of identifiable personal data must assure the reliability of
    the data for their intended use and must take precautions to
    prevent misuses of the data.
What about accessibility?
The Universal Declaration of
Human Rights
Article 27

   Everyone has the right freely to participate in the cultural life of the
   community, to enjoy the arts and to share in scientific advancement
   and its benefits.
UN Convention on the Rights of
Persons with Disabilities
Article 9 - Accessibility

   To promote access for persons with disabilities to new information
   and communications technologies and systems, including the
   Internet;
Starting points for a definition of
Cyberethical Accessibility
Starting points for a definition of
Cyberethical Accessibility
 ✤   The power of the Web is in its universality. Access by everyone
     regardless of disability is an essential aspect.
Starting points for a definition of
Cyberethical Accessibility
 ✤   The power of the Web is in its universality. Access by everyone
     regardless of disability is an essential aspect.

 ✤   Web pages are designed for people.
Starting points for a definition of
Cyberethical Accessibility
 ✤   The power of the Web is in its universality. Access by everyone
     regardless of disability is an essential aspect.

 ✤   Web pages are designed for people.

 ✤   Whatever the device you use for getting your information out, it
     should be the same information.
Dilemmas
The trolley problem
The trolley problem

 ✤   The driver dilemma
The trolley problem

 ✤   The driver dilemma

 ✤   The heavy weight
The trolley problem

 ✤   The driver dilemma

 ✤   The heavy weight

 ✤   The fat man
The trolley problem

 ✤   The driver dilemma

 ✤   The heavy weight

 ✤   The fat man

 ✤   The villainous fat man
Graded Absolutism
Priorities
How to build a webpage
How to build a webpage

 ✤   Content and markup
How to build a webpage

 ✤   Content and markup

     ✤   Including alternative and link text
How to build a webpage

 ✤   Content and markup

     ✤   Including alternative and link text

 ✤   Images based on alternative / link text
How to build a webpage

 ✤   Content and markup

     ✤   Including alternative and link text

 ✤   Images based on alternative / link text

 ✤   CSS
How to build a webpage

 ✤   Content and markup

     ✤   Including alternative and link text

 ✤   Images based on alternative / link text

 ✤   CSS

 ✤   JavaScript
How to build a webpage

 ✤   Content and markup

     ✤   Including alternative and link text

 ✤   Images based on alternative / link text

 ✤   CSS

 ✤   JavaScript

     ✤   Usability enhancements
How to build a webpage

 ✤   Content and markup

     ✤   Including alternative and link text

 ✤   Images based on alternative / link text

 ✤   CSS

 ✤   JavaScript

     ✤   Usability enhancements

     ✤   Always consider focus, make Virtual Buffer refreshes
How to build a webpage (part 2)
How to build a webpage (part 2)

 ✤   WAI-ARIA
How to build a webpage (part 2)

 ✤   WAI-ARIA

     ✤   Usability enhancements
How to build a webpage (part 2)

 ✤   WAI-ARIA

     ✤   Usability enhancements

     ✤   Be careful - WAI-ARIA may be hazardous to your usability
How to build a webpage (part 2)

 ✤   WAI-ARIA

     ✤   Usability enhancements

     ✤   Be careful - WAI-ARIA may be hazardous to your usability

 ✤   Assistive technology specific fixes
Considerations
Considerations

 ✤   Does it prevent user customisation?
Considerations

 ✤   Does it prevent user customisation?

 ✤   When there are conflicts, does it minimise the problems for the
     conflicted option?
Considerations

 ✤   Does it prevent user customisation?

 ✤   When there are conflicts, does it minimise the problems for the
     conflicted option?

 ✤   Assistive technology bugs
<header>?
<header>?

 ✤   Jaws 10 and 11 in conjunction with Firefox 3.6 ignored <header>
     content
<header>?

 ✤   Jaws 10 and 11 in conjunction with Firefox 3.6 ignored <header>
     content

 ✤   Header Elements Removed (September 8, 2010)
<header>?

