layout | title | permalink |
---|---|---|
sidebar-page |
Civic Empowerment |
civic-engagment/civic-empowerment |
Citizens who collaborate in the development of smart cities can gain control over their data and how it is used. In smart cities, real-time data exchange between citizens and governments allow citizens to participate in decisions about their city. This also allows for a flexible approach that takes into account the changes that a particular municipality may experience over time.
Improving access to decision makers may empower citizens in participating in government decisions. Ordinarily, a resident would have to take active steps, such as attending townhall meetings, to voice issues on top of their regular roles in their community. Townhall meetings occur in particular locations, at specific times, and are only accessible to a select few, with the result that anyone who is unable to attend townhall is unable to voice their concerns. As a result, the townhall may be a misrepresentation of the residents in the municipality.
Improving access to townhall meetings is one way that smart cities can boost civic engagement. While physical attendance may not be possible, smart city tools may allow virtual participation to balance out representation in townhall.
- Recording in-person meetings. Audio or video recordings may be hosted on the municipality’s website so residents who cannot attend in-person town halls may still be appraised of issues and discussions.
- Soliciting Agendas Online. Allowing for community input into town hall agendas before they are held ensures that they address topical subjects relevant to community interests.
- Livestreaming meetings with live chat. Members who are unable to commute to meetings can participate in townhall activities through virtual participation. Text-based input may be advisable to prevent issues of latency – in-person representatives may monitor chats to ensure questions are answered and issues are raised.
- Mobile kiosks. Placing townhall kiosks in areas with lower resident participation may provide unrepresented residents with an opportunity to voice their concerns.
- Social media outreach. A large number of municipal residents already engage with social media on a regular basis. Hosting town hall discussions on social media apps can allow for greater participation in municipal decisions from demographics such as young adults.
Privacy
Issues. When participating in townhall meetings, it is essential to identify the resident as well as their opinion. However, this can create difficulties for residents who wish to remain anonymous. On the other hand, anonymous comments prevent verification of resident status.
Managing Issues.
- De-identify at the source. Many tools allow for engagement without collecting personal information. Doing so at the source helps prevent privacy issues from cropping up later.
- De-identify as soon as possible. If personal information absolutely must be collected, it should be stripped away as soon as possible. While the municipality may require identifying information to verify resident status, residents should still be able to post questions anonymously.
Disproportionate Representation
Issues. Selecting a time for everyone to participate in townhall as well as unreliable access to internet can create disproportionate representation during townhall meetings.
Managing Issues.
- Free municipal WIFI will assist individuals lacking access to reliable internet.
- Holding virtual office hours. Residents unable to attend townhall meetings may participate during office hours so their voices are taken into account.
Voting demographics show that only a subset of residents end up voting. This can be an issue as individuals who are unable to travel to vote are unable to represent their voices. Smart city tools can encourage residents to exercise their democratic right to vote on variety of municipal issues and candidates regardless of whether they can physically access polls.
- Online voting portals can involve residents in everyday municipal decisions from anywhere.
- Engage in campaigns. Campaigns on social media and municipal websites to encourage voting can raise awareness among youth demographics.
- Send voting reminders. Automated text messages can be sent to cell phone users with certain area codes to remind them to vote.
- Rideshare applications. Providing transit for residents who do not have access to a voting centre can encourage residents from voting.
Digital literacy as a prerequisite for voting
Issues. In order to navigate an online voting system, residents will require some level of digital literacy. Due to lack of digital literacy or mistrust of technology, some residents may be discouraged from voting.
Managing Issues
- Texting Voting Instructions. Residents should receive information on how to vote online prior to election day.
- Keeping Alternative Forms of Voting Open. Residents who do not wish to participate in online voting should still have to option to vote in person.
Privacy
Issues. Online voting systems often collect personal information of the voter as well as information on who they voted for.
Managing Issues.
- Don’t track. If it is unnecessary to track voters’ personal information, then the municipality should employ tools that don’t associate individuals with content.
- De-identify as soon as possible. If personal information absolutely must be collected, it should be stripped away as soon as possible.
- Use non-identifying information as password to voting. Create a secure password on the resident’s voting card limiting the use of identifying information during the actual vote.
- Follow good privacy practices.
Voter Fraud
Issues. If the online voting system is compromised or hacked, votes may be changed or destroyed compromising the integrity of the election.
Managing Issues.
- Blockchain voting. Decentralized voting systems where a vote is permanently recorded on blockchain can create a secure online voting system.
- Facial and Voice Recognition Voter Confirmation. Using a camera and microphone to verify the resident’s identity via facial recognition and voice recognition technology can prevent voter fraud.
