SlideShare a Scribd company logo
1 of 27
Download to read offline
A person centered design strategy by Lisa Martinez
Copyright 2014 @WICKED 408.638.9016
WICKED 2014@copyright Lisa Martinez 408.638.9016
 Supply new jobs in communities for local capacity building
◦ Enable resilience for the people who need a hand up, not a handout.
◦ The families in the NCLB schools are limited by poor access to education
 These are the highest density parts of every community – purely
debt,
◦ We can move debt to income and reduce burden on debt
 Enable sustainable economic opportunities.
 Do nothing and the debt increases without income to offset and the new majority
becomes the burden we could have empowered
 Imagine if you learned everything you know about environmental
threats from judging a speech contest?
◦ 10th-12th grade students who won their local speech contest compete at
MESA regionals.
 A design pattern developed to protect the highest risk least
likely to have economic sustainability and targets for
organized white collar criminals.
◦ A design pattern developed to combat the skills gap across the world.
 The proposal enforces control at the lowest level in order to release all non-
PII information into information exchange models without constraints.
 A containment strategy designed to compliment a fully vetted per cloud “open
source” with adoption of NIEM services.
 Enables foundation for the federal, state, and local services
directly to citizens
◦ Designed to enable rapid adoption with shared service centers based on
each region with new education offers based on open source solutions.
WICKED 2014@copyright Lisa Martinez 408.638.9016
Unable to enforce laws White Collar Criminals
 Federal Contracts earmark the
funds specifically to
populations;
◦ The lowest income, veterans,
veterans widows, Seniors, Foster
Kids, Victims of Violent crimes
including human trafficking
 Much of the ineffective
components of local and state
government are around the
way we understand the federal
requirements.
 The number of people accused
of fraud, without due cause is
unclear.
◦ The ability to target the high risk
populations is unclear and difficult
to track behind “the noise”
◦ While many technology solutions
are viable the number of threats
appears to have increased as the
Cyber-Security infographic skills
crisis shows
Anyone will look like a criminal if their data is used or misused
Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
Concept Map Crisis Awareness and Challenge Offer
 Young women are targeted by stalkers and human traffickers
◦ Enforce laws protecting citizens from others who use locator features
◦ Enable citizens who are not benefiting and prefer to manage identity theft threats
by avoiding the problem managing public and private life as the data owner.
◦ In many communities the system has failed victims, causing a drop in reported
crimes of sexual violence.
 Protecting targets of financial crimes is an international
priority and serious threat to everyone.
◦ An ability to acquire adequate employment or prevent false acquisitions have
become the attractor for organized criminal networks
Enforcing laws far too many are able to put at risk in the current model
Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
Proposed design for NIEM groups
 Managing my identity
◦ Intimacy Gradient Level 1 without technology
◦ Intimacy Gradient Level 2 with technology as
an individual
 With Dependent children or dependent adult
(probate)
Access Group X
Tax Debt X
Healthcare X
Education X
Justice System X
Federal, State, Local X
**Pattern Language and Intimacy Gradient per David Ing System Science Society speaker – January 2014 Incose
Geographic 01 Self 02 Child 03 Tax 04 HCA 05 EDU 06 JUS
Nation Validate Validate Validate Validate Validate Validate
State/Tribal Validate Validate Validate Validate Validate Validate
County Validate Validate Validate Validate Validate Validate
City Validate Validate Validate Validate Validate Validate
WICKED 2014@copyright Lisa Martinez 408.638.9016
IG6
IG5
IG4
IG3
IG2
IG1
IG Level “Who” can be assigned to a group
IG1 Private a person is alone without devices
IG2 Private with Device and in own domain
IG3 Federal Tax pushes to view in IG2
IG4 Medical and Mental Health with in IG4 with
inputs to IG3
IG5 Education and Mandated Reporters push to IG3
and interact in IG5
IG6 Justice System “Pushes to” IG3 with interactions
in IG6
*See NIEM recovery use case assumes all IG2-5 data secured by region
Per Cloud
WICKED 2014@copyright Lisa Martinez 408.638.9016
IG6
IG5
IG4
IG3
IG2
IG1
IG Level “Who” can be assigned to a group
IG1 Private a person is alone without devices
IG2 Private with Device and in own domain
IG3 Federal Tax pushes to view in IG2
IG4 Medical and Mental Health with in IG4 with
inputs to IG3
IG5 Education and Mandated Reporters push to IG3
and interact in IG5
IG6 Justice System “Pushes to” IG3 with interactions
in IG6
*See NIEM recovery use case assumes all IG2-5 data secured by region
WICKED 2014@copyright Lisa Martinez 408.638.9016
Economic Life Tax
Employment IG4
Culture and
Family Life
IG3
a person
as a
Citizen
IG2
Public and
Private Life
Health and
Safety
IG5
Private Life
Education IG6
Social and
Public Life
IG7
Federal
Commerce – Tax
Healthcare and
Insurance
Education and justice
Roads and
Infrastructure
State
Federal summary
segmented by state
any additional state
contributions
Commerce tax by
state etc
Local
Federal Summary
segmented by State
state summary
segmented by county
with any local
contributions
*Grouping for Pattern Language Standards according to generic themes highlighted by the Women’s Law
Work Group 2013 Report UN meetings in NY
**Each layer in government has contributions to each theme while one owns the integrity and quality of
Privacy related data
WICKED 2014@copyright Lisa Martinez 408.638.9016
Intimacy Gradient Levels (NIEM group)
 Whole government moves from high cost low
enforcement and low effectiveness in government
 action ready using EA as the transformation opportunity
A hierarchy of authority implies the top level rules are adopted at the lowest level
 Intimacy gradient level 90 Federal
 Intimacy gradient level 91 state
 Intimacy gradient level 92 county
 Intimacy gradient level 93 city
 Intimacy gradient level 94 community
 assume Facebook, Google+, Twitter, Yahoo, Instagram, About.me with public access
to minimal viable information based on NIEM adoption.
Local control would only be achieved through adoption of standards universally
Access Group X
Tax Debt X
Healthcare X
Education X
Justice System X
Federal, State, Local X
WICKED 2014@copyright Lisa Martinez 408.638.9016
 Everything we have today is in IGL07
◦ We are suggesting that we carve out the risk and protect, only leaving
enforcement of the laws we have today.
◦ We’ve done the heavy lifting and only require social responsible
companies to remove the risk from their organizations.
 Corporate Boards and Executive Officers have not been insured to cover
the threats.
 It’s in everyone’s best interest to respond quickly to these types of risk
with threats to regulatory, financial, reputation and competitive risk.
WICKED 2014@copyright Lisa Martinez 408.638.9016
IG Level Assumptions
IG1 A person has every expectation of privacy and technology has no viable reason for capture or
retention.
IG2 A person expects interactions may be monitored for intelligence purposes although Federal
limitations. Specific to tax payer service layer inputs from IG3 to IG2 Published by Federal.
Emergency response or notifications are published to IG2 from IG3
IG3 A person can expect interactions with Federal (view summary total Receipts) in view form with
any response to Federal Tax inquiries from IG2 pushed to Federal in IG3 from the person or
parent on behalf of the child
IG4 Any issues identified by healthcare providers are pushed from IG 4 to IG3 with provider views
and interactions limited to IG4. A person will respond from IG3
IG5 Educators will report into IG3 from IG5 including any mandated reporter to community support
system (TBD)
IG6 Justice System reports into IG3 from IG6
WICKED 2014@copyright Lisa Martinez 408.638.9016
5/12/2014
By Yaoxochitl Martinez
The Risk Potential Benefits
 Current Culture
◦ You really need to understand your
workforce and culture
 www.playprelude.com
◦ Breaking the glass before it
shatters on your organization
 www.workplacebullying.com
 Self worth and esteem
◦ Complimentary career paths
◦ Self regulate based on new
learning
◦ Sovereignty
 Direct access with less
administrative barriers
 Tribal run social services
 Wholeness with children safer
 Wellness Benchmarking
Lisa Martinez Wicked Design Solutions Copyright @ 2014
Emotional Health & Safety
Variables True or
False
None
Lives with both parents
Sustainable Income
Safe Child Care
Healthcare
Food
Housing
Education
Access to Grandparents
0-5 yrs.
k-5th
6-8th
9-12th
13-20th
Workforce
Seniors
Understanding the whole child to apply the right amount of effort to restore
wellness
Wellness Variables
Line Theme Activity
1 Understanding Yourself
Participants will reflect upon how their elemental iStar strengths are reflected in
their lives and the lives of those they know
2 Understanding Others
Using examples, prompts, and knowledge gained from Prelude, participants will
develop greater understanding of the way their co-workers see the world
3 Effective Communication
Participants will reflect on what other personality types need to experience for
them to successfully share their ideas
4 Practical Application
Participants will choose from a roster of "test applications" and try to use their
Prelude knowledge for communication and collaboration
5
Self-Understanding &
Advancement
Using what they have learned, participants will develop some personal action
steps that allow them to better meet personal goals and contribute to their team.
iStar
Self
Exploration
iTag
Self
Expression
weTag
Team Work
allTag
Group Work
Star Smart
Mendela
Cross cultural benchmarking strengths may serve as a tool to aid mental health scenarios.
Self - Awareness
Person Centered Income from Federal
Person New
0-5 X
K-5 0
6-8 0
9-12 X
13-20 X
Workforce O
Seniors X
 Adopting NIEM
◦ Using Pattern Language
 Intimacy Gradient
◦ Personal Cloud
 Resilience
◦ Title IV
 Families from birth – parentage
 Child support and Foster Care in
tribal territory
 TANF
CDD
DHS
IRS
CFP
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Expected =x
Optional = 0
Person Segments for agent
Populations or a person
NIEM Capability
 Proven Models – Adopting Child and Adult (seniors)
◦ Food program
 Reviewed or recommended based on whether other counties have the same
service organization.
 Reviewed based on ability to adopt NIEM with Minute Menu
 Prelude-Self, how I want others to see me, like minded Teams and others
Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
CDD
DHS
IRS
CFP
Benefits 0-5
years
K-5 6-8 9-12 13-16 Workforce Seniors
Cyber Security and Open Source Design X X X X X X X
Child Care – Family home care new business – Livescan X X X
Families First – Birth to five year Community Support
w/Prelude
X X X X
Early Detection-certification Physical Safety and Health Life X
Violence Detection – Physical Safety and Health Life X X X X
Food Program – Physical Safety and Health LIfe X X X
Cyber threat and online reputation Economic and Social Life X X
Assumptions – Benefits Map
Variables in Crisis Prevent Mitigate Respond Recover
Lives with both parents x x
Financial Sustainability x xx xx
Safe Child Care x x xx xx
Healthcare x xx xx xx
Food x xx xx xx
Housing x xx xx xx
Education x x xx xx
Access to Grandparents x xx x x
Lisa Martinez Wicked Design Solutions Copyright @ 2014
Concept Map Crisis Awareness and Challenge Offer
Federal Contract Scalability Development Validate Scale Up
TANF (a), (b),
(c) & (e)
Region
State Nation
or World
Plus
I3 Innovation
CAFP
Food Program
Region
State
Nation or
World
Plus
I3 Innovation
Teacher
Development
Region
State Nation
or World
Play Prelude
Engineering
Systems
and Quality
Systems
Design and
Architecture
Advanced
Learning
Concepts
Lisa Martinez Wicked Design Solutions Copyright @ 2014
Revenue & Benefits
People interact in the information, content(application or a
combination of information and knowledge), knowledge and
record domains
 Recent Terms to become familiar with; introduced by the
report to the President May 2014.
◦ Born Digital
◦ Born Analog
◦ Friendly Cameras
 Distinguishing the known in a way that enables informed
decision making according to the two dimensions of human
interactions with or without machines.
◦ to a person as a citizen
◦ a person as an agent with roles and interactions with an organization
or agency.
Data
Raw Format
Applications
(information
and
Knowledge)
Content
Knowledge
(Content and
Information)
Information
(Documents)
Records
Display
User Transactional
User
Management
user
Company LDAP
or AD account
X X –Restricted
group see
Sarbanes Oxley
rules
Network IP and
Host
X X
Secure access
certificate or Key
X X
Monitor and
Design
Key Controls
SOD
404 Assurances
Any financial
Management,
based on roles
based access
Any create, read,
update or archive
Financial
Management
Quality
Management
Employee
Performance
All request are
pre-authorized
and validated
All approvals are
approved or
delegated to a
person with same
or greater
authority.
Asset Device Any organization
or agency
supplied
Any organization
or agency
supplied
 Assume the conceptual model will converge into the data.
◦ In these materials we assume data represents content in many forms
when presented to a user who may have no technology experience.
◦ The following table suggest a person will potentially never understand
and not need to understanding that the four domains are also data.
View(s) Organization
or Agency
Content Information Knowledge Records
Person as
an
individual
No Video or Audio
or digital data in
an application
or other form of
presentation
Video or Audio
or digital data in
an application or
other form of
presentation
Video or Audio
or digital data in
an application
or other form of
presentation
An official recording of an
event or transaction which
requires validation and
reporting to regulatory
authorities.
Person as
an Agent
Yes Video or Audio
or digital data in
an application
or other form of
presentation
Video or Audio
or digital data in
an application or
other form of
presentation
Video or Audio
or digital data in
an application
or other form of
presentation
An official recording of an
event or transaction which
requires validation and
reporting to regulatory
authorities.
The end
Lisa Martinez 2014@Wicked Design Solutions 408.638.9016

