Investigating ATM System Accessibility for People with Visual Impairments
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 5
Abstract
The aim of this paper is to draw attention for the evaluation of the accessibility and usability of Automated Teller Machine (ATM) systems from the point of view of visually impaired persons. It suggests that there is a need for a more precise application of assistive technologies in order to develop user friendly ATMs that will aid effective accessibility without the requirement of assistance by ordinary people who may take advantage of their visual challenges and project them to all odds of insecurity for their cash. The paper suggests that, while ATMs, as opposed to across the counter services, are now a widely accepted means of easing long queues in the banks and as a time saving factor for the banking services to the consumers. An accepted feature of the ATMs is to incorporate assistive technologies which still remain a challenge even with the formative years of ATM applications. It proposes possible contexts that may benefit the visually impaired from far-reaching exploration and incorporation of relevant assistive technologies. The paper should be of interest to financial institutions whose passion is to render better services to their customers in this era of technology considering that there are those customers who wish to transact with them and even need privacy with the ATMs but cannot access such benefits because of their cognitive challenges and specifically the visually impaired. Finally the paper offers a snap-shot of some of the widely-used assistive technologies for the visually impaired when using ATMs and their associated procedures and potential pitfalls.
Authors and Affiliations
Okebiro Jared Omari 1
Privacy Preservation by Using AMDSRRC for Hiding Highly Sensitive Association Rule
Abstract: Researchers are needed for settling on the choice of information mining. In any case a few associations to help with some external counsellor for the procedure of information mining on the grounds that th...
Frequent Itemset-based Text Clustering Approach to Cluster Ranked Documents
Abstract: In most of the search engines documents are retrieved and ranked on the basis of relevance. They are not necessarily ranked on the basis of similarity between the query and the respective document. The ra...
Mining Of Influential Users in a Blog Network
Abstract: Blogging sites are very popular in today’s world; users interact with each other and create socialrelationships between them. Data mining methods can be used to extract the blogging sites. Users can be ac...
Implementation and Result Analysis of Polyalphabetic Approach to Caesar Cipher
Abstract: In the modern world as there is drastic hike in use of internet for our daily work there is need to keep our information safe and secure so that an intruder can’t misuse it. Cryptography was established t...
A Quantitative Measurement of Software Requirement Factors using Goal Question Metric (GQM) Approach
Abstract: Every application software that we propose to develop can be thought of a group or collection of related requirements specified by the user and these requirements are the foundation from which the quality...