SlideShare uma empresa Scribd logo
1 de 81
Cyberethics and Accessibility
Ian Pouncey

2012-03-02
✤   Introduction

✤   What are Cyberethics?

✤   Dilemmas

✤   Priorities

✤   Accessibility Cyberethics
Introduction
Introduction

 ✤   Who am I?
Introduction

 ✤   Who am I?

 ✤   Who are you?
Why are you interested in
accessibility?
Why are you interested in
accessibility?
 ✤   Enlightened self-interest
Why are you interested in
accessibility?
 ✤   Enlightened self-interest

 ✤   Professionalism
Why are you interested in
accessibility?
 ✤   Enlightened self-interest

 ✤   Professionalism

 ✤   Legal
Why are you interested in
accessibility?
 ✤   Enlightened self-interest

 ✤   Professionalism

 ✤   Legal

 ✤   Unique selling point
Why are you interested in
accessibility?
 ✤   Enlightened self-interest

 ✤   Professionalism

 ✤   Legal

 ✤   Unique selling point

 ✤   Technical challenge
Why are you interested in
accessibility?
 ✤   Enlightened self-interest

 ✤   Professionalism

 ✤   Legal

 ✤   Unique selling point

 ✤   Technical challenge

 ✤   Ethical thing to do
What are Cyberethics?

The study of ethics pertaining to computer networks:

  ✤   Acceptable behaviour for using the Internet

  ✤   Storage and display of personal data

  ✤   Ownership of digital data

  ✤   Access to adult content

  ✤   The right to access Internet content
Internet Engineering Task Force:
RFC 1087
Defines as unethical anything which:

  ✤   Seeks to gain unauthorised access to the resources of the Internet.

  ✤   Disrupts the intended use of the Internet.

  ✤   Wastes resources (people, capacity, computer) through such
      actions.

  ✤   Destroys the integrity of computer-based information, or

  ✤   Compromises the privacy of users
Ten Commandments of Computer
Ethics
 1. Thou shalt not use a computer to harm other people.

 2. Thou shalt not interfere with other people's computer work.

 3. Thou shalt not snoop around in other people's computer files.

 4. Thou shalt not use a computer to steal.

 5. Thou shalt not use a computer to bear false witness.
Ten Commandments of Computer
Ethics
 6. Thou shalt not copy or use proprietary software for which you
    have not paid.

 7. Thou shalt not use other people's computer resources without
    authorisation or proper compensation.

 8. Thou shalt not appropriate other people's intellectual output.

 9. Thou shalt think about the social consequences of the program you
    are writing or the system you are designing.

 10.Thou shalt always use a computer in ways that ensure
   consideration and respect for your fellow humans
The Code of Fair Information
Practices
 1. There must be no personal data record-keeping systems whose
    very existence is secret.

 2. There must be a way for a person to find out what information
    about the person is in a record and how it is used.

 3. There must be a way for a person to prevent information about the
    person that was obtained for one purpose from being used or made
    available for other purposes without the person's consent.
The Code of Fair Information
Practices
 4. There must be a way for a person to correct or amend a record of
    identifiable information about the person.

 5. Any organisation creating, maintaining, using, or disseminating
    records of identifiable personal data must assure the reliability of
    the data for their intended use and must take precautions to
    prevent misuses of the data.
What about accessibility?
The Universal Declaration of
Human Rights
Article 27

   Everyone has the right freely to participate in the cultural life of the
   community, to enjoy the arts and to share in scientific advancement
   and its benefits.
UN Convention on the Rights of
Persons with Disabilities
Article 9 - Accessibility

   To promote access for persons with disabilities to new information
   and communications technologies and systems, including the
   Internet;
Starting points for a definition of
Cyberethical Accessibility
Starting points for a definition of
Cyberethical Accessibility
 ✤   The power of the Web is in its universality. Access by everyone
     regardless of disability is an essential aspect.
Starting points for a definition of
Cyberethical Accessibility
 ✤   The power of the Web is in its universality. Access by everyone
     regardless of disability is an essential aspect.

