Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Education

The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan Jul 2022

The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan

Distance Learning Faculty & Staff Books

The message design and human performance technology in video games, especially early video games have always been fascinating to me. From an instructional design perspective, the capabilities of the technology of the classic game consoles required a careful balance of achievable objectives, cognitive task analysis, guided problem solving, and message design. Raiders on the Atari is an excellent example of this balance. It is an epic adventure game, spanning 13+ distinct areas, with an inventory of items, where those hard to find items had to be used by the player to solve problems during their quest (and who would have …


Protecting Blind Screen-Reader Users From Deceptive Content, Ash Dobrenen, Vikas Ashok (Mentor) Jan 2022

Protecting Blind Screen-Reader Users From Deceptive Content, Ash Dobrenen, Vikas Ashok (Mentor)

Computer & Information Science: Research Experiences for Undergraduates in Disinformation Detection and Analytics

Visually impaired people who want to use a computer rely on screen readers to independently do this. This research focuses on beginning to build a chrome extension in order to help users more safely navigate the internet using a screen reader. to begin collecting the data, a screen reader was used to help determine items in the website that might take the user somewhere they did not mean to go since the link or image was not sufficiently able to be described by the screen reader. Next, those items were tagged with ’data-attribute=”deceptive”’. After, those data-attributes were extracted and tagged …