Identifying Trust Strategies in the Internet of Things FutureID Deliverable D22.7 Accessibility and Inclusion Requirements
2013 (English)Report (Refereed)
Users in the Internet of Things (IoT) use strategies to determine if they should trust a system or service. These strategies are not actively declared, but it can be useful to know which strategy is being used. We provide possible actions that users may perform when using different trust strategies and possible ways these can be captured for user studies. This document defines the accessibility and inclusion requirements to be taken into account when developing the different prototypes in the FutureID project. It also serves as a back- ground document in informing project partners about different aspects of accessibility when dealing with ICT. This includes looking at definitions, different types of users, assistive tech- nology, and other existing work in the field. Legal requirements, including storing of personal information for making systems accessible, are also covered. The document includes the accessibility and inclusion requirements for both developing and testing the client.
Place, publisher, year, edition, pages
Norwegian Computing Center Norsk Regnesentral , 2013.
Computer Science Human Computer Interaction
IdentifiersURN: urn:nbn:se:kau:diva-46751ISBN: 978-82-539-0538-9 (print)OAI: oai:DiVA.org:kau-46751DiVA: diva2:1037207