More Related Content

What's hot

Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
 
2019 Digital Accessibility Trends - Mid Year Update
2019 Digital Accessibility Trends - Mid Year Update2019 Digital Accessibility Trends - Mid Year Update
2019 Digital Accessibility Trends - Mid Year Update3Play Media
 
Mich_Cyber_Initiative_2015
Mich_Cyber_Initiative_2015Mich_Cyber_Initiative_2015
Mich_Cyber_Initiative_2015Rob Blackwell
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity reportKevin Leffew
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
The Digital Accessibility Landscape: What Your Organization Needs to Know in ...
The Digital Accessibility Landscape: What Your Organization Needs to Know in ...The Digital Accessibility Landscape: What Your Organization Needs to Know in ...
The Digital Accessibility Landscape: What Your Organization Needs to Know in ...3Play Media
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?Brian K. Dickard
 
The Internet Economy and the G20
The Internet Economy and the G20The Internet Economy and the G20
The Internet Economy and the G20ussal
 
Future of Privacy - The Emerging View 11 06 15
Future of Privacy - The Emerging View 11 06 15 Future of Privacy - The Emerging View 11 06 15
Future of Privacy - The Emerging View 11 06 15 Future Agenda
 
Protect and Grow Public Report May 2016
Protect and Grow Public Report May 2016Protect and Grow Public Report May 2016
Protect and Grow Public Report May 2016Rob Blackwell
 
Cyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act researchCyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act researchLaVerne Kemp
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Bootcamp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Bootcamp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Bootcamp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Bootcamp)Financial Poise
 
About the IJIS Institute
About the IJIS InstituteAbout the IJIS Institute
About the IJIS InstituteChuck Brooks
 
Cyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchCyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchLaVerne Kemp
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesPaige Rasid
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
Cybersecurity Whistleblower Protection Guide
Cybersecurity Whistleblower Protection GuideCybersecurity Whistleblower Protection Guide
Cybersecurity Whistleblower Protection GuideBenjamin Tugendstein
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Michael C. Keeling, Esq.
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Creus Moreira Carlos
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copysmita mitra
 

What's hot (20)

Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
 
2019 Digital Accessibility Trends - Mid Year Update
2019 Digital Accessibility Trends - Mid Year Update2019 Digital Accessibility Trends - Mid Year Update
2019 Digital Accessibility Trends - Mid Year Update
 
Mich_Cyber_Initiative_2015
Mich_Cyber_Initiative_2015Mich_Cyber_Initiative_2015
Mich_Cyber_Initiative_2015
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
The Digital Accessibility Landscape: What Your Organization Needs to Know in ...
The Digital Accessibility Landscape: What Your Organization Needs to Know in ...The Digital Accessibility Landscape: What Your Organization Needs to Know in ...
The Digital Accessibility Landscape: What Your Organization Needs to Know in ...
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
 
The Internet Economy and the G20
The Internet Economy and the G20The Internet Economy and the G20
The Internet Economy and the G20
 
Future of Privacy - The Emerging View 11 06 15
Future of Privacy - The Emerging View 11 06 15 Future of Privacy - The Emerging View 11 06 15
Future of Privacy - The Emerging View 11 06 15
 
Protect and Grow Public Report May 2016
Protect and Grow Public Report May 2016Protect and Grow Public Report May 2016
Protect and Grow Public Report May 2016
 
Cyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act researchCyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act research
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Bootcamp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Bootcamp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Bootcamp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Bootcamp)
 
About the IJIS Institute
About the IJIS InstituteAbout the IJIS Institute
About the IJIS Institute
 
Cyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchCyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act research
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass Houses
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Cybersecurity Whistleblower Protection Guide
Cybersecurity Whistleblower Protection GuideCybersecurity Whistleblower Protection Guide
Cybersecurity Whistleblower Protection Guide
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
 

Similar to Person centered design strategy focuses on vulnerable groups

6. cloud offers hca edu doj
6. cloud offers hca edu doj6. cloud offers hca edu doj
6. cloud offers hca edu dojMrsAlways RigHt
 
A system approach to cyber security
A system approach to cyber securityA system approach to cyber security
A system approach to cyber securityMrsAlways RigHt
 
Setting up an International Innovation Incubator
Setting up an International Innovation IncubatorSetting up an International Innovation Incubator
Setting up an International Innovation IncubatorMrsAlways RigHt
 
1. design strategy and vision for crisis management
1. design strategy and vision for crisis management1. design strategy and vision for crisis management
1. design strategy and vision for crisis managementMrsAlways RigHt
 
High risk populations with NIEM
High risk populations with NIEMHigh risk populations with NIEM
High risk populations with NIEMMrsAlways RigHt
 
5. shared service business offers capacity and crisis
5. shared service business offers capacity and crisis5. shared service business offers capacity and crisis
5. shared service business offers capacity and crisisMrsAlways RigHt
 
Working With Your City or Public Health Departments to Get People Covered
Working With Your City or Public Health Departments to Get People CoveredWorking With Your City or Public Health Departments to Get People Covered
Working With Your City or Public Health Departments to Get People CoveredEnroll America
 
DEMYSTIFYING – AND BETTER SERVING – THE DIGITAL CITIZEN
DEMYSTIFYING – AND BETTER SERVING – THE DIGITAL CITIZENDEMYSTIFYING – AND BETTER SERVING – THE DIGITAL CITIZEN
DEMYSTIFYING – AND BETTER SERVING – THE DIGITAL CITIZENForgeRock
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Onlinecaniceconsulting
 
Future of data - Insights from Discussions Building on an Initial Perspective...
Future of data - Insights from Discussions Building on an Initial Perspective...Future of data - Insights from Discussions Building on an Initial Perspective...
Future of data - Insights from Discussions Building on an Initial Perspective...Future Agenda
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Financial Poise
 
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP) 8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP) Evolver Inc.
 
AWS Institute | Digital Identity: The Opportunity for Government
AWS Institute | Digital Identity: The Opportunity for GovernmentAWS Institute | Digital Identity: The Opportunity for Government
AWS Institute | Digital Identity: The Opportunity for GovernmentFairTechInstitute
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 

Similar to Person centered design strategy focuses on vulnerable groups (20)

6. cloud offers hca edu doj
6. cloud offers hca edu doj6. cloud offers hca edu doj
6. cloud offers hca edu doj
 
A system approach to cyber security
A system approach to cyber securityA system approach to cyber security
A system approach to cyber security
 
Setting up an International Innovation Incubator
Setting up an International Innovation IncubatorSetting up an International Innovation Incubator
Setting up an International Innovation Incubator
 
1. design strategy and vision for crisis management
1. design strategy and vision for crisis management1. design strategy and vision for crisis management
1. design strategy and vision for crisis management
 
High risk populations with NIEM
High risk populations with NIEMHigh risk populations with NIEM
High risk populations with NIEM
 
5. shared service business offers capacity and crisis
5. shared service business offers capacity and crisis5. shared service business offers capacity and crisis
5. shared service business offers capacity and crisis
 
GROUP2-ACTIVITY.pptx
GROUP2-ACTIVITY.pptxGROUP2-ACTIVITY.pptx
GROUP2-ACTIVITY.pptx
 
Working With Your City or Public Health Departments to Get People Covered
Working With Your City or Public Health Departments to Get People CoveredWorking With Your City or Public Health Departments to Get People Covered
Working With Your City or Public Health Departments to Get People Covered
 
DEMYSTIFYING – AND BETTER SERVING – THE DIGITAL CITIZEN
DEMYSTIFYING – AND BETTER SERVING – THE DIGITAL CITIZENDEMYSTIFYING – AND BETTER SERVING – THE DIGITAL CITIZEN
DEMYSTIFYING – AND BETTER SERVING – THE DIGITAL CITIZEN
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
 
Future of data - Insights from Discussions Building on an Initial Perspective...
Future of data - Insights from Discussions Building on an Initial Perspective...Future of data - Insights from Discussions Building on an Initial Perspective...
Future of data - Insights from Discussions Building on an Initial Perspective...
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
digital citizenship poe
digital citizenship poedigital citizenship poe
digital citizenship poe
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP) 8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
 
AWS Institute | Digital Identity: The Opportunity for Government
AWS Institute | Digital Identity: The Opportunity for GovernmentAWS Institute | Digital Identity: The Opportunity for Government
AWS Institute | Digital Identity: The Opportunity for Government
 
Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 

More from MrsAlways RigHt

Enabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloudEnabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloudMrsAlways RigHt
 
Human development cost of quality in a quantified world
Human development cost of quality in a quantified worldHuman development cost of quality in a quantified world
Human development cost of quality in a quantified worldMrsAlways RigHt
 
Bmsqms revisedwithchevrons
Bmsqms revisedwithchevronsBmsqms revisedwithchevrons
Bmsqms revisedwithchevronsMrsAlways RigHt
 
9. foundation ea to 2 use cases
9. foundation ea to 2 use cases9. foundation ea to 2 use cases
9. foundation ea to 2 use casesMrsAlways RigHt
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video DataMrsAlways RigHt
 
Crisis prevention and readinessv2foundation pmc
Crisis prevention and readinessv2foundation pmcCrisis prevention and readinessv2foundation pmc
Crisis prevention and readinessv2foundation pmcMrsAlways RigHt
 
