Automated Accessibility Evaluation Software for Authenticated Environments A Heuristic Usability Evaluation

Web accessibility has been the subject of much discussion regarding the need to make Web content accessible to all people, regardless of their abilities or disabilities. While some testing techniques require human intervention, accessibility can also be evaluated by automated tools. Automated evalua...

Full description

Saved in:
Bibliographic Details
Published inUniversal Access in Human-Computer Interaction. Design for All and Accessibility Practice pp. 77 - 88
Main Authors Pivetta, Elisa Maria, Saito, Daniela Satomi, da Silva Flor, Carla, Ulbricht, Vania Ribas, Vanzin, Tarcísio
Format Book Chapter
LanguageEnglish
Published Cham Springer International Publishing 2014
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN9783319075082
331907508X
ISSN0302-9743
1611-3349
DOI10.1007/978-3-319-07509-9_8

Cover

Loading…
Abstract Web accessibility has been the subject of much discussion regarding the need to make Web content accessible to all people, regardless of their abilities or disabilities. While some testing techniques require human intervention, accessibility can also be evaluated by automated tools. Automated evaluation tools are software programs that examine the code of Web pages to determine if they conform to a set of accessibility guidelines that are often based on the Web Content Accessibility Guidelines Version 2.0 (WCAG 2.0), developed by the World Wide Web Consortium (W3C). In this context, the purpose of this study is to analyze an automated software program for evaluating authenticated environments and verify the usability of this tool, since automated systems require precision and reliability in terms of both results and use in any type of environment. With this in mind, this paper aimed at evaluating the ASES software by means of a heuristic evaluation carried out by three experts. The analysis revealed major accessibility problems, as well as improper functioning of available tools and inconsistency of results. Furthermore, ASES was found to have problems of efficiency, interaction, validity, and reliability in the results presented. Considering that this is an open-source accessibility testing tool that can be found on a government web site, the correction or improvement of the system’s deficiencies identified in this study is highly recommended, as there is a lack of software available to evaluate authenticated environments.
AbstractList Web accessibility has been the subject of much discussion regarding the need to make Web content accessible to all people, regardless of their abilities or disabilities. While some testing techniques require human intervention, accessibility can also be evaluated by automated tools. Automated evaluation tools are software programs that examine the code of Web pages to determine if they conform to a set of accessibility guidelines that are often based on the Web Content Accessibility Guidelines Version 2.0 (WCAG 2.0), developed by the World Wide Web Consortium (W3C). In this context, the purpose of this study is to analyze an automated software program for evaluating authenticated environments and verify the usability of this tool, since automated systems require precision and reliability in terms of both results and use in any type of environment. With this in mind, this paper aimed at evaluating the ASES software by means of a heuristic evaluation carried out by three experts. The analysis revealed major accessibility problems, as well as improper functioning of available tools and inconsistency of results. Furthermore, ASES was found to have problems of efficiency, interaction, validity, and reliability in the results presented. Considering that this is an open-source accessibility testing tool that can be found on a government web site, the correction or improvement of the system’s deficiencies identified in this study is highly recommended, as there is a lack of software available to evaluate authenticated environments.
Author Saito, Daniela Satomi
Vanzin, Tarcísio
Pivetta, Elisa Maria
da Silva Flor, Carla
Ulbricht, Vania Ribas
Author_xml – sequence: 1
  givenname: Elisa Maria
  surname: Pivetta
  fullname: Pivetta, Elisa Maria
– sequence: 2
  givenname: Daniela Satomi
  surname: Saito
  fullname: Saito, Daniela Satomi
– sequence: 3
  givenname: Carla
  surname: da Silva Flor
  fullname: da Silva Flor, Carla
– sequence: 4
  givenname: Vania Ribas
  surname: Ulbricht
  fullname: Ulbricht, Vania Ribas
– sequence: 5
  givenname: Tarcísio
  surname: Vanzin
  fullname: Vanzin, Tarcísio
BookMark eNo1UMtOwzAQNFAk2tIv4JIfMOx6Ez-OVVVeqsQBOFtO6hRDG6M4BfH3mAKn1c7MrmZmwkZd7DxjFwiXCKCujNKcOKHhoCow3Fh9xCaUgcOuj9kYJSInKs0Jm2X5P6fFiI2BQHCjSjpjs5ReAQBFqSukMbuf74e4c4NfF_Om8SmFOmzD8FUsP9x274YQu-IxtsOn633Rxr7I-hffDaE53Cy7j9DHbpeRdM5OW7dNfvY3p-z5evm0uOWrh5u7xXzFNyhBcykqQoVNXYIGI0RlnCEUsBamlEY7bCE71SBl9iNdDaqtGl8p0uTAuZamDH__pvc-dBvf2zrGt2QR7E9ZNqe3ZHN-eyjH5rLoG5i6WXY