 ✤   Web pages are designed for people.
Starting points for a definition of
Cyberethical Accessibility
 ✤   The power of the Web is in its universality. Access by everyone
     regardless of disability is an essential aspect.

 ✤   Web pages are designed for people.

 ✤   Whatever the device you use for getting your information out, it
     should be the same information.
Dilemmas
The trolley problem
The trolley problem

 ✤   The driver dilemma
The trolley problem

 ✤   The driver dilemma

 ✤   The heavy weight
The trolley problem

 ✤   The driver dilemma

 ✤   The heavy weight

 ✤   The fat man
The trolley problem

 ✤   The driver dilemma

 ✤   The heavy weight

 ✤   The fat man

 ✤   The villainous fat man
Graded Absolutism
Priorities
How to build a webpage
How to build a webpage

 ✤   Content and markup
How to build a webpage

 ✤   Content and markup

     ✤   Including alternative and link text
How to build a webpage

 ✤   Content and markup

     ✤   Including alternative and link text

 ✤   Images based on alternative / link text
How to build a webpage

 ✤   Content and markup

     ✤   Including alternative and link text

 ✤   Images based on alternative / link text

 ✤   CSS
How to build a webpage

 ✤   Content and markup

     ✤   Including alternative and link text

 ✤   Images based on alternative / link text

 ✤   CSS

 ✤   JavaScript
How to build a webpage

 ✤   Content and markup

     ✤   Including alternative and link text

 ✤   Images based on alternative / link text

 ✤   CSS

 ✤   JavaScript

     ✤   Usability enhancements
How to build a webpage

 ✤   Content and markup

     ✤   Including alternative and link text

 ✤   Images based on alternative / link text

 ✤   CSS

 ✤   JavaScript

     ✤   Usability enhancements

     ✤   Always consider focus, make Virtual Buffer refreshes
How to build a webpage (part 2)
How to build a webpage (part 2)

 ✤   WAI-ARIA
How to build a webpage (part 2)

 ✤   WAI-ARIA

     ✤   Usability enhancements
How to build a webpage (part 2)

 ✤   WAI-ARIA

     ✤   Usability enhancements

     ✤   Be careful - WAI-ARIA may be hazardous to your usability
How to build a webpage (part 2)

 ✤   WAI-ARIA

     ✤   Usability enhancements

     ✤   Be careful - WAI-ARIA may be hazardous to your usability

 ✤   Assistive technology specific fixes
Considerations
Considerations

 ✤   Does it prevent user customisation?
Considerations

 ✤   Does it prevent user customisation?

 ✤   When there are conflicts, does it minimise the problems for the
     conflicted option?
Considerations

 ✤   Does it prevent user customisation?

 ✤   When there are conflicts, does it minimise the problems for the
     conflicted option?

 ✤   Assistive technology bugs
<header>?
<header>?

 ✤   Jaws 10 and 11 in conjunction with Firefox 3.6 ignored <header>
     content
<header>?

 ✤   Jaws 10 and 11 in conjunction with Firefox 3.6 ignored <header>
     content

 ✤   Header Elements Removed (September 8, 2010)
<header>?

 ✤   Jaws 10 and 11 in conjunction with Firefox 3.6 ignored <header>
     content

 ✤   Header Elements Removed (September 8, 2010)

 ✤   Header is Back! (October 13, 2010)
WAI-ARIA interactions
“I believe this proposal is
unethical and that we should not
           pursue it.”
“Accessibility is actually more
  important than Security”
Perfect accessibility (#PerfectA11y)
Perfect accessibility (#PerfectA11y)

 ✤   Usability
Perfect accessibility (#PerfectA11y)

 ✤   Usability

     ✤   Choice
Perfect accessibility (#PerfectA11y)

 ✤   Usability

     ✤   Choice

         ✤   Complexity
Perfect accessibility (#PerfectA11y)

