Universal Site Accessibility

Author(s):  
Beth Archibald Tang

At least 15% of the American population has a disability (Kaye, 1998); some estimate it is as high as one in five. For research studies, the United States government usually defines the term disability as a limitation in a person’s major life activities during daily living, working, and attending school (Job Accommodation Network, 1992).1 Assistive technologies—the tools that help individuals complete their daily tasks—serve as adjuncts that help to bridge the gap between dependence and self-reliance. Webmasters2 have their tools, too. They use software that enhance the sites and make them interesting. While Web usability specialists place emphasis on completing tasks, the purpose of some Web sites may be more about evoking a “wow” response, and less about imparting information that visitors can use. On occasion, being able to access these Web pages requires that users go to a third-party Web site and download plug-ins to listen to an audio file, watch a video clip, or read downloaded documents. For people with disabilities, however, many of the Web sites inadvertently establish barriers that could be prevented.

Author(s):  
Krishnaveni Raju ◽  
C. Chellappan

With the advent and the rising popularity of Internet, security is becoming one of the focal point. At present, Web sites have become the attacker’s main target. The attackers uses the strategy of embedding the HTML tags, the script tag to include Web-based Trojan scripting or redirector scripting, the embedded object tag which activates the third-party applications to display the embedded object and the advanced strategy is the ARP spoofing method to build malicious website when the attackers cannot gain control of the target website. The attacker hijacks the traffic, then injects the malicious code into the HTML responses to achieve virtual malicious websites. The malicious code embedded in the web pages by the attackers; change the display mode of the corresponding HTML tags and the respective effects invisible to the browser users. The display feature setting of embedded malicious code is detected by the abnormal visibility recognition technique which increases efficiency and reduces maintenance cost. Inclusion of the honey client increases the malicious website detection rate and speed. Most of the malicious Web pages are hence detected efficiently and the malicious code in the source code is located accurately. It can also handle End-User requests to know whether their webpage is free of Malicious codes or not.


First Monday ◽  
2005 ◽  
Author(s):  
Chandra Prabha ◽  
Raymond Irwin

This article reports on the availability, domain distribution, percentage of Web sites versus Web pages, perceived value, and category of 31,400 Web–based resources selected by 50 public libraries in the United States and Canada. Eighty–seven percent of these resources were available, 60 percent were Web pages, and resources selected by 20 percent of the sampled libraries were finding tools such as general or subject specific search engines. Ninety–three percent of the resources were selected by just one of the 50 libraries; only 17 percent of the resources appeared to be primarily of local interest. The public may be unaware of these unique resources. The public library community must develop programs to increase the awareness and sharing of these evaluated resources.


2010 ◽  
Vol 1 (3) ◽  
pp. 39-51 ◽  
Author(s):  
Dominic Thomas

Despite high hopes and large investments, existing efforts at designing and implementing Internet Web pages and systems for civic engagement have met only marginal success, suggesting a need for careful thought and application of research on how to get people to interact using technology. This paper develops and presents a theory for designing effective online civic engagement systems. The theory draws from several decades of work in the group support systems literature as well as the historical context of civic engagement in the United States to identify seven key dynamics (the kernel) to address and include when designing such systems. These seven dynamics include five focusing on promoting individual-level interaction: authentication, authorization, masking, interests, and expertise. Two focus on group-level interaction: local access and timeliness. The author analyzes existing systems in light of these seven dynamics and identifies two additional design accommodations that would specifically promote youth engagement.


1981 ◽  
Vol 75 (3) ◽  
pp. 590-628 ◽  
Author(s):  
Sang-Myon Rhee

The United States and Canada agreed, by the Boundary Settlement Treaty of March 29, 1979, to submit their decade-long dispute over the maritime boundary in the Gulf of Maine area to a Chamber of the International Court of Justice (ICJ) or to an ad hoc court of arbitration. The treaty, however, has not yet taken effect because the interrelated Fisheries Agreement, which was concluded on the same day and was to take effect simultaneously, was Unilaterally scrapped by the United States Government on March 6, 1981, on grounds of its allegedly unfair and inflexible provisions. On April 29, the United States Senate unanimously adopted a resolution supporting the Government's position to delink the two treaties and to settle the maritime boundary problem first by a third-party procedure. Whether or not a new fisheries agreement is concluded in the near future, it is expected that the maritime boundary dispute will ultimately be resolved by binding third-party settlement. The purpose of this article is to examine the legal position taken by each Government regarding the maritime boundary issues, and to suggest equitable principles that should govern their resolution.


Author(s):  
Dominic Thomas

Despite high hopes and large investments, existing efforts at designing and implementing Internet Web pages and systems for civic engagement have met only marginal success, suggesting a need for careful thought and application of research on how to get people to interact using technology. This paper develops and presents a theory for designing effective online civic engagement systems. The theory draws from several decades of work in the group support systems literature as well as the historical context of civic engagement in the United States to identify seven key dynamics (the kernel) to address and include when designing such systems. These seven dynamics include five focusing on promoting individual-level interaction: authentication, authorization, masking, interests, and expertise. Two focus on group-level interaction: local access and timeliness. The author analyzes existing systems in light of these seven dynamics and identifies two additional design accommodations that would specifically promote youth engagement.


Author(s):  
Stephanie K. Pell

After the September 11 attacks, law enforcement's mission expanded to include, at times even prioritize, the general “prevention, deterrence and disruption” of terrorist attacks, which presumed a new emphasis upon threat detection and identification by analyzing patterns in larger, less specific bodies of information. Indeed, the unprecedented level of “third-party” possession of information inevitably makes the private sector the most reliable and comprehensive source of information available to law enforcement and intelligence agencies alike. This chapter explores the potential applications of systematic government access to data held by third-party private-sector intermediaries that would not be considered public information sources but, rather, data generated based on the role these intermediaries play in facilitating economic and business transactions (including personal business, such as buying groceries or staying at a hotel on vacation).


Author(s):  
Benjamin Tromly

During the height of the Cold War in the 1950s, the United States government unleashed covert operations intended to weaken the Soviet Union. As part of these efforts, the CIA undertook support of Russian exiles, populations uprooted either during World War II or by the Russian Revolution decades before. No one seemed better prepared to fight in the American secret war against communism than the uprooted Russians, whom the CIA directed to carry out propaganda, espionage, and subversion operations from their home base in West Germany. Yet the American engagement of Russian exiles had unpredictable outcomes. Drawing on recently declassified and previously untapped sources, Cold War Exiles and the CIA examines how the CIA’s Russian operations became entangled with the internal struggles of Russia abroad and also the espionage wars of the superpowers in divided Germany. What resulted was a transnational political sphere involving different groups of Russian exiles, American and German anti-communists, and spies operating on both sides of the Iron Curtain. Inadvertently, CIA’s patronage of Russian exiles forged a complex sub-front in the wider Cold War, demonstrating the ways in which the hostilities of the Cold War played out in ancillary conflicts involving proxies and non-state actors.


Sign in / Sign up

Export Citation Format

Share Document