16 research outputs found

    Estudio comparado sobre la regulación internacional de los criterios de elección de programación con medios de apoyo

    Get PDF
    La regulación sobre la inclusión de medios de apoyo (subtítulos, audiodescripción y lengua de signos) en medios de comunicación audiovisual normalmente responde a cuestiones sobre cuánta programación debe incluir estos medios de apoyo y cómo deben ser sus características técnicas y funcionales. Sin embargo, deja al arbitrio del prestador del servicio la elección de cuáles son los contenidos concretos a los que aplicar los medios de apoyo. El presente trabajo pretende definir una serie de criterios para escoger los programas a los que aplicar los medios de apoyo. Dada la indefinición legal existente en ese aspecto en España, se parte de la forma de resolver este problema en otros territorios, de donde se abstraen una serie de criterios comunes y se clasifican en categorías más generales

    Guidance for the development of accessibility evaluation tools following the Unified Software Development Process

    Get PDF
    Automated and semi-automated accessibility evaluation tools are key to streamline the process of accessibility assessment, and ultimately ensure that software products, contents, and services meet accessibility requirements. Different evaluation tools may better fit different needs and concerns, accounting for a variety of corporate and external policies, content types, invocation methods, deployment contexts, exploitation models, intended audiences and goals; and the specific overall process where they are introduced. This has led to the proliferation of many evaluation tools tailored to specific contexts. However, tool creators, who may be not familiar with the realm of accessibility and may be part of a larger project, lack any systematic guidance when facing the implementation of accessibility evaluation functionalities. Herein we present a systematic approach to the development of accessibility evaluation tools, leveraging the different artifacts and activities of a standardized development process model (the Unified Software Development Process), and providing templates of these artifacts tailored to accessibility evaluation tools. The work presented specially considers the work in progress in this area by the W3C/WAI Evaluation and Report Working Group (ERT WG

    A metamodel for privacy engineering methods

    Get PDF
    Engineering privacy in information systems requires systematic methods to capture and address privacy issues throughout the development process. However, the diversity of both privacy and engineering approaches, together with the specific context and scope of each project, have spawned a plethora of privacy engineering methods. Method engineering can help to cope with this landscape, as it allows describing existing methods in terms of a limited variety of method elements (and eventually enable their recombination into new, customized methods). This paper applies method engineering to introduce a privacy engineering metamodel, whose applicability is illustrated with a set of popular privacy engineering method elements, and a widely recognized privacy engineering method

    Guidelines for Accessibility to Microblogging: an Integral Approach

    Get PDF
    Microblogging is one of the most popular user-generated media, hence its accessibility has a large impact for users. However, the accessibility of this medium is poor in practice, due to the combination of bad practices by different agents ranging from the providers that host microblogging services to prosumers that post contents to them. Here we present an accessibility-oriented model of microblogging services, analyze the impact of its components, and propose guidelines for each of them to meet accessibility requirements. In particular, we base on an study we have performed on Twitter, one of the most-relevant microblogging platform, to identify good and bad practices in microblogging content generation regarding accessibility in microblogging content generation

    Modelado Semántico y Centrado en el Usuario de Servicios Adaptados al Contexto de Uso

    Get PDF
    Cuando los usuarios acceden a servicios telemáticos, esperan obtener experiencias cada vez más adaptadas a su contexto específico, en especial, ante la gran cantidad de contenidos en línea a su alcance a través de dichos servicios. Para que estos servicios proporcionen funcionalidades centradas en el usuario –por ejemplo, búsquedas relevantes, adaptación de contenidos, personalización y recomendación– es necesario que los contenidos estén anotados semánticamente y disponer de un modelo preciso que represente al usuario y su contexto de uso. En este escenario, presentamos un marco genérico de servicios centrados en el usuario basado en la caracterización semántica de los usuarios y su mapeo con los contenidos. En concreto, aplicamos dicho marco a un buscador semántico que caracteriza automáticamente tanto los contenidos a los que los usuarios pueden acceder como el contexto de uso desde el que se accede. La solución propuesta incluye modelos de usuario dinámicos y adaptativos, con información explícita e implícita; así como descriptores de los contenidos que pueden utilizarse para determinar cuáles son más adecuados para cada usuari