Patterns within patterns in architecture v2
Patterns within patterns in architecture v2Patterns within patterns in architecture v2
Patterns within patterns in architecture v2MrsAlways RigHt
 
Standards for a blue ocean
Standards for a blue oceanStandards for a blue ocean
Standards for a blue oceanMrsAlways RigHt
 
A wicked problem with perceptions
A wicked problem with perceptionsA wicked problem with perceptions
A wicked problem with perceptionsMrsAlways RigHt
 
Assume entity types offer management capability
Assume entity types offer management capabilityAssume entity types offer management capability
Assume entity types offer management capabilityMrsAlways RigHt
 
Government ICT Process Benchmarking
Government ICT Process BenchmarkingGovernment ICT Process Benchmarking
Government ICT Process BenchmarkingMrsAlways RigHt
 
People part of the equation
People part of the equationPeople part of the equation
People part of the equationMrsAlways RigHt
 
Sustainable Architectures
Sustainable Architectures Sustainable Architectures
Sustainable Architectures MrsAlways RigHt
 
7. Big data proposal to go lean in public
7. Big data proposal to go lean in public7. Big data proposal to go lean in public
7. Big data proposal to go lean in publicMrsAlways RigHt
 

More from MrsAlways RigHt (19)

Enabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloudEnabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloud
 
Human development cost of quality in a quantified world
Human development cost of quality in a quantified worldHuman development cost of quality in a quantified world
Human development cost of quality in a quantified world
 
Bmsqms revisedwithchevrons
Bmsqms revisedwithchevronsBmsqms revisedwithchevrons
Bmsqms revisedwithchevrons
 
9. foundation ea to 2 use cases
9. foundation ea to 2 use cases9. foundation ea to 2 use cases
9. foundation ea to 2 use cases
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data
 
4. Five Capability
4. Five Capability 4. Five Capability
4. Five Capability
 
Socialmediadashboard
SocialmediadashboardSocialmediadashboard
Socialmediadashboard
 
Retail SWOT v.2
Retail SWOT v.2 Retail SWOT v.2
Retail SWOT v.2
 
Crisis prevention and readinessv2foundation pmc
Crisis prevention and readinessv2foundation pmcCrisis prevention and readinessv2foundation pmc
Crisis prevention and readinessv2foundation pmc
 
Just wicked
Just wickedJust wicked
Just wicked
 
Patterns within patterns in architecture v2
Patterns within patterns in architecture v2Patterns within patterns in architecture v2
Patterns within patterns in architecture v2
 
Standards for a blue ocean
Standards for a blue oceanStandards for a blue ocean
Standards for a blue ocean
 
A wicked problem with perceptions
A wicked problem with perceptionsA wicked problem with perceptions
A wicked problem with perceptions
 
Pcd gov v3
Pcd gov v3Pcd gov v3
Pcd gov v3
 
Assume entity types offer management capability
Assume entity types offer management capabilityAssume entity types offer management capability
Assume entity types offer management capability
 
Government ICT Process Benchmarking
Government ICT Process BenchmarkingGovernment ICT Process Benchmarking
Government ICT Process Benchmarking
 
People part of the equation
People part of the equationPeople part of the equation
People part of the equation
 
Sustainable Architectures
Sustainable Architectures Sustainable Architectures
Sustainable Architectures
 
7. Big data proposal to go lean in public
7. Big data proposal to go lean in public7. Big data proposal to go lean in public
7. Big data proposal to go lean in public
 

Recently uploaded

Bus tracking.pptx ,,,,,,,,,,,,,,,,,,,,,,,,,,
Bus tracking.pptx ,,,,,,,,,,,,,,,,,,,,,,,,,,Bus tracking.pptx ,,,,,,,,,,,,,,,,,,,,,,,,,,
Bus tracking.pptx ,,,,,,,,,,,,,,,,,,,,,,,,,,bhuyansuprit
 
VIP Russian Call Girls in Gorakhpur Deepika 8250192130 Independent Escort Ser...
VIP Russian Call Girls in Gorakhpur Deepika 8250192130 Independent Escort Ser...VIP Russian Call Girls in Gorakhpur Deepika 8250192130 Independent Escort Ser...
VIP Russian Call Girls in Gorakhpur Deepika 8250192130 Independent Escort Ser...Suhani Kapoor
 
call girls in Harsh Vihar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Harsh Vihar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Harsh Vihar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Harsh Vihar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Cheap Rate Call girls Malviya Nagar 9205541914 shot 1500 night
Cheap Rate Call girls Malviya Nagar 9205541914 shot 1500 nightCheap Rate Call girls Malviya Nagar 9205541914 shot 1500 night
Cheap Rate Call girls Malviya Nagar 9205541914 shot 1500 nightDelhi Call girls
 
Call Girls In Safdarjung Enclave 24/7✡️9711147426✡️ Escorts Service
Call Girls In Safdarjung Enclave 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Safdarjung Enclave 24/7✡️9711147426✡️ Escorts Service
Call Girls In Safdarjung Enclave 24/7✡️9711147426✡️ Escorts Servicejennyeacort
 
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130Suhani Kapoor
 
Kindergarten Assessment Questions Via LessonUp
Kindergarten Assessment Questions Via LessonUpKindergarten Assessment Questions Via LessonUp
Kindergarten Assessment Questions Via LessonUpmainac1
 
A level Digipak development Presentation
A level Digipak development PresentationA level Digipak development Presentation
A level Digipak development Presentationamedia6
 
VIP Kolkata Call Girl Gariahat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Gariahat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Gariahat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Gariahat 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service Amravati
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service AmravatiVIP Call Girl Amravati Aashi 8250192130 Independent Escort Service Amravati
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
3D Printing And Designing Final Report.pdf
3D Printing And Designing Final Report.pdf3D Printing And Designing Final Report.pdf
3D Printing And Designing Final Report.pdfSwaraliBorhade
 