ContentType Book Chapter
Copyright Springer International Publishing Switzerland 2014
Copyright_xml – notice: Springer International Publishing Switzerland 2014
DOI 10.1007/978-3-319-07509-9_8
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 3319075098
9783319075099
EISSN 1611-3349
Editor Antona, Margherita
Stephanidis, Constantine
Editor_xml – sequence: 1
  givenname: Constantine
  surname: Stephanidis
  fullname: Stephanidis, Constantine
  email: cs@ics.forth.gr
– sequence: 2
  givenname: Margherita
  surname: Antona
  fullname: Antona, Margherita
  email: antona@ics.forth.gr
EndPage 88
GroupedDBID -DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
ALMA_UNASSIGNED_HOLDINGS
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RIG
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-g1608-6253171cb408092259a93120d294698a1f07438066cce6ab07f5ce57383a0aaf3
ISBN 9783319075082
331907508X
ISSN 0302-9743
IngestDate Tue Jul 29 20:09:20 EDT 2025
IsPeerReviewed true
IsScholarly true
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-g1608-6253171cb408092259a93120d294698a1f07438066cce6ab07f5ce57383a0aaf3
PageCount 12
ParticipantIDs springer_books_10_1007_978_3_319_07509_9_8
PublicationCentury 2000
PublicationDate 2014
PublicationDateYYYYMMDD 2014-01-01
PublicationDate_xml – year: 2014
  text: 2014
PublicationDecade 2010
PublicationPlace Cham
PublicationPlace_xml – name: Cham
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSubtitle 8th International Conference, UAHCI 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings, Part IV
PublicationTitle Universal Access in Human-Computer Interaction. Design for All and Accessibility Practice
PublicationYear 2014
Publisher Springer International Publishing
Publisher_xml – name: Springer International Publishing
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Nierstrasz, Oscar
Steffen, Bernhard
Kittler, Josef
Weikum, Gerhard
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Kobsa, Alfred
Pandu Rangan, C.
Kanade, Takeo
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
– sequence: 5
  givenname: Alfred
  surname: Kobsa
  fullname: Kobsa, Alfred
– sequence: 6
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
– sequence: 7
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
– sequence: 8
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
– sequence: 9
  givenname: Oscar
  surname: Nierstrasz
  fullname: Nierstrasz, Oscar
– sequence: 10
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
– sequence: 11
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
– sequence: 12
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
– sequence: 13
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
– sequence: 14
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
SSID ssj0001248513
ssj0002792
Score 1.9356865
Snippet Web accessibility has been the subject of much discussion regarding the need to make Web content accessible to all people, regardless of their abilities or...
SourceID springer
SourceType Publisher
StartPage 77
SubjectTerms Automated evaluation tool
heuristic evaluation
usability
Subtitle A Heuristic Usability Evaluation
Title Automated Accessibility Evaluation Software for Authenticated Environments
URI http://link.springer.com/10.1007/978-3-319-07509-9_8
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3LbptAFB057qbqom_1LRZdFU0EZhgPiy6qiCiy0qiq4yg7NANDheQ4Uo0TtR_c7-i98-DhZpNukAUYhnvsO2cO90HIR81TcPuaUc1FRJmoIip5PaMRV7OSVUoxgQnOX8_4yYotLtPLyeTPIGpp16rD8vedeSX_gyrsA1wxS_YeyHYXhR3wGfCFLSAM2z3yO5ZZXcciE1KBJjZND1G5MJI89Z0arNxnMxcOwbNgrIYJK8SGnSiY2y_a-NhfrnRRj_Q3uH5ryWW-brYS83qazosvZWM6MLkkdRkuYfl-1fjDFexo1jcyPHaCwBHG1fqjq7UC_2tVgQuJiWHfG-XilHz09A4uJ5EPj0eZd-XJwyVMIbcYuWaeCUP1N61J6avCfJC_Zx0nFnTefj51r0zOrlsTiRZ2tnJObqiCxGxPBfEq6J6O2kt5o2VzAn4HqZIYKqsJTA2wuLLeVtvZgGONx8TWVHUe3jWdcVxB3DkLDQNPbJIY0DKaFeKAHMxFOiUPvuSL04uBFsiA-PYMAos62rdfdkiYk-SH7KpG9Y_QldKy1ZL37vjPC37Dm86fkEeYSxNgkgsY7CmZ6M0z8tjbPHA2f04WHdrBCO2gRzvwaAeAdjBCOxii_YKsjvPzoxPqunzQHzGPBIUFOHDYuFQMFi8ZTC-ZzJJ4FlWzDLubyrhGliuAGsP9uVTRvE5Lnc4TkchIyjp5Saab641-RYK5UrA8V7HOhGZxXUtelUDNSgmcX2mevCafvDEK_N9uC1-0GyxXJAVYrjCWK8Byb-5z8lvysP9VviPT9udOvwe22qoPDuy_ja2R4g
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Universal+Access+in+Human-Computer+Interaction.+Design+for+All+and+Accessibility+Practice&rft.au=Pivetta%2C+Elisa+Maria&rft.au=Saito%2C+Daniela+Satomi&rft.au=da+Silva+Flor%2C+Carla&rft.au=Ulbricht%2C+Vania+Ribas&rft.atitle=Automated+Accessibility+Evaluation+Software+for+Authenticated+Environments&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2014-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783319075082&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=77&rft.epage=88&rft_id=info:doi/10.1007%2F978-3-319-07509-9_8
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon