Policy evaluation tool

The online INDIMO Service and Policy Evaluation Tool gives policy makers useful tips to compile strategies that take into consideration all categories of citizens, ensuring that they will fully benefit from the digital transport system, avoiding exclusion or digital divide. The tool also supports policy makers when evaluating digital mobility solutions and services before their deployment in terms of compliance with the principles outlined in the INDIMO Inclusive Digital Mobility Toolbox .

The tool will be based on insights from the deployment case studies explored in the first year of the project and co-created with the INDIMO Co-creation Community.

The Service and Policy Evaluation Tool is part of the INDIMO Inclusive Digital Mobility Toolbox, a toolbox that contains four tools helping developers, policy makers and service operators to develop and implement accessible and inclusive mobility solutions. Besides the SPET, the INDIMO toolbox contains three other tools: The Universal Design Manual (UDM), the Universal Interface Language (UIL) and the Cybersecurity and Privacy Assessment Guidelines (CSG).

The INDIMO tools support a user-centric design approach thus avoiding the need to retrospectively make changes to software applications, infrastructure and transport services. The Toolbox is developed according to the seven principles of Universal Design: equitable use, flexibility in use, simple and intuitive use, perceptible information, tolerance of error, low physical effort, size and space for approach – while also considering cybersecurity and privacy. The toolbox will also expand the concept of equitable use to social, spatial and economic inclusiveness in accessing digital on-demand transport services. Practically, the information contained in the UDM, UIL and CSG forms the base for the recommendations included in the results of the SPET.

Policy Evaluation Tool

Universal Design Manual

Universal Design manual

Universal Interface Language Manual

Universal interface language

Cybersecurity and privacy assessment guidelines

Cybersecurity and privacy assessment guidelines