Internet Voting: Beyond Technology

Internet Voting: Beyond Technology

Trisha Woolley (Marist College, USA) and Craig Fisher (Marist College, USA)
Copyright: © 2004 |Pages: 22
DOI: 10.4018/978-1-59140-286-7.ch006
OnDemand PDF Download:


When designing information systems, it is important to consider the needs of users with disabilities, including those with visual impairment, hearing impairment, or color-blindness. This is especially important for designing Websites. It takes time and money to create or redesign Websites for easy access for users with disabilities. This is also known as Web accessibility. This chapter will discuss the ethical implications involved with Web accessibility. An ethical analysis of Web accessibility will be performed using a partial combination of two structured analysis approaches. It is the position of the authors of this chapter that Website development should consider accessibility for users with sensory and motor disabilities as an ethical requirement.

Complete Chapter List

Search this Book:
Table of Contents
Marian Quigley
Chapter 1
Barbara A. Schuldt
This chapter introduces ethical considerations that are especially relevant for the current networked world. It discusses the use of a mnemonic... Sample PDF
MAMA on the Web: Ethical Considerations for Our Networked World
Chapter 2
Helen Partridge
This chapter will explore the human dimension of the digital divide. It argues that existing digital divide research takes primarily a... Sample PDF
Establishing the Human Dimension of the Digital Divide
Chapter 3
Rasool Azari, James Pick
This chapter examines the influence of socio-economic factors on the employment, payroll, and number of enterprises of three technology sectors for... Sample PDF
Socio-economic Influence on Information Technology: The Case of California
Chapter 4
Jack S. Cook, Laura Cook
Web accessibility is really not a technological issue but rather a cultural problem. A Web site is said to be Web accessible if anyone, regardless... Sample PDF
The Ethics of Web Design: Ensuring Access for Everyone
Chapter 5
Alfreda Dudley-Sponaugle, Jonathan Lazar
When designing information systems, it is important to consider the needs of users with disabilities, including those with visual impairment... Sample PDF
Web Accessibility for Users with Disabilities: A Multi-faceted Ethical Analysis
Chapter 6
Trisha Woolley, Craig Fisher
When designing information systems, it is important to consider the needs of users with disabilities, including those with visual impairment... Sample PDF
Internet Voting: Beyond Technology
Chapter 7
Geoffrey A. Sandy
The Internet provides access to speech both conventional and unconventional. Some speech is considered harmful to minors. This chapter discusses the... Sample PDF
Protection of Minors from Harmful Internet Content
Chapter 8
Marian Quigley
The rapid appropriation of mobile phone technology by young people is occurring at the same time as critics are debating the so-called demise of... Sample PDF
Mobile Communities and the "Generation that Beeps and Hums"
Chapter 9
Laura Lally
In the post-9/11 environment, there has been an increasing awareness of the need for information security. This chapter presents an analysis of the... Sample PDF
Insights from Y2K and 9/11 for Enhancing IT Security
Chapter 10
Leslie Leong, Andrzej T. Jarmoszko
The emphasis and increased awareness of information security require an understanding and knowledge of the technology that supports it. As the risks... Sample PDF
Cryptography: Deciphering Its Progress
Chapter 11
Malcolm R. Pattinson
This chapter introduces a method of assessing the state of an organization’s information system security by evaluating the effectiveness of the... Sample PDF
A Method of Assessing Information System Security Controls
Chapter 12
Neil F. Doherty, Heather Fulford
While the importance of the information security policy (ISP) is widely acknowledged in the academic literature, there has, to date, been little... Sample PDF
Information Security Policies in Large Organizations: The Development of a Conceptual Framework to Explore Their Impact
Chapter 13
James E. Goldman, Vaughn R. Christie
This chapter introduces the Metrics Based Security Assessment (MBSA) as a means of measuring an organization’s information security maturity. It... Sample PDF
Metrics Based Security Assessment
Chapter 14
Margherita Pagani
This chapter sets out to analyze the impact generated by the adoption of Digital Rights Management (DRM) processes on the typical Digital Media... Sample PDF
The Critical Role of Digital Rights Management Process
About the Authors