 ✤   Usability

     ✤   Choice

         ✤   Complexity

 ✤   Definition of perfect
Perfect accessibility (#PerfectA11y)

 ✤   Usability

     ✤   Choice

         ✤   Complexity

 ✤   Definition of perfect

 ✤   Accessibility as a feature
Perfect accessibility (#PerfectA11y)

 ✤   Usability

     ✤   Choice

         ✤   Complexity

 ✤   Definition of perfect

 ✤   Accessibility as a feature

 ✤   Non-commercial content
Is it ever right to exclude access?
Is it ever right to exclude access?

 ✤   Gambling

 ✤   Alcohol

 ✤   Pornography

 ✤   Extreme political / religious beliefs
To the individual that is excluded
 it is of little comfort that efforts
have been made to include others
Accessibility Cyberethics
Accessibility Cyberethics

We must:
Accessibility Cyberethics

We must:

  ✤   Aim to provide an equivalent experience to all users
Accessibility Cyberethics

We must:

  ✤   Aim to provide an equivalent experience to all users

  ✤   Maximise support for the majority
Accessibility Cyberethics

We must:

  ✤   Aim to provide an equivalent experience to all users

  ✤   Maximise support for the majority

  ✤   Minimise friction for the minority
Accessibility Cyberethics

We must:

  ✤   Aim to provide an equivalent experience to all users

  ✤   Maximise support for the majority

  ✤   Minimise friction for the minority

  ✤   Build tools that are both accessible and produce accessible output
Accessibility Cyberethics

We must:

  ✤   Aim to provide an equivalent experience to all users

  ✤   Maximise support for the majority

  ✤   Minimise friction for the minority

  ✤   Build tools that are both accessible and produce accessible output

  ✤   Evangelise accessibility
Accessibility Cyberethics
Accessibility Cyberethics

We must not:
Accessibility Cyberethics

We must not:

  ✤   Regress accessibility between versions
Accessibility Cyberethics

We must not:

  ✤   Regress accessibility between versions

  ✤   See accessibility as a competitive advantage
Accessibility Cyberethics

We must not:

  ✤   Regress accessibility between versions

  ✤   See accessibility as a competitive advantage

  ✤   Give up the good fight!
Always strive to do the best you
 can with the knowledge and
   resources that you have
Thank you




http://ianpouncey.com

@IanPouncey

Mais conteúdo relacionado

Semelhante a Cyberethics and accessibility

Web Accessibility presentation for Big Sky DevCon
Web Accessibility presentation for Big Sky DevConWeb Accessibility presentation for Big Sky DevCon
Web Accessibility presentation for Big Sky DevCon
Dan Bowling
 
World Tourism Day 'Tourism for All - Promoting Universal Accessibility'
World Tourism Day 'Tourism for All - Promoting Universal Accessibility'World Tourism Day 'Tourism for All - Promoting Universal Accessibility'
World Tourism Day 'Tourism for All - Promoting Universal Accessibility'
Despina Karatzias
 
The Soul in The Machine - Developing for Humans (FrankenJS edition)
The Soul in The Machine - Developing for Humans (FrankenJS edition)The Soul in The Machine - Developing for Humans (FrankenJS edition)
The Soul in The Machine - Developing for Humans (FrankenJS edition)
Christian Heilmann
 

Semelhante a Cyberethics and accessibility (20)

Hackability: Free/Open Source Assistive Tech
Hackability: Free/Open Source Assistive TechHackability: Free/Open Source Assistive Tech
Hackability: Free/Open Source Assistive Tech
 
Web Accessibility presentation for Big Sky DevCon
Web Accessibility presentation for Big Sky DevConWeb Accessibility presentation for Big Sky DevCon
Web Accessibility presentation for Big Sky DevCon
 
Designing the mobile experience
Designing the mobile experienceDesigning the mobile experience
Designing the mobile experience
 
