SlideShare a Scribd company logo
Strategy and Planning
Cloud Capabilities with Student Led Engineering Simulations
Wicked 2014 @ Copyright Lisa Martinez 408.638.9016
We will design the way service providers will publish
We will design the way a citizen will validate
We will design in a way to meet any industry and any geography
Limitations are geographical regulations and the design assumes
the need to practice local laws.
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
 Planning consistently, by assuming communications and
other media needs to be structured differently.
◦ Based on lifecycle approach
 System Thinking rather than focused on the parts
 The first phases of our programs will not focus on parts, while
knowing parts are required as building blocks.
◦ Out of scope any unique industry or sector requirements
◦ Priority replicate many first and the local preferences are left for the
local teams
 Understanding the thematic for wellness using IT Service
Management for People in a Business Service with Intimacy
Gradient Layer in a design pattern.
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Based on the highest threat variable
associated with government waste
Federal to Local Thematic for Wellness
 Today, we are frustrated with
government
 The government provides us
with the vital needs.
 We need a more direct route to
the sponsoring government
 We don’t want the government
spying.
◦ Why would you think you can?
Economic
Safety
Healthcare
Family
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Person Centered New Security and Resilience
Person New
0-5 X
K-5 O
6-8 O
9-12 X
13-16 X
Workforce X
Seniors X
 Adopting NIEM
◦ Using Pattern Language
◦ Personal Cloud
 TMN Server – Linux
 Resilience
◦ Crisis
 Violence
 Prevent
 Respond
 Monitor
CDD
DHS
IRS
CFP
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Expected =x
Optional = 0
Variables Access None
Lives with both parents
Sustainable Income
Safe Child Care
Healthcare
Food
Housing
Education
Access to Grandparents
0-5 yrs.
k-5th
6-8th
9-12th
13-16th
Workforce
Seniors
Understanding the whole child or person to apply the right amount of effort to restore wellness
WICKED 2014@copyright Lisa Martinez 408.638.9016
 Proven Models
◦ Reviewed or recommended based on whether other counties have
the same service organization.
◦ Reviewed based on ability to adopt the same cloud service model.
◦ Based on flexibility in local decisions.
Copyright @2014 Wicked Design Solutions Lisa Martinez 408-638-9016
CDD
DHS
IRS
CFP
Benefits 0-5
years
K-5 6-8 9-12 13-16 Workforce Seniors
One Record Personal Cloud
Prelude – Team Career
X X X X X X X
Safe Child Care - CPR X X X
Taxes – linked to childcare X X X X
Early Detection-certification X
Violence Detection X X X X
Food Program X X X
Cyber threat awareness X X
Framework
High Performance Computing
Design Patterns
Families from
Birth Title IV
Nutrition Food
Services
Supported
By
Mentored
By
Zero to
Five
K-5th 6-8th 9-12th 13-20th Workforce Seniors
1. Design Vision and Strategy
WICKED 2014@copyright Lisa Martinez 408.638.9016
All humans grouped for a minimum viable system
Students
 Doesn’t a system approach make it harder for people?
◦ Doing the right things are sometimes harder, not in the solution
proposed herein.
◦ Doing the right thing at the right time is easier than cleaning up a
mess or the system of messes.
 In this model we leverage a per cloud solution (proposed)
with a way for parents to confirm who has the right to access
their child records.
◦ In this model, we set up the same configuration from zero to seniors
 Identifying the debt only population for assurance of policy based access.
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
• Modeling by Groups or super-systems
• How are we marketing to which groups of consumers?
• Male and Female
• Minors and Adults
• How are we improving?
• Are we meeting legal and financial obligations?
• Are we secure and sustainable?
• Are we socially Responsible?
Gender
Re-use What We Know
We will learn
through out
our life.
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
From a small business to any size
up to the largest Enterprise size
company.
People are associated with one of
the groups in a longitude structure
for use as an individual or an agent
in a population.
The standard structure enables re-
use and effective planning based on
the audience.
The first four groups are protected
in all cases and must have an
associated authorization from a
parent on all programs.
We must protect children online
Return on Investment
How do I know if the information is true?
Integrity of a population simulation.