    Semantic Characterization of Context of Use and Contents for User-Centric Media Retrieval

    Get PDF
    When users access online media, they need and desire to get an experience tailored to their specific, personal context and situation. This is becoming more and more relevant with the ever-increasing amount of available contents users may choose from. In order to provide user-centric functionalities (such as relevant searches, content adaptation, customization and recommendation), both the annotation of contents with semantically rich metadata and an accurate model of the individual users and their respective contexts of use are needed. In this context, we propose a solution to automatically characterize both the context of use and the contents. It provides dynamic, adaptive user models, with explicit and implicit information; as well as content descriptors that may be later used to match the most suitable contents for each user. Users always keep a pivotal role throughout the whole process: providing new contents, contributing to moderated folks onomies, overseeing their own user model, etc

    Servicios Centrados en el Usuario Basados en la Caracterización Semántica de los Contenidos y del Contexto de Uso.

    Get PDF
    Cuando los usuarios acceden a servicios telemáticos, esperan obtener experiencias cada vez más adaptadas a su contexto y situación específicos. Esto adquiere especial relevancia al aumentar la cantidad de contenidos en línea al alcance de los usuarios a través de dichos servicios. Con el fin de que los servicios telemáticos proporcionen funcionalidades centradas en el usuario –como, por ejemplo, búsquedas relevantes, adaptación de contenidos, personalización y recomendación– es necesario que los contenidos estén correctamente anotados (enriquecidos con metadatos semánticos) y disponer de un modelo preciso que represente al usuario junto con su respectivo contexto de uso. En este escenario, presentamos un marco genérico de servicios centrados en el usuario a partir de su caracterización semántica y del mapeo a los contenidos. En concreto, aplicamos dicho marco a un buscador semántico que caracteriza automáticamente tanto los contenidos a los que los usuarios pueden acceder como el contexto de uso desde el que acceden. La solución propuesta incluye, pues, modelos de usuario dinámicos y adaptativos, con información explícita e implícita; así como descriptores de los contenidos que pueden utilizarse para determinar cuáles son más adecuados para cada usuario. Durante todo este proceso, los usuarios mantienen un rol fundamental: proveyendo nuevos contenidos, contribuyendo a folksonomías moderadas, supervisando su propio modelo de usuario, etc

    Engineering privacy requirements valuable lessons from another realm

    Get PDF
    The Privacy by Design approach to systems engineering introduces privacy requirements in the early stages of development, instead of patching up a built system afterwards. However, 'vague', 'disconnected from technology', or 'aspirational' are some terms employed nowadays to refer to the privacy principles which must lead the development process. Although privacy has become a first-class citizen in the realm of non-functional requirements and some methodological frameworks help developers by providing design guidance, software engineers often miss a solid reference detailing which specific, technical requirements they must abide by, and a systematic methodology to follow. In this position paper, we look into a domain that has already successfully tackled these problems -web accessibility-, and propose translating their findings into the realm of privacy requirements engineering, analyzing as well the gaps not yet covered by current privacy initiatives

    A user-centric approach to service creation and delivery over next generation networks

    Get PDF
    Next Generation Networks (NGN) provide Telecommunications operators with the possibility to share their resources and infrastructure, facilitate the interoperability with other networks, and simplify and unify the management, operation and maintenance of service offerings, thus enabling the fast and cost-effective creation of new personal, broadband ubiquitous services. Unfortunately, service creation over NGN is far from the success of service creation in the Web, especially when it comes to Web 2.0. This paper presents a novel approach to service creation and delivery, with a platform that opens to non-technically skilled users the possibility to create, manage and share their own convergent (NGN-based and Web-based) services. To this end, the business approach to user-generated services is analyzed and the technological bases supporting the proposal are explained

    Quantitative assessment and comparison of cloud service providers' privacy practices

    Full text link
    The economic and technical advantages of cloud computing are widely recognized by the industry. However, the lack of knowledge on the privacy features offered by cloud service providers remains as one of the barriers for the adoption of cloud services. In this paper we describe a mechanism for the quantitative assessment of the privacy practices of different cloud service providers, so that cloud service clients can compare among them and choose the one that better fits their needs. Our contributions have been validated in three different scenarios
    corecore