Approach coding for accessibility
Approach coding for accessibilityApproach coding for accessibility
Approach coding for accessibility
 
Ensuring accessibility by Kenny Gilles
Ensuring accessibility by Kenny GillesEnsuring accessibility by Kenny Gilles
Ensuring accessibility by Kenny Gilles
 
Digital accessibility intro-a11ycle_2020-01-15
Digital accessibility intro-a11ycle_2020-01-15Digital accessibility intro-a11ycle_2020-01-15
Digital accessibility intro-a11ycle_2020-01-15
 
World Tourism Day 'Tourism for All - Promoting Universal Accessibility'
World Tourism Day 'Tourism for All - Promoting Universal Accessibility'World Tourism Day 'Tourism for All - Promoting Universal Accessibility'
World Tourism Day 'Tourism for All - Promoting Universal Accessibility'
 
Don't Panic! How to perform an accessibility evaluation with limited resources
Don't Panic! How to perform an accessibility evaluation with limited resourcesDon't Panic! How to perform an accessibility evaluation with limited resources
Don't Panic! How to perform an accessibility evaluation with limited resources
 
Why Accessibility is More Than Just a Lighthouse Metric | SEONerdSwitzerland ...
Why Accessibility is More Than Just a Lighthouse Metric | SEONerdSwitzerland ...Why Accessibility is More Than Just a Lighthouse Metric | SEONerdSwitzerland ...
Why Accessibility is More Than Just a Lighthouse Metric | SEONerdSwitzerland ...
 
Web accessibility 101: The why, who, what, and how of "a11y"
Web accessibility 101: The why, who, what, and how of "a11y"Web accessibility 101: The why, who, what, and how of "a11y"
Web accessibility 101: The why, who, what, and how of "a11y"
 
Website Accessibility
Website AccessibilityWebsite Accessibility
Website Accessibility
 
The Latest in Association Technology
The Latest in Association TechnologyThe Latest in Association Technology
The Latest in Association Technology
 
Usability ≠ Accessibility. An intro to web accessibility for agencies.
Usability ≠ Accessibility. An intro to web accessibility for agencies.Usability ≠ Accessibility. An intro to web accessibility for agencies.
Usability ≠ Accessibility. An intro to web accessibility for agencies.
 
Cyber Threats and Data Privacy in a Digital World
Cyber Threats and Data Privacy in a Digital WorldCyber Threats and Data Privacy in a Digital World
Cyber Threats and Data Privacy in a Digital World
 
Designing, Developing & Testing for Accessibility
Designing, Developing & Testing for AccessibilityDesigning, Developing & Testing for Accessibility
Designing, Developing & Testing for Accessibility
 
The Soul in The Machine - Developing for Humans (FrankenJS edition)
The Soul in The Machine - Developing for Humans (FrankenJS edition)The Soul in The Machine - Developing for Humans (FrankenJS edition)
The Soul in The Machine - Developing for Humans (FrankenJS edition)
 
How to Make Learning Accessible and Inclusive
How to Make Learning Accessible and InclusiveHow to Make Learning Accessible and Inclusive
How to Make Learning Accessible and Inclusive
 
Midcamp2016
Midcamp2016Midcamp2016
Midcamp2016
 
Erase and Rewind - Open Web Camp 2015
Erase and Rewind - Open Web Camp 2015Erase and Rewind - Open Web Camp 2015
Erase and Rewind - Open Web Camp 2015
 
A Web for Everyone
A Web for EveryoneA Web for Everyone
A Web for Everyone
 

Mais de Ian Pouncey

Mais de Ian Pouncey (7)

How to make an inaccessible website - CSS Minsk JS
How to make an inaccessible website - CSS Minsk JSHow to make an inaccessible website - CSS Minsk JS
How to make an inaccessible website - CSS Minsk JS
 
Accessible user experiences in four minutes, thirty three seconds
Accessible user experiences in four minutes, thirty three secondsAccessible user experiences in four minutes, thirty three seconds
Accessible user experiences in four minutes, thirty three seconds
 
