spinofflive
Illustrations: Ezra Whittaker
Illustrations: Ezra Whittaker

PartnersNovember 22, 2021

The big questions that will help create a better public transport system

Illustrations: Ezra Whittaker
Illustrations: Ezra Whittaker

New Zealand’s public transport systems require a major update, but any conversation on what’s needed has to consider equity as much as the environment.

This content was created in paid partnership with WSP New Zealand.

The argument for using public transport is simple – when it’s quick, affordable, safe and reliable. In this world, the start and end points of each trip would be close to the bus stop or train station, or have adequate cycleways and footpaths servicing them. Those stops and stations would be well-lit and have clear signage – with audio announcements for those unable to read the timetables – and they’d be serviced often. There would be secure bike parking at each point, serviced by cycleways safe from swinging car doors and wide enough to hold both the speedy e-bike commuter and the parent pulling two kids in a trailer.

But the reality of New Zealand’s public transport is far from this idyll. In our main centres, services cater mainly to those heading to and from the city at either end of their nine-to-five jobs. Footpaths are often designed as an afterthought to the roads they border, not quite wide enough to pass others on – especially when trying to social distance – and while the number of cycleways is increasing, there is still work to be done on their public reputation.

The issues with our transport systems across New Zealand are broad, and when layered with our need to decarbonise transport in order to reach our goal of net-zero emissions by 2050, there’s an urgency to fixing these issues too.

Holly Walker, WSP fellow at the Helen Clark Foundation, says there is no way to reach that 2050 goal without some serious behavioural change.

“To have any chance of meeting our target, we have to address emissions from private vehicles. And the only way to do that is for people to drive less in the future. There’s no two ways about it.”

For Walker, though, there’s little use in trying to convince private car users to opt instead for the bus or train without also pushing for significant changes in our transport system. She’s clear that we need to reduce our reliance on private transport, but believes for that to happen we first need better alternatives in place.

“We have to change the way our transport infrastructure is configured to make it the easiest, most practical, most appealing, most convenient transport option – and to make driving less appealing.”

Those changes include more than just increased frequency or additional transport options. According to Roger Burra, technical principal for transport planning and advisory at WSP, accessibility needs to be top of the list when planning public transport – and that means more than just lowering the front of the bus for those who can’t make the step. He says there are three main aspects within “accessibility”.

The first is spatial proximity – how close you are to the things you need to access. The second relates to mobility – how far you have to walk to get to public transport, how many different roads the bus services or rail lines go to, and the accessibility of people with different needs. Finally, Burra says digital access is important in helping people access what they need, when they need it. Whether that be up-to-date information on scheduling, or online appointments that mean people don’t have to travel in the first place, digital accessibility can change people’s relationships with travel.

“Accessibility is the combination of those three aspects. If you make a really big change to the transport system it will actually impact the shape of the city and where people live. It’s not a static environment.”

Illustrations: Ezra Whittaker

Vivienne Ivory is the technical principal of social science resilience public health at WSP. She says there are many demographics who find themselves disadvantaged by the current public transport system – often in non-obvious ways – and for whom accessibility needs to be designed. 

“If you don’t feel safe or it’s not possible or practical or it’s too expensive, then that decreases the accessibility of public transport for particular parts of society.”

Some of the real conditions impacting accessibility seem almost mundane, but speak to ingrained societal mores. Giving an everyday example, Ivory points to the enduring expectation that women assume the lion’s share of domestic labour, even in multiple-income households.

“Women tend to be more responsible for household-level things, so they tend to do more trip-chaining, where you don’t just go to and from work, you do things along the way. That’s been a traditional pattern and it’s still fairly dominant and means their transport needs are complicated.” 

Walker says Māori are also far more likely to be disadvantaged by current transport systems, and that this can be traced back to ongoing effects of colonisation. Māori are more likely to live in lower-income households, meaning the cost of transport is more likely to be a barrier, and also have higher rates of disability than other ethnic groups. 

“International research about indigenous populations in many countries indicates that indigenous groups tend not to benefit equitably from the way that public transport systems have developed. They don’t experience the same level of mobility as wider populations.”

