Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Person centered design strategy focuses on vulnerable groups
1. A person centered design strategy by Lisa Martinez
Copyright 2014 @WICKED 408.638.9016
WICKED 2014@copyright Lisa Martinez 408.638.9016
2. Supply new jobs in communities for local capacity building
◦ Enable resilience for the people who need a hand up, not a handout.
◦ The families in the NCLB schools are limited by poor access to education
These are the highest density parts of every community – purely
debt,
◦ We can move debt to income and reduce burden on debt
Enable sustainable economic opportunities.
Do nothing and the debt increases without income to offset and the new majority
becomes the burden we could have empowered
Imagine if you learned everything you know about environmental
threats from judging a speech contest?
◦ 10th-12th grade students who won their local speech contest compete at
MESA regionals.
3. A design pattern developed to protect the highest risk least
likely to have economic sustainability and targets for
organized white collar criminals.
◦ A design pattern developed to combat the skills gap across the world.
The proposal enforces control at the lowest level in order to release all non-
PII information into information exchange models without constraints.
A containment strategy designed to compliment a fully vetted per cloud “open
source” with adoption of NIEM services.
Enables foundation for the federal, state, and local services
directly to citizens
◦ Designed to enable rapid adoption with shared service centers based on
each region with new education offers based on open source solutions.
WICKED 2014@copyright Lisa Martinez 408.638.9016
4. Unable to enforce laws White Collar Criminals
Federal Contracts earmark the
funds specifically to
populations;
◦ The lowest income, veterans,
veterans widows, Seniors, Foster
Kids, Victims of Violent crimes
including human trafficking
Much of the ineffective
components of local and state
government are around the
way we understand the federal
requirements.
The number of people accused
of fraud, without due cause is
unclear.
◦ The ability to target the high risk
populations is unclear and difficult
to track behind “the noise”
◦ While many technology solutions
are viable the number of threats
appears to have increased as the
Cyber-Security infographic skills
crisis shows
Anyone will look like a criminal if their data is used or misused
Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
Concept Map Crisis Awareness and Challenge Offer
5. Young women are targeted by stalkers and human traffickers
◦ Enforce laws protecting citizens from others who use locator features
◦ Enable citizens who are not benefiting and prefer to manage identity theft threats
by avoiding the problem managing public and private life as the data owner.
◦ In many communities the system has failed victims, causing a drop in reported
crimes of sexual violence.
Protecting targets of financial crimes is an international
priority and serious threat to everyone.
◦ An ability to acquire adequate employment or prevent false acquisitions have
become the attractor for organized criminal networks
Enforcing laws far too many are able to put at risk in the current model
Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
6. Proposed design for NIEM groups
Managing my identity
◦ Intimacy Gradient Level 1 without technology
◦ Intimacy Gradient Level 2 with technology as
an individual
With Dependent children or dependent adult
(probate)
Access Group X
Tax Debt X
Healthcare X
Education X
Justice System X
Federal, State, Local X
**Pattern Language and Intimacy Gradient per David Ing System Science Society speaker – January 2014 Incose
Geographic 01 Self 02 Child 03 Tax 04 HCA 05 EDU 06 JUS
Nation Validate Validate Validate Validate Validate Validate
State/Tribal Validate Validate Validate Validate Validate Validate
County Validate Validate Validate Validate Validate Validate
City Validate Validate Validate Validate Validate Validate
WICKED 2014@copyright Lisa Martinez 408.638.9016
7. IG6
IG5
IG4
IG3
IG2
IG1
IG Level “Who” can be assigned to a group
IG1 Private a person is alone without devices
IG2 Private with Device and in own domain
IG3 Federal Tax pushes to view in IG2
IG4 Medical and Mental Health with in IG4 with
inputs to IG3
IG5 Education and Mandated Reporters push to IG3
and interact in IG5
IG6 Justice System “Pushes to” IG3 with interactions
in IG6
*See NIEM recovery use case assumes all IG2-5 data secured by region
Per Cloud
WICKED 2014@copyright Lisa Martinez 408.638.9016
8. IG6
IG5
IG4
IG3
IG2
IG1
IG Level “Who” can be assigned to a group
IG1 Private a person is alone without devices
IG2 Private with Device and in own domain
IG3 Federal Tax pushes to view in IG2
IG4 Medical and Mental Health with in IG4 with
inputs to IG3
IG5 Education and Mandated Reporters push to IG3
and interact in IG5
IG6 Justice System “Pushes to” IG3 with interactions
in IG6
*See NIEM recovery use case assumes all IG2-5 data secured by region