 ✤   Jaws 10 and 11 in conjunction with Firefox 3.6 ignored <header>
     content

 ✤   Header Elements Removed (September 8, 2010)

 ✤   Header is Back! (October 13, 2010)
WAI-ARIA interactions
“I believe this proposal is
unethical and that we should not
           pursue it.”
“Accessibility is actually more
  important than Security”
Perfect accessibility (#PerfectA11y)
Perfect accessibility (#PerfectA11y)

 ✤   Usability
Perfect accessibility (#PerfectA11y)

 ✤   Usability

     ✤   Choice
Perfect accessibility (#PerfectA11y)

 ✤   Usability

     ✤   Choice

         ✤   Complexity
Perfect accessibility (#PerfectA11y)

 ✤   Usability

     ✤   Choice

         ✤   Complexity

 ✤   Definition of perfect
Perfect accessibility (#PerfectA11y)

 ✤   Usability

     ✤   Choice

         ✤   Complexity

 ✤   Definition of perfect

 ✤   Accessibility as a feature
Perfect accessibility (#PerfectA11y)

 ✤   Usability

     ✤   Choice

         ✤   Complexity

 ✤   Definition of perfect

 ✤   Accessibility as a feature

 ✤   Non-commercial content
Is it ever right to exclude access?
Is it ever right to exclude access?

 ✤   Gambling

 ✤   Alcohol

 ✤   Pornography

 ✤   Extreme political / religious beliefs
To the individual that is excluded
 it is of little comfort that efforts
have been made to include others
Accessibility Cyberethics
Accessibility Cyberethics

We must:
Accessibility Cyberethics

We must:

  ✤   Aim to provide an equivalent experience to all users
Accessibility Cyberethics

We must:

  ✤   Aim to provide an equivalent experience to all users

  ✤   Maximise support for the majority
Accessibility Cyberethics

We must:

  ✤   Aim to provide an equivalent experience to all users

  ✤   Maximise support for the majority

  ✤   Minimise friction for the minority
Accessibility Cyberethics

We must:

  ✤   Aim to provide an equivalent experience to all users

  ✤   Maximise support for the majority

  ✤   Minimise friction for the minority

  ✤   Build tools that are both accessible and produce accessible output
Accessibility Cyberethics

We must:

  ✤   Aim to provide an equivalent experience to all users

  ✤   Maximise support for the majority

  ✤   Minimise friction for the minority

  ✤   Build tools that are both accessible and produce accessible output

  ✤   Evangelise accessibility
Accessibility Cyberethics
Accessibility Cyberethics

We must not:
Accessibility Cyberethics

We must not:

  ✤   Regress accessibility between versions
Accessibility Cyberethics

We must not:

  ✤   Regress accessibility between versions

  ✤   See accessibility as a competitive advantage
Accessibility Cyberethics

We must not:

  ✤   Regress accessibility between versions

  ✤   See accessibility as a competitive advantage

  ✤   Give up the good fight!
Always strive to do the best you
 can with the knowledge and
   resources that you have
Thank you




http://ianpouncey.com

@IanPouncey

Más contenido relacionado

Similar a Cyberethics and accessibility

Hackability: Free/Open Source Assistive Tech
Hackability: Free/Open Source Assistive TechHackability: Free/Open Source Assistive Tech
Hackability: Free/Open Source Assistive TechLiz Henry
 
Web Accessibility presentation for Big Sky DevCon
Web Accessibility presentation for Big Sky DevConWeb Accessibility presentation for Big Sky DevCon
Web Accessibility presentation for Big Sky DevConDan Bowling
 
Designing the mobile experience
Designing the mobile experienceDesigning the mobile experience
Designing the mobile experienceJoseph Dickerson
 
Approach coding for accessibility
Approach coding for accessibilityApproach coding for accessibility
Approach coding for accessibilityNitin Suri
 
Ensuring accessibility by Kenny Gilles
Ensuring accessibility by Kenny GillesEnsuring accessibility by Kenny Gilles
Ensuring accessibility by Kenny GillesQA or the Highway
 
Digital accessibility intro-a11ycle_2020-01-15
Digital accessibility intro-a11ycle_2020-01-15Digital accessibility intro-a11ycle_2020-01-15
Digital accessibility intro-a11ycle_2020-01-15Joshua Randall
 