Accessible Code for Web Designers - CSUN 2017
Accessible Code for Web Designers - CSUN 2017Accessible Code for Web Designers - CSUN 2017
Accessible Code for Web Designers - CSUN 2017
 
Accessible UX&D – Minimal Viable Design
Accessible UX&D – Minimal Viable DesignAccessible UX&D – Minimal Viable Design
Accessible UX&D – Minimal Viable Design
 
Accessibility at the BBC
Accessibility at the BBCAccessibility at the BBC
Accessibility at the BBC
 
Practical accessibility
Practical accessibilityPractical accessibility
Practical accessibility
 
Standards-next: Content and Cognition
Standards-next: Content and CognitionStandards-next: Content and Cognition
Standards-next: Content and Cognition
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Último (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

Cyberethics and accessibility

  • 2. Introduction ✤ What are Cyberethics? ✤ Dilemmas ✤ Priorities ✤ Accessibility Cyberethics
  • 4. Introduction ✤ Who am I?
  • 5. Introduction ✤ Who am I? ✤ Who are you?
  • 6. Why are you interested in accessibility?
  • 7. Why are you interested in accessibility? ✤ Enlightened self-interest
  • 8. Why are you interested in accessibility? ✤ Enlightened self-interest ✤ Professionalism
  • 9. Why are you interested in accessibility? ✤ Enlightened self-interest ✤ Professionalism ✤ Legal
  • 10. Why are you interested in accessibility? ✤ Enlightened self-interest ✤ Professionalism ✤ Legal ✤ Unique selling point
  • 11. Why are you interested in accessibility? ✤ Enlightened self-interest ✤ Professionalism ✤ Legal ✤ Unique selling point ✤ Technical challenge
  • 12. Why are you interested in accessibility? ✤ Enlightened self-interest ✤ Professionalism ✤ Legal ✤ Unique selling point ✤ Technical challenge ✤ Ethical thing to do
  • 13. What are Cyberethics? The study of ethics pertaining to computer networks: ✤ Acceptable behaviour for using the Internet ✤ Storage and display of personal data ✤ Ownership of digital data ✤ Access to adult content ✤ The right to access Internet content
  • 14. Internet Engineering Task Force: RFC 1087 Defines as unethical anything which: ✤ Seeks to gain unauthorised access to the resources of the Internet. ✤ Disrupts the intended use of the Internet. ✤ Wastes resources (people, capacity, computer) through such actions. ✤ Destroys the integrity of computer-based information, or ✤ Compromises the privacy of users
  • 15. Ten Commandments of Computer Ethics 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness.
  • 16. Ten Commandments of Computer Ethics 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorisation or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10.Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans
  • 17. The Code of Fair Information Practices 1. There must be no personal data record-keeping systems whose very existence is secret. 2. There must be a way for a person to find out what information about the person is in a record and how it is used. 3. There must be a way for a person to prevent information about the person that was obtained for one purpose from being used or made available for other purposes without the person's consent.
  • 18. The Code of Fair Information Practices 4. There must be a way for a person to correct or amend a record of identifiable information about the person. 5. Any organisation creating, maintaining, using, or disseminating records of identifiable personal data must assure the reliability of the data for their intended use and must take precautions to prevent misuses of the data.
  • 20. The Universal Declaration of Human Rights Article 27 Everyone has the right freely to participate in the cultural life of the community, to enjoy the arts and to share in scientific advancement and its benefits.
  • 21. UN Convention on the Rights of Persons with Disabilities Article 9 - Accessibility To promote access for persons with disabilities to new information and communications technologies and systems, including the Internet;
  • 22. Starting points for a definition of Cyberethical Accessibility
  • 23. Starting points for a definition of Cyberethical Accessibility ✤ The power of the Web is in its universality. Access by everyone regardless of disability is an essential aspect.
  • 24. Starting points for a definition of Cyberethical Accessibility ✤ The power of the Web is in its universality. Access by everyone regardless of disability is an essential aspect. ✤ Web pages are designed for people.
  • 25. Starting points for a definition of Cyberethical Accessibility ✤ The power of the Web is in its universality. Access by everyone regardless of disability is an essential aspect. ✤ Web pages are designed for people. ✤ Whatever the device you use for getting your information out, it should be the same information.
  • 28. The trolley problem ✤ The driver dilemma