So how do we begin to tackle the issues that are making our transport system inaccessible for so many groups of people? It’s about consultation and discussion, and not just with the loudest voices.

For Ivory, that planning involves speaking to real communities about how they use the transport systems around them. Asking the people who live and work in the area what they think about their transport options helps to paint a clear picture of what’s working and what’s not. 

“If we find that actually the cyclists or the bus users do feel really unsafe in this place and they would love to take another route instead, then you can start to shape a conversation about mobility rather than parking. I think when we’re looking at these big changes that are going on, the resistance is because we’re not having those conversations.”

Burra says that resistance often comes from people who aren’t looking at the long-term developments that new infrastructure will cater for.

“They think ‘I’ve only ever seen two cyclists down this road, why are we designing cycleways for two cyclists?’ They don’t recognise that in the future there could be twice as many people living in a particular area or consider other things that might change the dynamic.”

Illustrations: Ezra Whittaker

The sustainable transport pyramid illustrates the optimal shares of each mode of transport, with walking, wheeling and cycling coming ahead of public transport like buses and trains. Walker says we need to make sure governments aren’t just focusing on public transport vehicles as we aim to reach zero emissions, but investing in infrastructure to make emission-free transport more viable for everyone. 

“Those are the modes that have the biggest impacts on our emissions reductions and on equity as well, because they have real health and wellbeing benefits.

“We also need to think about designing a public transport system that provides a genuine alternative to driving. One that is just as convenient, just as practical, that is serving the routes that people need. And it needs to be not just for the people who are currently using public transport, but the people who are shut out.”

For Walker, creating an equitable transport system can happen at the same time as making efforts to decarbonise. 

“People talk about a just transition for climate change. That’s things like upholding the Treaty of Waitangi and working in partnership with Māori, making sure there’s representation from disadvantaged groups and communities on the governance and decision making bodies that decide what our transport systems look like. It’s co-designing the solutions with the affected communities.”

Private car ownership being the only easily viable transport option in some areas can further disadvantage those in low-income households. Concepts like forced car ownership – where cars are “forced” on people because no alternative transport is available – illustrate the need for equitable transport systems that better service our disadvantaged communities. By creating these systems, decarbonisation will happen far more organically.

Illustrations: Ezra Whittaker

Part of the future transport system also needs to take into account the changing shape of communities. The 20-minute city model, where all essential services can be accessed within a short trip from home, would change how people interact with their environment. According to Ivory, implementing that model more deliberately and widely will help to drive down the number of cars on the road. 

“New Zealand research showed us that people living in neighbourhoods with a denser number of destinations walked more by quite a margin, compared to places like the cul de sac neighbourhoods where there’s barely a dairy.”

People are shaped as much by the transport systems around them as the transport is shaped by people. Burra says that if we make the effort to create a transport system that makes it easy to leave the car at home, in time people will use it.

“We are a product of our environment, of the transport systems that were given to us, of the cycle networks and footpaths and buses we’ve got and individuals will choose to use those if they work, so if as a society we want people to travel like that, we should plan for it.”

To read the full Te Ara Matatika: The Fair Path report, click here for a free PDF download.

Keep going!
Cyber criminals don’t discriminate, and anyone is open to being a potential target (Illustration: Joseph Carrington)
Cyber criminals don’t discriminate, and anyone is open to being a potential target (Illustration: Joseph Carrington)

PartnersNovember 18, 2021

Six steps to protect yourself online

Cyber criminals don’t discriminate, and anyone is open to being a potential target (Illustration: Joseph Carrington)
Cyber criminals don’t discriminate, and anyone is open to being a potential target (Illustration: Joseph Carrington)

Our increasingly digital existence has seen a surge in cyber attacks and internet fraud. Jihee Junn collected some tips from the experts on how to keep your online life secure from scams. 

This content was created in paid partnership with Vodafone. 

For most of us stuck at home amid a global pandemic, Covid-19 has meant moving almost every aspect of our lives online. We now work online, shop online, even celebrate birthdays and Friday drinks online. Without the internet, our lives under lockdown would’ve no doubt been a whole lot different.