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...Suhani Kapoor
 
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...babafaisel
 
shot list for my tv series two steps back
shot list for my tv series two steps backshot list for my tv series two steps back
shot list for my tv series two steps back17lcow074
 
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130Suhani Kapoor
 
PORTAFOLIO 2024_ ANASTASIYA KUDINOVA
PORTAFOLIO   2024_  ANASTASIYA  KUDINOVAPORTAFOLIO   2024_  ANASTASIYA  KUDINOVA
PORTAFOLIO 2024_ ANASTASIYA KUDINOVAAnastasiya Kudinova
 
SCRIP Lua HTTP PROGRACMACION PLC WECON CA
SCRIP Lua HTTP PROGRACMACION PLC  WECON CASCRIP Lua HTTP PROGRACMACION PLC  WECON CA
SCRIP Lua HTTP PROGRACMACION PLC WECON CANestorGamez6
 
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai DouxDubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Douxkojalkojal131
 

Recently uploaded (20)

Bus tracking.pptx ,,,,,,,,,,,,,,,,,,,,,,,,,,
Bus tracking.pptx ,,,,,,,,,,,,,,,,,,,,,,,,,,Bus tracking.pptx ,,,,,,,,,,,,,,,,,,,,,,,,,,
Bus tracking.pptx ,,,,,,,,,,,,,,,,,,,,,,,,,,
 
VIP Russian Call Girls in Gorakhpur Deepika 8250192130 Independent Escort Ser...
VIP Russian Call Girls in Gorakhpur Deepika 8250192130 Independent Escort Ser...VIP Russian Call Girls in Gorakhpur Deepika 8250192130 Independent Escort Ser...
VIP Russian Call Girls in Gorakhpur Deepika 8250192130 Independent Escort Ser...
 
call girls in Harsh Vihar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Harsh Vihar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Harsh Vihar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Harsh Vihar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Cheap Rate Call girls Malviya Nagar 9205541914 shot 1500 night
Cheap Rate Call girls Malviya Nagar 9205541914 shot 1500 nightCheap Rate Call girls Malviya Nagar 9205541914 shot 1500 night
Cheap Rate Call girls Malviya Nagar 9205541914 shot 1500 night
 
Call Girls In Safdarjung Enclave 24/7✡️9711147426✡️ Escorts Service
Call Girls In Safdarjung Enclave 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Safdarjung Enclave 24/7✡️9711147426✡️ Escorts Service
Call Girls In Safdarjung Enclave 24/7✡️9711147426✡️ Escorts Service
 
young call girls in Vivek Vihar🔝 9953056974 🔝 Delhi escort Service
young call girls in Vivek Vihar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Vivek Vihar🔝 9953056974 🔝 Delhi escort Service
young call girls in Vivek Vihar🔝 9953056974 🔝 Delhi escort Service
 
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
 
Kindergarten Assessment Questions Via LessonUp
Kindergarten Assessment Questions Via LessonUpKindergarten Assessment Questions Via LessonUp
Kindergarten Assessment Questions Via LessonUp
 
A level Digipak development Presentation
A level Digipak development PresentationA level Digipak development Presentation
A level Digipak development Presentation
 
VIP Kolkata Call Girl Gariahat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Gariahat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Gariahat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Gariahat 👉 8250192130 Available With Room
 
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service Amravati
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service AmravatiVIP Call Girl Amravati Aashi 8250192130 Independent Escort Service Amravati
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service Amravati
 
3D Printing And Designing Final Report.pdf
3D Printing And Designing Final Report.pdf3D Printing And Designing Final Report.pdf
3D Printing And Designing Final Report.pdf
 
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
 
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
 
shot list for my tv series two steps back
shot list for my tv series two steps backshot list for my tv series two steps back
shot list for my tv series two steps back
 
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
 
PORTAFOLIO 2024_ ANASTASIYA KUDINOVA
PORTAFOLIO   2024_  ANASTASIYA  KUDINOVAPORTAFOLIO   2024_  ANASTASIYA  KUDINOVA
PORTAFOLIO 2024_ ANASTASIYA KUDINOVA
 
young call girls in Pandav nagar 🔝 9953056974 🔝 Delhi escort Service
young call girls in Pandav nagar 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Pandav nagar 🔝 9953056974 🔝 Delhi escort Service
young call girls in Pandav nagar 🔝 9953056974 🔝 Delhi escort Service
 
SCRIP Lua HTTP PROGRACMACION PLC WECON CA
SCRIP Lua HTTP PROGRACMACION PLC  WECON CASCRIP Lua HTTP PROGRACMACION PLC  WECON CA
SCRIP Lua HTTP PROGRACMACION PLC WECON CA
 
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai DouxDubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
 

