Physical securityPhysical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons and property.
Distributed ledgerA distributed ledger (also called a shared ledger or distributed ledger technology or DLT) is the consensus of replicated, shared, and synchronized digital data that is geographically spread (distributed) across many sites, countries, or institutions. In contrast to a centralized database, a distributed ledger does not require a central administrator, and consequently does not have a single (central) point-of-failure.
Collaborative e-democracyCollaborative e-democracy refers to a hybrid democratic model combining elements of direct democracy, representative democracy, and e-democracy (or the incorporation of ICTs into democratic processes). This concept, first introduced at international academic conferences in 2009, offers a pathway for citizens to directly or indirectly engage in policymaking. Steven Brams and Peter Fishburn describe it as an "innovative way to engage citizens in the democratic process," that potentially makes government "more transparent, accountable, and responsive to the needs of the people.
Public participationPublic participation, also known as citizen participation or patient and public involvement, is the inclusion of the public in the activities of any organization or project. Public participation is similar to but more inclusive than stakeholder engagement. Generally public participation seeks and facilitates the involvement of those potentially affected by or interested in a decision. This can be in relation to individuals, governments, institutions, companies or any other entities that affect public interests.
Identity managementIdentity management (IdM), also known as identity and access management (IAM or IdAM), is a framework of policies and technologies to ensure that the right users (that are part of the ecosystem connected to or within an enterprise) have the appropriate access to technology resources. IdM systems fall under the overarching umbrellas of IT security and data management. Identity and access management systems not only identify, authenticate, and control access for individuals who will be utilizing IT resources but also the hardware and applications employees need to access.
Online participationOnline participation is used to describe the interaction between users and online communities on the web. Online communities often involve members to provide content to the website and/or contribute in some way. Examples of such include wikis, blogs, online multiplayer games, and other types of social platforms. Online participation is currently a heavily researched field. It provides insight into fields such as web design, online marketing, crowdsourcing, and many areas of psychology.
Opinion pollAn opinion poll, often simply referred to as a survey or a poll (although strictly a poll is an actual election), is a human research survey of public opinion from a particular sample. Opinion polls are usually designed to represent the opinions of a population by conducting a series of questions and then extrapolating generalities in ratio or within confidence intervals. A person who conducts polls is referred to as a pollster.
Identity documentAn identity document (also called ID or colloquially as papers) is any document that may be used to prove a person's identity. If issued in a small, standard credit card size form, it is usually called an identity card (IC, ID card, citizen card), or passport card. Some countries issue formal identity documents, as national identification cards that may be compulsory or non-compulsory, while others may require identity verification using regional identification or informal documents.
Voting methods in deliberative assembliesDeliberative assemblies – bodies that use parliamentary procedure to arrive at decisions – use several methods of voting on motions (formal proposal by members of a deliberative assembly that the assembly take certain action). The regular methods of voting in such bodies are a voice vote, a rising vote, and a show of hands. Additional forms of voting include a recorded vote and balloting. Voice voteRobert's Rules of Order Newly Revised (RONR) states that a voice vote (viva voce) is the usual method of voting on any motion that does not require more than a majority vote for its adoption.
Digital citizenThe term digital citizen is used with different meanings. According to the definition provided by Karen Mossberger, one of the authors of Digital Citizenship: The Internet, Society, and Participation, digital citizens are "those who use the internet regularly and effectively." In this sense a digital citizen is a person using information technology (IT) in order to engage in society, politics, and government.