2015
DOI: 10.1561/9781680830354
|View full text |Cite
|
Sign up to set email alerts
|

Crowdsourcing Accessibility: Human-Powered Access Technologies

Abstract: People with disabilities have always engaged the people around them in order to circumvent inaccessible situations, allowing them to live more independently and get things done in their everyday lives. Increasing connectivity is allowing this approach to be extended to wherever and whenever it is needed. Technology can leverage this human work force to accomplish tasks beyond the capabilities of computers, increasing how accessible the world is for people with disabilities. This article outlines the growth of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

1
2
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 88 publications
1
2
0
Order By: Relevance
“…For example, some users thought they could not be hacked when the helper is trying to ind the page for them, not completing the task on their behalf. Such concerns align with prior work on crowdsourcing showing that while privacy concerns may hinder adoption [17], they can be mitigated by making users aware of how systems operate [39], which in our case could include statements such as łhelp is anonymousž or łthere's no direct connection between your computer and the helper's. ž Other solutions are ainity groups, (e.g., workplace [40], friends, family), which also came up in our study, and reputation systems [67].…”
Section: Long-term Intentssupporting
confidence: 65%
“…For example, some users thought they could not be hacked when the helper is trying to ind the page for them, not completing the task on their behalf. Such concerns align with prior work on crowdsourcing showing that while privacy concerns may hinder adoption [17], they can be mitigated by making users aware of how systems operate [39], which in our case could include statements such as łhelp is anonymousž or łthere's no direct connection between your computer and the helper's. ž Other solutions are ainity groups, (e.g., workplace [40], friends, family), which also came up in our study, and reputation systems [67].…”
Section: Long-term Intentssupporting
confidence: 65%
“…People with visual impairments have concerns about aural and visual eavesdropping in public when using screen readers and screen magnifiers, respectively [26][27][28][29]. Prior work also suggests that this user group may not notice privacy/security risks in their environment or inherent in the technology they use [30]. The use of accessible technologies can also draw unwanted attention and potential exploitation [31].…”
Section: People With Visual Impairmentsmentioning
confidence: 99%
“…Crowdsourcing accessibility refers to human-powered access technologies that leverage human workforce to accomplish tasks beyond the capabilities of computers (Brady and Bigham, 2015). Zyskowski et al (2015) studied the crowdworkers with disabilities via some interviews of 17 disabled crowdworkers and job coaches for people with disabilities and a survey of 631 adults with disabilites.…”
Section: Related Workmentioning
confidence: 99%