The downside: it also meant more people than ever are out there trying to steal our data and private information via targetted attacks and online fraud. According to the government’s cybersecurity agency Cert NZ, more than 4,700 cyber attacks were reported in 2019. In 2020, that number had jumped to more than 7,800 reported incidents – a whopping 65% increase. 

“So much of our lives are conducted online now that there’s just a bigger surface for attackers to go after,” says Nadia Yousef, threat and incident response manager at Cert NZ. “We’re just so reliant on it as a way to conduct our day-to-day lives now that attackers have really taken advantage of that.” 

Most recently, that’s come in the form of Flubot, a malicious text scam which hit headlines last month. In messages pretending to be parcel delivery updates, or an alert about a new voicemail or photo album, Flubot attempts to trick Android users into clicking a link and downloading an app in order to steal your banking and credit card information. Within a couple of days in September, Cert NZ said more than 30,000 people had reported receiving the texts, a number it deemed just “the tip of the iceberg”.

Cyber attacks and online scams show no sign of slowing down with new, more sophisticated methods emerging every day. Laura Ross, head of cyber security strategy and architecture at Vodafone, spends most of her time working on ways to minimise the risk of cybersecurity breaches both within Vodafone and for its customers. That means scanning regularly for threats, testing for vulnerabilities and weaknesses, and monitoring what’s out there on the dark web in an attempt to stay one step ahead. 

“We have a number of security controls that we like to see in all our products and services,” says Ross. “For example, ensuring sensitive data is encrypted and making sure all our systems are logging to our centralised platform to provide a holistic view of activity and enables  our cybersecurity team to  proactively identify unusual activity or threats and react to them as quickly as possible.”

However, there’s only so much cyber security experts can do to keep people safe online. Users also need to stay vigilant and take steps to protect themselves, says Ross, with the most important steps also some of the most simple ones you can take. Because while cyber attacks are a real and serious threat, they’re also one we’re capable of managing ourselves. 

Two step authentication is always worth the effort (Illustration: Joseph Carrington)

Step one: Passwords

It might seem obvious, but having long, strong, unique passwords for all your accounts is the easiest and most important thing you can do. Millions of passwords are published on the dark web every year, compromising your accounts and potentially exposing personal information that could be used for anything from identity theft to serious fraud. 

A simple way to check if an account’s been compromised is through the website Have I Been Pwned, a free resource that lets you check if an email or phone number has been put at risk. Another useful resource for Google users is to use Password Checkup which will assess the security of any passwords saved to your Google account. 

If you find an account of yours has been compromised, your first priority should be to update your password, especially if it’s one you’ve used for multiple accounts. Given that “123456” is still the most common password in the world, it’s worth emphasising the importance of avoiding common words (“password”), phrases (“iloveyou”) and character combinations (“qwerty”), as well as things like names (including nicknames, pet names, or street names) and dates (such as a birthday or anniversary). 

Instead, Ross recommends creating a unique password or “passphrase” for each of your logins. Made up of three or four random words. Some websites still require complex passwords, in this case ensure your password is no shorter than eight characters, with at least one lowercase letter, one uppercase letter, one number and four symbols (but not &%#@_) recommended. That’s a lot of complex passwords to memorise, which is why she also recommends using a trusted password manager such as LastPass, 1Password, Bitwarden or Dashlane which will create and store passwords for you. To access these, you only have to remember one “master password” which should be as long, strong and distinctive as possible, with two-factor authentication enabled for an extra layer of security.

Step two: Two-factor authentication

Even the best passwords can fall victim to the most ardent hackers which is why two-factor authentication (2FA) is your next best line of defence. 

To access an account protected by 2FA, you not only need a password but also a second form of authentication. This could be in the form of answering a series of security questions whose answers only you know, entering a one-time code sent to you via email or text, using a biometric identifier such as your face or a fingerprint, or through an app such as Google or Microsoft Authenticator. This means that even if someone does uncover your password, without having that second form of authentication, they won’t be able to access your account. 

“It sounds really simplistic, but having good passwords across all of your accounts and having two-factor authentication will get in front of most of the incidents we see reported to Cert,” says Yousef. “If people can spend just a couple of hours at home really focusing on sorting out their passwords and setting up two-factor authentication across banking, email and social media, they’ll be in a much stronger position and be much less susceptible to attacks.”