Hacking is creative problem solving. Hackathons, also called codefests or hackfests, are design marathons in which affected citizens, software developers, graphic designers, project managers and others come together for a short period of time to work intensively on a software project designed to meet a particular civic need. The goal of hackathons is usually to produce a functioning software application by the end of the event. Hackathons can engage the public in helping the government solve citizens’ problems. The best have educational workshops running in parallel. Well organized hackathons can strengthen community bonds by welcoming newcomers, providing an opportunity for participants to learn something new about problems they are interested in, and encouraging civic engagement and cooperation.
Hackathon Best Practices
- Clearly articulated. Projects should have a clear question or problem they are trying to tackle and a reasonably specific proposed solution.
- Attainable. Most projects will likely accomplish less than imagined in the limited time they have. Project goals should be managed so that participants are able to feel sucessful at the end of the session.
- Incorporating newcomers. Projects should have ready-to-go tasks for newcomers with a variety of skills and at a variety of skill levels. For coding projects, these tasks cannot require an intimate understanding of the code base.
- Small groups of subject matter experts and other participants working together. Hackathons provide a unique opportunity to bring citizen concerns to the coding and tech community. Multiple small mini-project groups of 4-8 participants should be comprised of a mix of subject matter experts and other participants.
- Training and education. Educational workshops running in parallel to small group projects can help bridge the divide between coders and other citizens, as well as spreading technological fluency to the wider community.
- Project leaders. Each small group should be headed by a subject matter expert. A subject matter expert guides a project to real-world application.
- Organized. The project leader’s role should be to coordinate, ensuring each team member has something to work on and helping to welcome new team members.
- Open data. Successful hackathons require a generous supply of open data available to coders.
- Follow up. One of the ultimate goals of the hackathon should be to create a community around the developed application that endures, post-hackathon: users of course, but also support for the technical needs of the app (security, data, hosting on a site, etc).
- Venue/Technical. An appropriate venue must provide: proper seating, one power strip per table, fast and reliable wifi, a space for presentations including projector and microphone, accessible entrances and wheelchair-friendly seating space, and accessible bathrooms.
Privacy
Issues.
- Registration data will often contain personal information
- Privacy issues may also arise with respect to the application developed, as such applications often collect user data for both analytic and personalization purposes.
Managing Issues.
- De-identify as soon as possible. If personal information absolutely must be collected, it should be stripped away as soon as possible.
- Limit data collection to only that which is needed. Collection strategies such as bicycle numbers and heat maps rather than individual-specific routes avoid engaging more serious privacy concerns.
- Ensure that partners or contractors follow collection restrictions. When purchasing data from private companies, ensure that they are upholding their own privacy obligations under relevant legislation.
- Follow good privacy practices.
Intellectual Property Issues
Issues.
- Legal authorship of apps will lie with their authors, as these authors are not employees of the municipality.
- As such, allocating liability resulting from use of the app in question could be contentious.
- Data partnerships between public entities and private companies raise complex issues of who owns the data that results from them.
Managing Issues
- Contractual licensing or assigning of copyright of the hackathon-produced app and resulting data to the municipality if the municipality is not the sole producer or analyzer of the data.
- Licensing of the technology if it is patentable.
- Licensing if use of a trademarked technology is necessary.
- Warranties and representations of ownership and/or non-infringement to avoid future disagreements.
- Contractually allocating liability arising from app use to either the municipality, the author or the user.
- See also: intellectual property issues.
Hackathon Resources
- Joshua Tauberer, “How to Run a Successful Hackathon” (Creative Commons License, 2014); online: https://hackathon.guide.
- An often-cited and accessible how-to guide for running inclusive, civic-minded hackathons. Some of the advice applies to event-planning more generally and seems geared toward first-time event hosts; e.g. the venue must have sufficient bathroom facilities; if providing food, accommodate a range of dietary restrictions, etc. The hackathon-specific advice, however, is precise, practical and grounded in real-world experience.
- Major League Hacking, “Hackathon Organizer Guide” (Creative Commons License, ); online: https://guide.mlh.io.
- Major League Hacking’s “Organizer Guide” consists of a series of articles for organizers to consult in the months leading up to the event. Article subject range from “Build a Killer Leadership Team” to “Setup a Placeholder Website” to “Keep Hackers Motivated”.
- “Do Better At Conference Diversity” (Open Source Creative Commons License); online: http://conference.hopper.org.nz.
- A New Zealand-based, open source guide to promoting greater diversity at conferences and hackathons. A practical guide that provides advice on speaker selection, t-shirt design, accessibility, and team diversity training, among many other topics.
- Carefully review intellectual property issues.
- Follow good privacy practices.
- Follow good security practices.