World Tourism Day 'Tourism for All - Promoting Universal Accessibility'
World Tourism Day 'Tourism for All - Promoting Universal Accessibility'World Tourism Day 'Tourism for All - Promoting Universal Accessibility'
World Tourism Day 'Tourism for All - Promoting Universal Accessibility'Despina Karatzias
 
Don't Panic! How to perform an accessibility evaluation with limited resources
Don't Panic! How to perform an accessibility evaluation with limited resourcesDon't Panic! How to perform an accessibility evaluation with limited resources
Don't Panic! How to perform an accessibility evaluation with limited resourcesMichael Ryan
 
Why Accessibility is More Than Just a Lighthouse Metric | SEONerdSwitzerland ...
Why Accessibility is More Than Just a Lighthouse Metric | SEONerdSwitzerland ...Why Accessibility is More Than Just a Lighthouse Metric | SEONerdSwitzerland ...
Why Accessibility is More Than Just a Lighthouse Metric | SEONerdSwitzerland ...Ruth Everett
 
Web accessibility 101: The why, who, what, and how of "a11y"
Web accessibility 101: The why, who, what, and how of "a11y"Web accessibility 101: The why, who, what, and how of "a11y"
Web accessibility 101: The why, who, what, and how of "a11y"ecentricarts
 
Website Accessibility
Website AccessibilityWebsite Accessibility
Website AccessibilityNishan Bose
 
The Latest in Association Technology
The Latest in Association TechnologyThe Latest in Association Technology
The Latest in Association TechnologyDistilled Logic
 
Usability ≠ Accessibility. An intro to web accessibility for agencies.
Usability ≠ Accessibility. An intro to web accessibility for agencies.Usability ≠ Accessibility. An intro to web accessibility for agencies.
Usability ≠ Accessibility. An intro to web accessibility for agencies.Kate Horowitz
 
Cyber Threats and Data Privacy in a Digital World
Cyber Threats and Data Privacy in a Digital WorldCyber Threats and Data Privacy in a Digital World
Cyber Threats and Data Privacy in a Digital Worldqubanewmedia
 
Designing, Developing & Testing for Accessibility
Designing, Developing & Testing for AccessibilityDesigning, Developing & Testing for Accessibility
Designing, Developing & Testing for AccessibilityEric Malcolm
 
The Soul in The Machine - Developing for Humans (FrankenJS edition)
The Soul in The Machine - Developing for Humans (FrankenJS edition)The Soul in The Machine - Developing for Humans (FrankenJS edition)
The Soul in The Machine - Developing for Humans (FrankenJS edition)Christian Heilmann
 
How to Make Learning Accessible and Inclusive
How to Make Learning Accessible and InclusiveHow to Make Learning Accessible and Inclusive
How to Make Learning Accessible and InclusiveLambda Solutions
 
Erase and Rewind - Open Web Camp 2015
Erase and Rewind - Open Web Camp 2015Erase and Rewind - Open Web Camp 2015
Erase and Rewind - Open Web Camp 2015Christian Heilmann
 
A Web for Everyone
A Web for EveryoneA Web for Everyone
A Web for Everyonejameswillweb
 

Similar a Cyberethics and accessibility (20)

Hackability: Free/Open Source Assistive Tech
Hackability: Free/Open Source Assistive TechHackability: Free/Open Source Assistive Tech
Hackability: Free/Open Source Assistive Tech
 
Web Accessibility presentation for Big Sky DevCon
Web Accessibility presentation for Big Sky DevConWeb Accessibility presentation for Big Sky DevCon
Web Accessibility presentation for Big Sky DevCon
 
Designing the mobile experience
Designing the mobile experienceDesigning the mobile experience
Designing the mobile experience
 
Approach coding for accessibility
Approach coding for accessibilityApproach coding for accessibility
Approach coding for accessibility
 
Ensuring accessibility by Kenny Gilles
Ensuring accessibility by Kenny GillesEnsuring accessibility by Kenny Gilles
Ensuring accessibility by Kenny Gilles
 
Digital accessibility intro-a11ycle_2020-01-15
Digital accessibility intro-a11ycle_2020-01-15Digital accessibility intro-a11ycle_2020-01-15
Digital accessibility intro-a11ycle_2020-01-15
 