  • 29. The trolley problem ✤ The driver dilemma ✤ The heavy weight
  • 30. The trolley problem ✤ The driver dilemma ✤ The heavy weight ✤ The fat man
  • 31. The trolley problem ✤ The driver dilemma ✤ The heavy weight ✤ The fat man ✤ The villainous fat man
  • 34. How to build a webpage
  • 35. How to build a webpage ✤ Content and markup
  • 36. How to build a webpage ✤ Content and markup ✤ Including alternative and link text
  • 37. How to build a webpage ✤ Content and markup ✤ Including alternative and link text ✤ Images based on alternative / link text
  • 38. How to build a webpage ✤ Content and markup ✤ Including alternative and link text ✤ Images based on alternative / link text ✤ CSS
  • 39. How to build a webpage ✤ Content and markup ✤ Including alternative and link text ✤ Images based on alternative / link text ✤ CSS ✤ JavaScript
  • 40. How to build a webpage ✤ Content and markup ✤ Including alternative and link text ✤ Images based on alternative / link text ✤ CSS ✤ JavaScript ✤ Usability enhancements
  • 41. How to build a webpage ✤ Content and markup ✤ Including alternative and link text ✤ Images based on alternative / link text ✤ CSS ✤ JavaScript ✤ Usability enhancements ✤ Always consider focus, make Virtual Buffer refreshes
  • 42. How to build a webpage (part 2)
  • 43. How to build a webpage (part 2) ✤ WAI-ARIA
  • 44. How to build a webpage (part 2) ✤ WAI-ARIA ✤ Usability enhancements
  • 45. How to build a webpage (part 2) ✤ WAI-ARIA ✤ Usability enhancements ✤ Be careful - WAI-ARIA may be hazardous to your usability
  • 46. How to build a webpage (part 2) ✤ WAI-ARIA ✤ Usability enhancements ✤ Be careful - WAI-ARIA may be hazardous to your usability ✤ Assistive technology specific fixes
  • 48. Considerations ✤ Does it prevent user customisation?
  • 49. Considerations ✤ Does it prevent user customisation? ✤ When there are conflicts, does it minimise the problems for the conflicted option?
  • 50. Considerations ✤ Does it prevent user customisation? ✤ When there are conflicts, does it minimise the problems for the conflicted option? ✤ Assistive technology bugs
  • 52. <header>? ✤ Jaws 10 and 11 in conjunction with Firefox 3.6 ignored <header> content
  • 53. <header>? ✤ Jaws 10 and 11 in conjunction with Firefox 3.6 ignored <header> content ✤ Header Elements Removed (September 8, 2010)
  • 54. <header>? ✤ Jaws 10 and 11 in conjunction with Firefox 3.6 ignored <header> content ✤ Header Elements Removed (September 8, 2010) ✤ Header is Back! (October 13, 2010)
  • 56. “I believe this proposal is unethical and that we should not pursue it.”
  • 57. “Accessibility is actually more important than Security”
  • 60. Perfect accessibility (#PerfectA11y) ✤ Usability ✤ Choice
  • 61. Perfect accessibility (#PerfectA11y) ✤ Usability ✤ Choice ✤ Complexity
  • 62. Perfect accessibility (#PerfectA11y) ✤ Usability ✤ Choice ✤ Complexity ✤ Definition of perfect
  • 63. Perfect accessibility (#PerfectA11y) ✤ Usability ✤ Choice ✤ Complexity ✤ Definition of perfect ✤ Accessibility as a feature
  • 64. Perfect accessibility (#PerfectA11y) ✤ Usability ✤ Choice ✤ Complexity ✤ Definition of perfect ✤ Accessibility as a feature ✤ Non-commercial content
  • 65. Is it ever right to exclude access?
  • 66. Is it ever right to exclude access? ✤ Gambling ✤ Alcohol ✤ Pornography ✤ Extreme political / religious beliefs
  • 67. To the individual that is excluded it is of little comfort that efforts have been made to include others
  • 70. Accessibility Cyberethics We must: ✤ Aim to provide an equivalent experience to all users
  • 71. Accessibility Cyberethics We must: ✤ Aim to provide an equivalent experience to all users ✤ Maximise support for the majority
  • 72. Accessibility Cyberethics We must: ✤ Aim to provide an equivalent experience to all users ✤ Maximise support for the majority ✤ Minimise friction for the minority
  • 73. Accessibility Cyberethics We must: ✤ Aim to provide an equivalent experience to all users ✤ Maximise support for the majority ✤ Minimise friction for the minority ✤ Build tools that are both accessible and produce accessible output
  • 74. Accessibility Cyberethics We must: ✤ Aim to provide an equivalent experience to all users ✤ Maximise support for the majority ✤ Minimise friction for the minority ✤ Build tools that are both accessible and produce accessible output ✤ Evangelise accessibility
  • 77. Accessibility Cyberethics We must not: ✤ Regress accessibility between versions
  • 78. Accessibility Cyberethics We must not: ✤ Regress accessibility between versions ✤ See accessibility as a competitive advantage
  • 79. Accessibility Cyberethics We must not: ✤ Regress accessibility between versions ✤ See accessibility as a competitive advantage ✤ Give up the good fight!
  • 80. Always strive to do the best you can with the knowledge and resources that you have