WICKED 2014@copyright Lisa Martinez 408.638.9016
9. Economic Life Tax
Employment IG4
Culture and
Family Life
IG3
a person
as a
Citizen
IG2
Public and
Private Life
Health and
Safety
IG5
Private Life
Education IG6
Social and
Public Life
IG7
Federal
Commerce – Tax
Healthcare and
Insurance
Education and justice
Roads and
Infrastructure
State
Federal summary
segmented by state
any additional state
contributions
Commerce tax by
state etc
Local
Federal Summary
segmented by State
state summary
segmented by county
with any local
contributions
*Grouping for Pattern Language Standards according to generic themes highlighted by the Women’s Law
Work Group 2013 Report UN meetings in NY
**Each layer in government has contributions to each theme while one owns the integrity and quality of
Privacy related data
WICKED 2014@copyright Lisa Martinez 408.638.9016
10. Intimacy Gradient Levels (NIEM group)
Whole government moves from high cost low
enforcement and low effectiveness in government
action ready using EA as the transformation opportunity
A hierarchy of authority implies the top level rules are adopted at the lowest level
Intimacy gradient level 90 Federal
Intimacy gradient level 91 state
Intimacy gradient level 92 county
Intimacy gradient level 93 city
Intimacy gradient level 94 community
assume Facebook, Google+, Twitter, Yahoo, Instagram, About.me with public access
to minimal viable information based on NIEM adoption.
Local control would only be achieved through adoption of standards universally
Access Group X
Tax Debt X
Healthcare X
Education X
Justice System X
Federal, State, Local X
WICKED 2014@copyright Lisa Martinez 408.638.9016
11. Everything we have today is in IGL07
◦ We are suggesting that we carve out the risk and protect, only leaving
enforcement of the laws we have today.
◦ We’ve done the heavy lifting and only require social responsible
companies to remove the risk from their organizations.
Corporate Boards and Executive Officers have not been insured to cover
the threats.
It’s in everyone’s best interest to respond quickly to these types of risk
with threats to regulatory, financial, reputation and competitive risk.
WICKED 2014@copyright Lisa Martinez 408.638.9016
12. IG Level Assumptions
IG1 A person has every expectation of privacy and technology has no viable reason for capture or
retention.
IG2 A person expects interactions may be monitored for intelligence purposes although Federal
limitations. Specific to tax payer service layer inputs from IG3 to IG2 Published by Federal.
Emergency response or notifications are published to IG2 from IG3
IG3 A person can expect interactions with Federal (view summary total Receipts) in view form with
any response to Federal Tax inquiries from IG2 pushed to Federal in IG3 from the person or
parent on behalf of the child
IG4 Any issues identified by healthcare providers are pushed from IG 4 to IG3 with provider views
and interactions limited to IG4. A person will respond from IG3
IG5 Educators will report into IG3 from IG5 including any mandated reporter to community support
system (TBD)
IG6 Justice System reports into IG3 from IG6
WICKED 2014@copyright Lisa Martinez 408.638.9016
14. The Risk Potential Benefits
Current Culture
◦ You really need to understand your
workforce and culture
www.playprelude.com
◦ Breaking the glass before it
shatters on your organization
www.workplacebullying.com
Self worth and esteem
◦ Complimentary career paths
◦ Self regulate based on new
learning
◦ Sovereignty
Direct access with less
administrative barriers
Tribal run social services
Wholeness with children safer
Wellness Benchmarking
Lisa Martinez Wicked Design Solutions Copyright @ 2014
Emotional Health & Safety
15. Variables True or
False
None
Lives with both parents
Sustainable Income
Safe Child Care
Healthcare
Food
Housing
Education
Access to Grandparents
0-5 yrs.
k-5th
6-8th
9-12th
13-20th
Workforce
Seniors
Understanding the whole child to apply the right amount of effort to restore
wellness
Wellness Variables
16. Line Theme Activity
1 Understanding Yourself
Participants will reflect upon how their elemental iStar strengths are reflected in
their lives and the lives of those they know
2 Understanding Others
Using examples, prompts, and knowledge gained from Prelude, participants will
develop greater understanding of the way their co-workers see the world
3 Effective Communication
Participants will reflect on what other personality types need to experience for
them to successfully share their ideas
4 Practical Application
Participants will choose from a roster of "test applications" and try to use their
Prelude knowledge for communication and collaboration
5
Self-Understanding &
Advancement
Using what they have learned, participants will develop some personal action
steps that allow them to better meet personal goals and contribute to their team.
iStar
Self
Exploration
iTag
Self
Expression
weTag
Team Work
allTag
Group Work
Star Smart
Mendela
Cross cultural benchmarking strengths may serve as a tool to aid mental health scenarios.