Step three: Security updates

When an app or software asks you to install an update, there’s usually a very good reason for it. Developers often publish updates with security patches and improvements, and ignoring them can leave you vulnerable to attackers looking to gain access to your device and information. For apps, this can be as easy as turning on auto-updates in your Google Play or Apple store, while any updates to operating systems such as Android, iOS or Windows should be installed as soon as possible, however annoying it might be to have to restart your device. 

If you can’t update immediately, try to at least schedule updates to go ahead overnight. And if you’re hesitant to shut down and lose those several dozen tabs you might have on Google Chrome at any one time, rest assured that “ctrl+shift+T” (or “command+shift+T” for Mac) will quickly restore all your tabs from your previous session. Otherwise, choosing the option to “continue where you left off” in your Chrome’s startup settings will also do the trick. 

“With people working from home, we really encourage people to reboot their computers daily,” says Ross. “We always recommend our users to shut down every night because not only does it give the laptop a rest and stops it overheating, but also once you restart it’ll update any pending security patches.”

Always update your devices. It’s for your own safety (Illustration: Joseph Carrington)

Step four: Antivirus protection

Antivirus software is one of the easiest things you can have on your device in the fight against malicious attacks. These tools will scan your devices for viruses, malware, and other cyber threats, and if it detects anything malicious, it will quarantine and remove the threat in real time. 

There are dozens of trusted and proven options out there for home users to download, even if you’re only able to use the version that’s free. If you can afford to pay for the premium version, however, having full protection can be well worth the subscription. 

It’s important though to only run one antivirus software on your device at a time in combination with a firewall which will actively screen what traffic is allowed to enter your device (if you’re not sure if you have a firewall, note that both Windows and Mac OS X systems have firewalls built in). 

Step five: Back ups

Backing up your device doesn’t just come in handy in the event of you losing your phone or laptop – it also comes in handy if you ever end up losing access to your device from a cyber security breach. Online backup services like IDrive and Acronis will store your backups on the cloud meaning you can access them anywhere at any time. For an extra layer of protection (or if you’d rather keep your backups in a physical location), using an external hard drive should also do the trick. 

“Backups are important, particularly against ransomware,” says Ross. “Even from a home user perspective, there have been quite a few ransomware attacks where an attacker has locked their device and held their data to ransom. But if you’ve got an online backup on one of the cloud storage companies, for example, and you are confident your backup doesn’t include the ransomware, you can get around the ransom request by restoring your device from your last good backup.”

Cyber criminals don’t discriminate (Illustration: Joseph Carrington)

Step six: Stay vigilant

Cyber criminals don’t discriminate, and anyone is open to being a potential target. Even the most tech savvy among us fall for increasingly sophisticated scams, and thinking that “it will never happen to me” can often be the first step down a very dangerous, slippery slope. 

If you receive something online that looks suspicious, there are plenty of things you can do to verify whether you’ve been sent something that’s legitimate or a scam. For example, if you get an email from Facebook insisting you need to update your details, don’t click on any links yet. Instead, look carefully at the email’s wording and check if it’s coming from an official account. If you’re still not sure, go straight to the source: log in to your account on the Facebook website or app to see if you received the same notification.

“Figuring out what’s real and what’s not can be really hard and we’re all really busy people. New Zealanders are also a really trusting bunch, so when we see these things we often think we have to do something. It can be a little while before we realise something’s gone wrong,” says Yousef. 

“But if anyone thinks something has gone wrong or they’ve shared too much information, get in touch with us. It’s our job, we see it all the time, and we can help you with advice to try and fix it up and make sure it doesn’t happen again.”

If all this seems a little overwhelming, The Spinoff’s chief technology officer Ben Gracewood wants to leave you with some tldr advice: “at the very least enable two-factor authentication on your main email account, so that even if everything else goes to shit, you can still email support and reset passwords”.

With the world moving online, you need to protect yourself. Because the cyber criminals are out there.


Follow When the Facts Change on Apple Podcasts, Spotify or your favourite podcast provider.