Notas do Editor

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. http://tools.ietf.org/html/rfc1087\n
  13. http://www.computerethicsinstitute.org/images/TheTenCommandmentsOfComputerEthics.pdf\n
  14. http://www.computerethicsinstitute.org/images/TheTenCommandmentsOfComputerEthics.pdf\n
  15. http://epic.org/privacy/consumer/code_fair_info.html\n
  16. http://epic.org/privacy/consumer/code_fair_info.html\n
  17. \n
  18. http://www.un.org/en/documents/udhr/index.shtml\n
  19. http://www.un.org/disabilities/default.asp?navid=14&amp;amp;pid=150\n
  20. Tim Berners-Lee (used without permission)\n
  21. Tim Berners-Lee (used without permission)\n
  22. Tim Berners-Lee (used without permission)\n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n
  35. \n
  36. \n
  37. \n
  38. \n
  39. \n
  40. \n
  41. \n
  42. \n
  43. \n
  44. http://www.terrillthompson.com/tests/html5-header.html\nhttp://www.accessibleculture.org/articles/2010/09/header-elements-removed/\nhttp://www.accessibleculture.org/articles/2010/10/header-is-back/\n
  45. http://www.terrillthompson.com/tests/html5-header.html\nhttp://www.accessibleculture.org/articles/2010/09/header-elements-removed/\nhttp://www.accessibleculture.org/articles/2010/10/header-is-back/\n
  46. http://www.terrillthompson.com/tests/html5-header.html\nhttp://www.accessibleculture.org/articles/2010/09/header-elements-removed/\nhttp://www.accessibleculture.org/articles/2010/10/header-is-back/\n
  47. \n
  48. http://lists.w3.org/Archives/Public/public-html/2012Feb/0274.html\n
  49. https://plus.google.com/112678702228711889851/posts/eVeouesvaVX\n
  50. \n
  51. \n
  52. \n
  53. \n
  54. \n
  55. \n
  56. \n
  57. \n
  58. \n
  59. \n
  60. \n
  61. \n
  62. \n
  63. \n
  64. \n
  65. \n
  66. \n
  67. \n
  68. \n
  69. \n