World Tourism Day 'Tourism for All - Promoting Universal Accessibility'
World Tourism Day 'Tourism for All - Promoting Universal Accessibility'World Tourism Day 'Tourism for All - Promoting Universal Accessibility'
World Tourism Day 'Tourism for All - Promoting Universal Accessibility'
 
Don't Panic! How to perform an accessibility evaluation with limited resources
Don't Panic! How to perform an accessibility evaluation with limited resourcesDon't Panic! How to perform an accessibility evaluation with limited resources
Don't Panic! How to perform an accessibility evaluation with limited resources
 
Why Accessibility is More Than Just a Lighthouse Metric | SEONerdSwitzerland ...
Why Accessibility is More Than Just a Lighthouse Metric | SEONerdSwitzerland ...Why Accessibility is More Than Just a Lighthouse Metric | SEONerdSwitzerland ...
Why Accessibility is More Than Just a Lighthouse Metric | SEONerdSwitzerland ...
 
Web accessibility 101: The why, who, what, and how of "a11y"
Web accessibility 101: The why, who, what, and how of "a11y"Web accessibility 101: The why, who, what, and how of "a11y"
Web accessibility 101: The why, who, what, and how of "a11y"
 
Website Accessibility
Website AccessibilityWebsite Accessibility
Website Accessibility
 
The Latest in Association Technology
The Latest in Association TechnologyThe Latest in Association Technology
The Latest in Association Technology
 
Usability ≠ Accessibility. An intro to web accessibility for agencies.
Usability ≠ Accessibility. An intro to web accessibility for agencies.Usability ≠ Accessibility. An intro to web accessibility for agencies.
Usability ≠ Accessibility. An intro to web accessibility for agencies.
 
Cyber Threats and Data Privacy in a Digital World
Cyber Threats and Data Privacy in a Digital WorldCyber Threats and Data Privacy in a Digital World
Cyber Threats and Data Privacy in a Digital World
 
Designing, Developing & Testing for Accessibility
Designing, Developing & Testing for AccessibilityDesigning, Developing & Testing for Accessibility
Designing, Developing & Testing for Accessibility
 
The Soul in The Machine - Developing for Humans (FrankenJS edition)
The Soul in The Machine - Developing for Humans (FrankenJS edition)The Soul in The Machine - Developing for Humans (FrankenJS edition)
The Soul in The Machine - Developing for Humans (FrankenJS edition)
 
How to Make Learning Accessible and Inclusive
How to Make Learning Accessible and InclusiveHow to Make Learning Accessible and Inclusive
How to Make Learning Accessible and Inclusive
 
Midcamp2016
Midcamp2016Midcamp2016
Midcamp2016
 
Erase and Rewind - Open Web Camp 2015
Erase and Rewind - Open Web Camp 2015Erase and Rewind - Open Web Camp 2015
Erase and Rewind - Open Web Camp 2015
 
A Web for Everyone
A Web for EveryoneA Web for Everyone
A Web for Everyone
 

Más de Ian Pouncey

How to make an inaccessible website - CSS Minsk JS
How to make an inaccessible website - CSS Minsk JSHow to make an inaccessible website - CSS Minsk JS
How to make an inaccessible website - CSS Minsk JSIan Pouncey
 
Accessible user experiences in four minutes, thirty three seconds
Accessible user experiences in four minutes, thirty three secondsAccessible user experiences in four minutes, thirty three seconds
Accessible user experiences in four minutes, thirty three secondsIan Pouncey
 
Accessible Code for Web Designers - CSUN 2017
Accessible Code for Web Designers - CSUN 2017Accessible Code for Web Designers - CSUN 2017
Accessible Code for Web Designers - CSUN 2017Ian Pouncey
 
Accessible UX&D – Minimal Viable Design
Accessible UX&D – Minimal Viable DesignAccessible UX&D – Minimal Viable Design
Accessible UX&D – Minimal Viable DesignIan Pouncey
 
Accessibility at the BBC
Accessibility at the BBCAccessibility at the BBC
Accessibility at the BBCIan Pouncey
 