Person centered design strategy focuses on vulnerable groups

  • 1. A person centered design strategy by Lisa Martinez Copyright 2014 @WICKED 408.638.9016 WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 2.  Supply new jobs in communities for local capacity building ◦ Enable resilience for the people who need a hand up, not a handout. ◦ The families in the NCLB schools are limited by poor access to education  These are the highest density parts of every community – purely debt, ◦ We can move debt to income and reduce burden on debt  Enable sustainable economic opportunities.  Do nothing and the debt increases without income to offset and the new majority becomes the burden we could have empowered  Imagine if you learned everything you know about environmental threats from judging a speech contest? ◦ 10th-12th grade students who won their local speech contest compete at MESA regionals.
  • 3.  A design pattern developed to protect the highest risk least likely to have economic sustainability and targets for organized white collar criminals. ◦ A design pattern developed to combat the skills gap across the world.  The proposal enforces control at the lowest level in order to release all non- PII information into information exchange models without constraints.  A containment strategy designed to compliment a fully vetted per cloud “open source” with adoption of NIEM services.  Enables foundation for the federal, state, and local services directly to citizens ◦ Designed to enable rapid adoption with shared service centers based on each region with new education offers based on open source solutions. WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 4. Unable to enforce laws White Collar Criminals  Federal Contracts earmark the funds specifically to populations; ◦ The lowest income, veterans, veterans widows, Seniors, Foster Kids, Victims of Violent crimes including human trafficking  Much of the ineffective components of local and state government are around the way we understand the federal requirements.  The number of people accused of fraud, without due cause is unclear. ◦ The ability to target the high risk populations is unclear and difficult to track behind “the noise” ◦ While many technology solutions are viable the number of threats appears to have increased as the Cyber-Security infographic skills crisis shows Anyone will look like a criminal if their data is used or misused Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016 Concept Map Crisis Awareness and Challenge Offer
  • 5.  Young women are targeted by stalkers and human traffickers ◦ Enforce laws protecting citizens from others who use locator features ◦ Enable citizens who are not benefiting and prefer to manage identity theft threats by avoiding the problem managing public and private life as the data owner. ◦ In many communities the system has failed victims, causing a drop in reported crimes of sexual violence.  Protecting targets of financial crimes is an international priority and serious threat to everyone. ◦ An ability to acquire adequate employment or prevent false acquisitions have become the attractor for organized criminal networks Enforcing laws far too many are able to put at risk in the current model Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
  • 6. Proposed design for NIEM groups  Managing my identity ◦ Intimacy Gradient Level 1 without technology ◦ Intimacy Gradient Level 2 with technology as an individual  With Dependent children or dependent adult (probate) Access Group X Tax Debt X Healthcare X Education X Justice System X Federal, State, Local X **Pattern Language and Intimacy Gradient per David Ing System Science Society speaker – January 2014 Incose Geographic 01 Self 02 Child 03 Tax 04 HCA 05 EDU 06 JUS Nation Validate Validate Validate Validate Validate Validate State/Tribal Validate Validate Validate Validate Validate Validate County Validate Validate Validate Validate Validate Validate City Validate Validate Validate Validate Validate Validate WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 7. IG6 IG5 IG4 IG3 IG2 IG1 IG Level “Who” can be assigned to a group IG1 Private a person is alone without devices IG2 Private with Device and in own domain IG3 Federal Tax pushes to view in IG2 IG4 Medical and Mental Health with in IG4 with inputs to IG3 IG5 Education and Mandated Reporters push to IG3 and interact in IG5 IG6 Justice System “Pushes to” IG3 with interactions in IG6 *See NIEM recovery use case assumes all IG2-5 data secured by region Per Cloud WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 8. IG6 IG5 IG4 IG3 IG2 IG1 IG Level “Who” can be assigned to a group IG1 Private a person is alone without devices IG2 Private with Device and in own domain IG3 Federal Tax pushes to view in IG2 IG4 Medical and Mental Health with in IG4 with inputs to IG3 IG5 Education and Mandated Reporters push to IG3 and interact in IG5 IG6 Justice System “Pushes to” IG3 with interactions in IG6 *See NIEM recovery use case assumes all IG2-5 data secured by region WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 9. Economic Life Tax Employment IG4 Culture and Family Life IG3 a person as a Citizen IG2 Public and Private Life Health and Safety IG5 Private Life Education IG6 Social and Public Life IG7 Federal Commerce – Tax Healthcare and Insurance Education and justice Roads and Infrastructure State Federal summary segmented by state any additional state contributions Commerce tax by state etc Local Federal Summary segmented by State state summary segmented by county with any local contributions *Grouping for Pattern Language Standards according to generic themes highlighted by the Women’s Law Work Group 2013 Report UN meetings in NY **Each layer in government has contributions to each theme while one owns the integrity and quality of Privacy related data WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 10. Intimacy Gradient Levels (NIEM group)  Whole government moves from high cost low enforcement and low effectiveness in government  action ready using EA as the transformation opportunity A hierarchy of authority implies the top level rules are adopted at the lowest level  Intimacy gradient level 90 Federal  Intimacy gradient level 91 state  Intimacy gradient level 92 county  Intimacy gradient level 93 city  Intimacy gradient level 94 community  assume Facebook, Google+, Twitter, Yahoo, Instagram, About.me with public access to minimal viable information based on NIEM adoption. Local control would only be achieved through adoption of standards universally Access Group X Tax Debt X Healthcare X Education X Justice System X Federal, State, Local X WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 11.  Everything we have today is in IGL07 ◦ We are suggesting that we carve out the risk and protect, only leaving enforcement of the laws we have today. ◦ We’ve done the heavy lifting and only require social responsible companies to remove the risk from their organizations.  Corporate Boards and Executive Officers have not been insured to cover the threats.  