WebAIM - Web Accessibility In Mind

E-mail List Archives

Re: More data on accesskeys (New article written Nov. 1)

for

From: Phil Teare
Date: Nov 3, 2006 3:40AM


Yes, thanks guys.

I kind of expected as much, but as I 1) haven't seen any stats and 2) sit
alone in my darkened room, never getting to actually watch real live people
useing my stuff (or very rarely), I wasn't sure.

Pretty convinced now the @role = good, access keys= not much use.

Cheers
Phil
www.talklets.com




On 03/11/06, Joshue O Connor < <EMAIL REMOVED> > wrote:
>
> Thanks for that Alastair.
>
> All the best
>
> Josh
>
> Alastair Campbell wrote:
> > Josh wrote:
> >> At the risk of upsetting a hornets nest here, can you please point to
> >> any resources which indicate exactly what UA key combinations are
> > mostly
> >> effected by user defined access keys?
> >
> > There's a list of browser, OS & access technology keys here:
> > http://www.wats.ca/show.php?contentid=43
> >
> > Colin wrote:
> >> I would be curious to read about any user or users who either use the
> >> feature or who have tried and found it unhelpful.
> >
> > There are some, you might find such a reply in the WAI-IG archive
> > somewhere, but it is rare.
> >
> > When testing client sites with a variety of people with different
> > abilities and access technologies, I've not found one who spontaneously
> > used accesskeys when they were available.
> >
> > When asked after the tasks if they noticed the accesskeys or used them
> > on other sites, replies varied between "what accesskeys", "what are
> > accesskeys", and "yes, but I've never used them". Given the poor
> > implementations both in browsers and in sites (e.g. one that gave
> > 'helpful' hidden text that spelt them phonetically, but then they didn't
> > work anyway), those type of results are hardly surprising.
> >
> > I'd love to make this sort of data available, but 1) It's confidential
> > to each client, and 2) we asked out of curiosity, the tasks were to find
> > or use things on the site. Accesskeys were not the focus, which I guess
> > is quite realistic!
> >
> > I can see good uses for often used applications (e.g. intranet apps or
> > webmail clients), but they would still have to be user defined. For
> > general sites, the @role style methods are the way forward.
> >
> > Kind regards,
> >
> > -Alastair
> >
>
>
> ********************************************************************
>
> NOTICE: The information contained in this email and any attachments
> is confidential and may be privileged. If you are not the intended
> recipient you should not use, disclose, distribute or copy any of
> the content of it or of any attachment; you are requested to notify
> the sender immediately of your receipt of the email and then to
> delete it and any attachments from your system.
>
> NCBI endeavours to ensure that emails and any attachments generated
> by its staff are free from viruses or other contaminants. However,
> it cannot accept any responsibility for any such which are
> transmitted. We therefore recommend you scan all attachments.
>
> Please note that the statements and views expressed in this email
> and any attachments are those of the author and do not necessarily
> represent the views of NCBI
>
>
> ********************************************************************
>
>
>
>
>
>