Practical accessibility
Practical accessibilityPractical accessibility
Practical accessibilityIan Pouncey
 
Standards-next: Content and Cognition
Standards-next: Content and CognitionStandards-next: Content and Cognition
Standards-next: Content and CognitionIan Pouncey
 

Más de Ian Pouncey (7)

How to make an inaccessible website - CSS Minsk JS
How to make an inaccessible website - CSS Minsk JSHow to make an inaccessible website - CSS Minsk JS
How to make an inaccessible website - CSS Minsk JS
 
Accessible user experiences in four minutes, thirty three seconds
Accessible user experiences in four minutes, thirty three secondsAccessible user experiences in four minutes, thirty three seconds
Accessible user experiences in four minutes, thirty three seconds
 
Accessible Code for Web Designers - CSUN 2017
Accessible Code for Web Designers - CSUN 2017Accessible Code for Web Designers - CSUN 2017
Accessible Code for Web Designers - CSUN 2017
 
Accessible UX&D – Minimal Viable Design
Accessible UX&D – Minimal Viable DesignAccessible UX&D – Minimal Viable Design
Accessible UX&D – Minimal Viable Design
 
Accessibility at the BBC
Accessibility at the BBCAccessibility at the BBC
Accessibility at the BBC
 
Practical accessibility
Practical accessibilityPractical accessibility
Practical accessibility
 
Standards-next: Content and Cognition
Standards-next: Content and CognitionStandards-next: Content and Cognition
Standards-next: Content and Cognition
 

Último

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Cyberethics and accessibility