It’s in everyone’s best interest to respond quickly to these types of risk with threats to regulatory, financial, reputation and competitive risk. WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 12. IG Level Assumptions IG1 A person has every expectation of privacy and technology has no viable reason for capture or retention. IG2 A person expects interactions may be monitored for intelligence purposes although Federal limitations. Specific to tax payer service layer inputs from IG3 to IG2 Published by Federal. Emergency response or notifications are published to IG2 from IG3 IG3 A person can expect interactions with Federal (view summary total Receipts) in view form with any response to Federal Tax inquiries from IG2 pushed to Federal in IG3 from the person or parent on behalf of the child IG4 Any issues identified by healthcare providers are pushed from IG 4 to IG3 with provider views and interactions limited to IG4. A person will respond from IG3 IG5 Educators will report into IG3 from IG5 including any mandated reporter to community support system (TBD) IG6 Justice System reports into IG3 from IG6 WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 14. The Risk Potential Benefits  Current Culture ◦ You really need to understand your workforce and culture  www.playprelude.com ◦ Breaking the glass before it shatters on your organization  www.workplacebullying.com  Self worth and esteem ◦ Complimentary career paths ◦ Self regulate based on new learning ◦ Sovereignty  Direct access with less administrative barriers  Tribal run social services  Wholeness with children safer  Wellness Benchmarking Lisa Martinez Wicked Design Solutions Copyright @ 2014 Emotional Health & Safety
  • 15. Variables True or False None Lives with both parents Sustainable Income Safe Child Care Healthcare Food Housing Education Access to Grandparents 0-5 yrs. k-5th 6-8th 9-12th 13-20th Workforce Seniors Understanding the whole child to apply the right amount of effort to restore wellness Wellness Variables
  • 16. Line Theme Activity 1 Understanding Yourself Participants will reflect upon how their elemental iStar strengths are reflected in their lives and the lives of those they know 2 Understanding Others Using examples, prompts, and knowledge gained from Prelude, participants will develop greater understanding of the way their co-workers see the world 3 Effective Communication Participants will reflect on what other personality types need to experience for them to successfully share their ideas 4 Practical Application Participants will choose from a roster of "test applications" and try to use their Prelude knowledge for communication and collaboration 5 Self-Understanding & Advancement Using what they have learned, participants will develop some personal action steps that allow them to better meet personal goals and contribute to their team. iStar Self Exploration iTag Self Expression weTag Team Work allTag Group Work Star Smart Mendela Cross cultural benchmarking strengths may serve as a tool to aid mental health scenarios. Self - Awareness
  • 17. Person Centered Income from Federal Person New 0-5 X K-5 0 6-8 0 9-12 X 13-20 X Workforce O Seniors X  Adopting NIEM ◦ Using Pattern Language  Intimacy Gradient ◦ Personal Cloud  Resilience ◦ Title IV  Families from birth – parentage  Child support and Foster Care in tribal territory  TANF CDD DHS IRS CFP Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016 Expected =x Optional = 0 Person Segments for agent Populations or a person NIEM Capability
  • 18.  Proven Models – Adopting Child and Adult (seniors) ◦ Food program  Reviewed or recommended based on whether other counties have the same service organization.  Reviewed based on ability to adopt NIEM with Minute Menu  Prelude-Self, how I want others to see me, like minded Teams and others Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016 CDD DHS IRS CFP Benefits 0-5 years K-5 6-8 9-12 13-16 Workforce Seniors Cyber Security and Open Source Design X X X X X X X Child Care – Family home care new business – Livescan X X X Families First – Birth to five year Community Support w/Prelude X X X X Early Detection-certification Physical Safety and Health Life X Violence Detection – Physical Safety and Health Life X X X X Food Program – Physical Safety and Health LIfe X X X Cyber threat and online reputation Economic and Social Life X X Assumptions – Benefits Map
  • 19. Variables in Crisis Prevent Mitigate Respond Recover Lives with both parents x x Financial Sustainability x xx xx Safe Child Care x x xx xx Healthcare x xx xx xx Food x xx xx xx Housing x xx xx xx Education x x xx xx Access to Grandparents x xx x x Lisa Martinez Wicked Design Solutions Copyright @ 2014 Concept Map Crisis Awareness and Challenge Offer
  • 20. Federal Contract Scalability Development Validate Scale Up TANF (a), (b), (c) & (e) Region State Nation or World Plus I3 Innovation CAFP Food Program Region State Nation or World Plus I3 Innovation Teacher Development Region State Nation or World Play Prelude
  • 21. Engineering Systems and Quality Systems Design and Architecture Advanced Learning Concepts Lisa Martinez Wicked Design Solutions Copyright @ 2014 Revenue & Benefits
  • 22. People interact in the information, content(application or a combination of information and knowledge), knowledge and record domains
  • 23.  Recent Terms to become familiar with; introduced by the report to the President May 2014. ◦ Born Digital ◦ Born Analog ◦ Friendly Cameras  Distinguishing the known in a way that enables informed decision making according to the two dimensions of human interactions with or without machines. ◦ to a person as a citizen ◦ a person as an agent with roles and interactions with an organization or agency.
  • 24. Data Raw Format Applications (information and Knowledge) Content Knowledge (Content and Information) Information (Documents) Records Display User Transactional User Management user Company LDAP or AD account X X –Restricted group see Sarbanes Oxley rules Network IP and Host X X Secure access certificate or Key X X Monitor and Design Key Controls SOD 404 Assurances Any financial Management, based on roles based access Any create, read, update or archive Financial Management Quality Management Employee Performance All request are pre-authorized and validated All approvals are approved or delegated to a person with same or greater authority. Asset Device Any organization or agency supplied Any organization or agency supplied
  • 25.  Assume the conceptual model will converge into the data. ◦ In these materials we assume data represents content in many forms when presented to a user who may have no technology experience. ◦ The following table suggest a person will potentially never understand and not need to understanding that the four domains are also data. View(s) Organization or Agency Content Information Knowledge Records Person as an individual No Video or Audio or digital data in an application or other form of presentation Video or Audio or digital data in an application or other form of presentation Video or Audio or digital data in an application or other form of presentation An official recording of an event or transaction which requires validation and reporting to regulatory authorities. Person as an Agent Yes Video or Audio or digital data in an application or other form of presentation Video or Audio or digital data in an application or other form of presentation Video or Audio or digital data in an application or other form of presentation An official recording of an event or transaction which requires validation and reporting to regulatory authorities.
  • 26.
  • 27. The end Lisa Martinez 2014@Wicked Design Solutions 408.638.9016