Self - Awareness
17. Person Centered Income from Federal
Person New
0-5 X
K-5 0
6-8 0
9-12 X
13-20 X
Workforce O
Seniors X
Adopting NIEM
◦ Using Pattern Language
Intimacy Gradient
◦ Personal Cloud
Resilience
◦ Title IV
Families from birth – parentage
Child support and Foster Care in
tribal territory
TANF
CDD
DHS
IRS
CFP
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Expected =x
Optional = 0
Person Segments for agent
Populations or a person
NIEM Capability
18. Proven Models – Adopting Child and Adult (seniors)
◦ Food program
Reviewed or recommended based on whether other counties have the same
service organization.
Reviewed based on ability to adopt NIEM with Minute Menu
Prelude-Self, how I want others to see me, like minded Teams and others
Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
CDD
DHS
IRS
CFP
Benefits 0-5
years
K-5 6-8 9-12 13-16 Workforce Seniors
Cyber Security and Open Source Design X X X X X X X
Child Care – Family home care new business – Livescan X X X
Families First – Birth to five year Community Support
w/Prelude
X X X X
Early Detection-certification Physical Safety and Health Life X
Violence Detection – Physical Safety and Health Life X X X X
Food Program – Physical Safety and Health LIfe X X X
Cyber threat and online reputation Economic and Social Life X X
Assumptions – Benefits Map
19. Variables in Crisis Prevent Mitigate Respond Recover
Lives with both parents x x
Financial Sustainability x xx xx
Safe Child Care x x xx xx
Healthcare x xx xx xx
Food x xx xx xx
Housing x xx xx xx
Education x x xx xx
Access to Grandparents x xx x x
Lisa Martinez Wicked Design Solutions Copyright @ 2014
Concept Map Crisis Awareness and Challenge Offer
20. Federal Contract Scalability Development Validate Scale Up
TANF (a), (b),
(c) & (e)
Region
State Nation
or World
Plus
I3 Innovation
CAFP
Food Program
Region
State
Nation or
World
Plus
I3 Innovation
Teacher
Development
Region
State Nation
or World
Play Prelude
22. People interact in the information, content(application or a
combination of information and knowledge), knowledge and
record domains
23. Recent Terms to become familiar with; introduced by the
report to the President May 2014.
◦ Born Digital
◦ Born Analog
◦ Friendly Cameras
Distinguishing the known in a way that enables informed
decision making according to the two dimensions of human
interactions with or without machines.
◦ to a person as a citizen
◦ a person as an agent with roles and interactions with an organization
or agency.
24. Data
Raw Format
Applications
(information
and
Knowledge)
Content
Knowledge
(Content and
Information)
Information
(Documents)
Records
Display
User Transactional
User
Management
user
Company LDAP
or AD account
X X –Restricted
group see
Sarbanes Oxley
rules
Network IP and
Host
X X
Secure access
certificate or Key
X X
Monitor and
Design
Key Controls
SOD
404 Assurances
Any financial
Management,
based on roles
based access
Any create, read,
update or archive
Financial
Management
Quality
Management
Employee
Performance
All request are
pre-authorized
and validated
All approvals are
approved or
delegated to a
person with same
or greater
authority.
Asset Device Any organization
or agency
supplied
Any organization
or agency
supplied
25. Assume the conceptual model will converge into the data.
◦ In these materials we assume data represents content in many forms
when presented to a user who may have no technology experience.
◦ The following table suggest a person will potentially never understand
and not need to understanding that the four domains are also data.
View(s) Organization
or Agency
Content Information Knowledge Records
Person as
an
individual
No Video or Audio
or digital data in
an application
or other form of
presentation
Video or Audio
or digital data in
an application or
other form of
presentation
Video or Audio
or digital data in
an application
or other form of
presentation
An official recording of an
event or transaction which
requires validation and
reporting to regulatory
authorities.
Person as
an Agent
Yes Video or Audio
or digital data in
an application
or other form of
presentation
Video or Audio
or digital data in
an application or
other form of
presentation
Video or Audio
or digital data in
an application
or other form of
presentation
An official recording of an
event or transaction which
requires validation and
reporting to regulatory
authorities.