  • 2. Introduction ✤ What are Cyberethics? ✤ Dilemmas ✤ Priorities ✤ Accessibility Cyberethics
  • 4. Introduction ✤ Who am I?
  • 5. Introduction ✤ Who am I? ✤ Who are you?
  • 6. Why are you interested in accessibility?
  • 7. Why are you interested in accessibility? ✤ Enlightened self-interest
  • 8. Why are you interested in accessibility? ✤ Enlightened self-interest ✤ Professionalism
  • 9. Why are you interested in accessibility? ✤ Enlightened self-interest ✤ Professionalism ✤ Legal
  • 10. Why are you interested in accessibility? ✤ Enlightened self-interest ✤ Professionalism ✤ Legal ✤ Unique selling point
  • 11. Why are you interested in accessibility? ✤ Enlightened self-interest ✤ Professionalism ✤ Legal ✤ Unique selling point ✤ Technical challenge
  • 12. Why are you interested in accessibility? ✤ Enlightened self-interest ✤ Professionalism ✤ Legal ✤ Unique selling point ✤ Technical challenge ✤ Ethical thing to do
  • 13. What are Cyberethics? The study of ethics pertaining to computer networks: ✤ Acceptable behaviour for using the Internet ✤ Storage and display of personal data ✤ Ownership of digital data ✤ Access to adult content ✤ The right to access Internet content
  • 14. Internet Engineering Task Force: RFC 1087 Defines as unethical anything which: ✤ Seeks to gain unauthorised access to the resources of the Internet. ✤ Disrupts the intended use of the Internet. ✤ Wastes resources (people, capacity, computer) through such actions. ✤ Destroys the integrity of computer-based information, or ✤ Compromises the privacy of users
  • 15. Ten Commandments of Computer Ethics 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness.
  • 16. Ten Commandments of Computer Ethics 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorisation or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10.Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans
  • 17. The Code of Fair Information Practices 1. There must be no personal data record-keeping systems whose very existence is secret. 2. There must be a way for a person to find out what information about the person is in a record and how it is used. 3. There must be a way for a person to prevent information about the person that was obtained for one purpose from being used or made available for other purposes without the person's consent.
  • 18. The Code of Fair Information Practices 4. There must be a way for a person to correct or amend a record of identifiable information about the person. 5. Any organisation creating, maintaining, using, or disseminating records of identifiable personal data must assure the reliability of the data for their intended use and must take precautions to prevent misuses of the data.
  • 20. The Universal Declaration of Human Rights Article 27 Everyone has the right freely to participate in the cultural life of the community, to enjoy the arts and to share in scientific advancement and its benefits.
  • 21. UN Convention on the Rights of Persons with Disabilities Article 9 - Accessibility To promote access for persons with disabilities to new information and communications technologies and systems, including the Internet;
  • 22. Starting points for a definition of Cyberethical Accessibility
  • 23. Starting points for a definition of Cyberethical Accessibility ✤ The power of the Web is in its universality. Access by everyone regardless of disability is an essential aspect.
  • 24. Starting points for a definition of Cyberethical Accessibility ✤ The power of the Web is in its universality. Access by everyone regardless of disability is an essential aspect. ✤ Web pages are designed for people.
  • 25. Starting points for a definition of Cyberethical Accessibility ✤ The power of the Web is in its universality. Access by everyone regardless of disability is an essential aspect. ✤ Web pages are designed for people. ✤ Whatever the device you use for getting your information out, it should be the same information.
  • 28. The trolley problem ✤ The driver dilemma
  • 29. The trolley problem ✤ The driver dilemma ✤ The heavy weight
  • 30. The trolley problem ✤ The driver dilemma ✤ The heavy weight ✤ The fat man
  • 31. The trolley problem ✤ The driver dilemma ✤ The heavy weight ✤ The fat man ✤ The villainous fat man
  • 34. How to build a webpage
  • 35. How to build a webpage ✤ Content and markup
  • 36. How to build a webpage ✤ Content and markup ✤ Including alternative and link text
  • 37. How to build a webpage ✤ Content and markup ✤ Including alternative and link text ✤ Images based on alternative / link text
  • 38. How to build a webpage ✤ Content and markup ✤ Including alternative and link text ✤ Images based on alternative / link text ✤ CSS
  • 39. How to build a webpage ✤ Content and markup ✤ Including alternative and link text ✤ Images based on alternative / link text ✤ CSS ✤ JavaScript
  • 40. How to build a webpage ✤ Content and markup ✤ Including alternative and link text ✤ Images based on alternative / link text ✤ CSS ✤ JavaScript ✤ Usability enhancements
  • 41. How to build a webpage ✤ Content and markup ✤ Including alternative and link text ✤ Images based on alternative / link text ✤ CSS ✤ JavaScript ✤ Usability enhancements ✤ Always consider focus, make Virtual Buffer refreshes
  • 42. How to build a webpage (part 2)
  • 43. How to build a webpage (part 2) ✤ WAI-ARIA
  • 44. How to build a webpage (part 2) ✤ WAI-ARIA ✤ Usability enhancements
  • 45. How to build a webpage (part 2) ✤ WAI-ARIA ✤ Usability enhancements ✤ Be careful - WAI-ARIA may be hazardous to your usability
  • 46. How to build a webpage (part 2) ✤ WAI-ARIA ✤ Usability enhancements ✤ Be careful - WAI-ARIA may be hazardous to your usability ✤ Assistive technology specific fixes
  • 48. Considerations ✤ Does it prevent user customisation?
  • 49. Considerations ✤ Does it prevent user customisation? ✤ When there are conflicts, does it minimise the problems for the conflicted option?
  • 50. Considerations ✤ Does it prevent user customisation? ✤ When there are conflicts, does it minimise the problems for the conflicted option? ✤ Assistive technology bugs
  • 52. <header>? ✤ Jaws 10 and 11 in conjunction with Firefox 3.6 ignored <header> content
  • 53. <header>? ✤ Jaws 10 and 11 in conjunction with Firefox 3.6 ignored <header> content ✤ Header Elements Removed (September 8, 2010)
  • 54. <header>? ✤ Jaws 10 and 11 in conjunction with Firefox 3.6 ignored <header> content ✤ Header Elements Removed (September 8, 2010) ✤ Header is Back! (October 13, 2010)
  • 56. “I believe this proposal is unethical and that we should not pursue it.”
  • 57. “Accessibility is actually more important than Security”
  • 60. Perfect accessibility (#PerfectA11y) ✤ Usability ✤ Choice
  • 61. Perfect accessibility (#PerfectA11y) ✤ Usability ✤ Choice ✤ Complexity
  • 62. Perfect accessibility (#PerfectA11y) ✤ Usability ✤ Choice ✤ Complexity ✤ Definition of perfect
  • 63. Perfect accessibility (#PerfectA11y) ✤ Usability ✤ Choice ✤ Complexity ✤ Definition of perfect ✤ Accessibility as a feature
  • 64. Perfect accessibility (#PerfectA11y) ✤ Usability ✤ Choice ✤ Complexity ✤ Definition of perfect ✤ Accessibility as a feature ✤ Non-commercial content
  • 65. Is it ever right to exclude access?
  • 66. Is it ever right to exclude access? ✤ Gambling ✤ Alcohol ✤ Pornography ✤ Extreme political / religious beliefs
  • 67. To the individual that is excluded it is of little comfort that efforts have been made to include others
  • 70. Accessibility Cyberethics We must: ✤ Aim to provide an equivalent experience to all users
  • 71. Accessibility Cyberethics We must: ✤ Aim to provide an equivalent experience to all users ✤ Maximise support for the majority
  • 72. Accessibility Cyberethics We must: ✤ Aim to provide an equivalent experience to all users ✤ Maximise support for the majority ✤ Minimise friction for the minority
  • 73. Accessibility Cyberethics We must: ✤ Aim to provide an equivalent experience to all users ✤ Maximise support for the majority ✤ Minimise friction for the minority ✤ Build tools that are both accessible and produce accessible output
  • 74. Accessibility Cyberethics We must: ✤ Aim to provide an equivalent experience to all users ✤ Maximise support for the majority ✤ Minimise friction for the minority ✤ Build tools that are both accessible and produce accessible output ✤ Evangelise accessibility
  • 77. Accessibility Cyberethics We must not: ✤ Regress accessibility between versions
  • 78. Accessibility Cyberethics We must not: ✤ Regress accessibility between versions ✤ See accessibility as a competitive advantage
  • 79. Accessibility Cyberethics We must not: ✤ Regress accessibility between versions ✤ See accessibility as a competitive advantage ✤ Give up the good fight!
  • 80. Always strive to do the best you can with the knowledge and resources that you have

