Page 180 - Handbook of Electronic Assistive Technology
P. 180
168 HANDBOOK OF ELECTRONIC ASSISTIVE TECHNOLOGY
11
(HouseMate: iOS and Android and Possum Qwayo: Android only), or WiFi (Steeper
12
13
EvoAssist: iOS only) , Alternatively via a wired connection, for example, the Grid Pad
(Windows only).
Using a computer-based device as opposed to the dedicated EC controller enables con-
trol over other functions:
• Computer-based functions such as the internet, emails and social media, e-book
readers, documents, spreadsheets, games, etc. are controllable using the same switch
input as that for EC, although the extent of control will vary dependent on the app and
operating system.
• Alternative means of access, other than conventional one or two switches, including
some of the computer access input methods (see Alternative Access to Computer
Technologies). This is again dependent on the operating system.
There is concern, however, over reliability of operation when using a ‘generic’ computer
as the platform for an ECS. Operating systems have improved over the years; however,
devices are vulnerable to viruses, hacking, scams and operating system updates. Some of
the controllers have built into them a priority function to enable the user to have access
to a single function in the event of the tablet or computer failing or suspending operation,
such as a call for assistance by the user activating the input means for a longer period.
Fifth Generation Utilising the ‘Internet of Things’
As technological developments continue, our digital world is becoming ever more con-
nected and integrated. It is anticipated that with the advent of 5G networks and the
‘Internet of Things’, hubs for home control will become commonplace, utilising a range
of standard communication protocols according to the appliance and control functions,
WiFi, Bluetooth, and Z-wave. Special access needs may become incorporated into the hub,
as has already occurred with speech recognition access to Amazon Echo, Apple and Google
Home devices. Other means of access may well become incorporated, such as gesture rec-
ognition. The role of specialist EC equipment and assessment services is likely to migrate
to assessing the suitability of the available standard methods and providing interfaces for
other specialist or customised access means as required for individuals.
However, at the time of writing there is concern over the vulnerabilities introduced by
utilisation of such ‘mainstream technologies’ for EC. This is due primarily to the reliance
of such systems on the internet for the means of user access (e.g., speech recognition), as
well as for system operation. As such, risks are introduced in terms of:
• Reliability of the internet connection, including localised WiFi transmission.
• Suitability of system operation for people who may have complex conditions (e.g., lack
of digital familiarity, memory or reasoning impairments).
11 http://housemate.ie/and http://possum.co.uk/.
12 http://rslsteeper.com/.
13 https://thinksmartbox.com/.