Notas del editor

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. http://tools.ietf.org/html/rfc1087\n
  13. http://www.computerethicsinstitute.org/images/TheTenCommandmentsOfComputerEthics.pdf\n
  14. http://www.computerethicsinstitute.org/images/TheTenCommandmentsOfComputerEthics.pdf\n
  15. http://epic.org/privacy/consumer/code_fair_info.html\n
  16. http://epic.org/privacy/consumer/code_fair_info.html\n
  17. \n
  18. http://www.un.org/en/documents/udhr/index.shtml\n
  19. http://www.un.org/disabilities/default.asp?navid=14&amp;amp;pid=150\n
  20. Tim Berners-Lee (used without permission)\n
  21. Tim Berners-Lee (used without permission)\n
  22. Tim Berners-Lee (used without permission)\n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n
  35. \n
  36. \n
  37. \n
  38. \n
  39. \n
  40. \n
  41. \n
  42. \n
  43. \n
  44. http://www.terrillthompson.com/tests/html5-header.html\nhttp://www.accessibleculture.org/articles/2010/09/header-elements-removed/\nhttp://www.accessibleculture.org/articles/2010/10/header-is-back/\n
  45. http://www.terrillthompson.com/tests/html5-header.html\nhttp://www.accessibleculture.org/articles/2010/09/header-elements-removed/\nhttp://www.accessibleculture.org/articles/2010/10/header-is-back/\n
  46. http://www.terrillthompson.com/tests/html5-header.html\nhttp://www.accessibleculture.org/articles/2010/09/header-elements-removed/\nhttp://www.accessibleculture.org/articles/2010/10/header-is-back/\n
  47. \n
  48. http://lists.w3.org/Archives/Public/public-html/2012Feb/0274.html\n
  49. https://plus.google.com/112678702228711889851/posts/eVeouesvaVX\n
  50. \n
  51. \n
  52. \n
  53. \n
  54. \n
  55. \n
  56. \n
  57. \n
  58. \n
  59. \n
  60. \n
  61. \n
  62. \n
  63. \n
  64. \n
  65. \n
  66. \n
  67. \n
  68. \n
  69. \n