Answer: Population Data must be sourced
from the “US Census Bureau”
Engineering
Course
Urban Planning
and Monitoring
Segmentation – Can Protect threats against a child by filtering
Measuring Gains or
adjust based on
population culture or
motivation
techniques
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
 Segments which are known to be high risk threat vectors
◦ Assume each grouping is a fixed representation of an audience with
purpose including known research interview techniques for working
with children or seniors.
◦ Assume each grouping has known groups in each population targeted
by white collar criminals
 Seniors
 Children ages 0-5 year old
◦ Assume a different approach in communication by age and another
cultural, economic and geographical
 Development of games or social media venues for children
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Trusted and regulated source during
crisis or everyday life.
One set of building blocks used
universally
WICKED 2014@copyright Lisa Martinez 408.638.9016
 Understanding the common variables with an application of search
tags to enable multi-generational and cross-border association of
the shared for a minimum viable system model.
◦ Experience based learning in a model designed for rapid expansion and
local customization.
◦ Teaching students with hands on learning using open source solutions from
the wisdom of the most recognized experts in these various fields.
◦ Understanding the semantics and stage of an existing practice does not
need its own standard.
 In fact, using the approach will cause a train wreck.
 Big data offers an example of the subject
WICKED 2014@copyright Lisa Martinez 408.638.9016
Person Centered Design Service Providers responsibility
 Security and Privacy are inter-
dependent
◦ Both topics are best supplied as a
wrapper or layer designed for the
rule and assumption must be
made in all solutions.
 Privacy
◦ Managed via a NIEM service xml
as the data collected has the most
granular release of information
based on each data owner in the
collection.
 Any use case
◦ A filter needs to be applied by all
organizations and agencies to
eliminate risk being brought into the
boundaries by an agent who either
has access or works for under a
legal arrangement.
 It’s the law
 Only people who have been
authorized and for a specific purpose
have a specific use.
 The data owner is the citizen
◦ Using NIEM assumes the granularity
for the data owner protections
Access Group X
Roles Based Access X
Policy Based Access X
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
WICKED 2014@copyright Lisa Martinez 408.638.9016
Content Id
no private
information
public life
Private
life
economic
life
social life
family life
health
and safety
life
2013 @ Copyright WICKED Design Solutions
Type 2
diabetic
Physician
A manager in
retail
A major
retailer
IGL6 - 7
Public
IGL1-3
Private
IGL4-5
Private
XPublic and Private
X XCultural and Family
Health and Safety
Economic and Social
Online Wellness Grid
ZerotoFive
K-5thGrade
6th-8th
Grade
9th-12th
Grade
13-20th
grade
Workforce
Seniors
Offer 1 Big Data Science and Data Centers
Offer 2 A Minimum Viable System Social Engineering
X
Offer 3 Cloud with Service Management
X
Offer 4 Innovation Incubator
Research – Multi-disciplinary and cross geography
Legend
Canada
Australia(state)
Central Asia
Southern Asia
Middle east Asia
Southeast Asia
China and Mongolia
Wicked Design Solutions
Lisa Martinez Copyright @ 2014
All Local Regional National World
X X X X X X X X X X X X X X X X
Text
Text
Text
Text
Doctorate
Workforce
Employee
Developmen
t
Early
Childhood
0-5 year olds
K-5th
Grade
Elementary
School
6-8th Grade
Middle School
9-12th Grade
High School
13-14th
Grade
Community
College
15-18th
University
System Approach to Learning and Planning
Ensure ethical marketing, advertising and research for all private and public
sector delivery and investment planning.
Limitations on Objective Research
Research on Children is very subjective according to the vast research on the
subject.
Experts are in consensus on the FACTS associated with research on children.
The first question asked by an expert would likely be which method of
interviewing was used?
What techniques and how was the decision criteria made on which technique
was appropriate?
Ethical Interviewing
Perhaps the expert may want to review the research plan.
the children were interviewed and what credentials the person had performing
the interviews.
Ethical Interviewing techniques must be used or the outcomes are a threat to
children and their families.
Early Childhood Development
Preschool Readiness assessments are vital to the parents and providers must
be well trained, ideally certified in special needs detection and assessments.
Early childhood development and identification of any delays or disabilities has
been a great way to prepare parents for individual learning plans or special
education needs for their child.
Private and Public Sector - On line Child Protection Framework
Game Developers in Education must use ethical practices and be held
accountable to avoid research based games.
Machine Learning for example cannot be programmed to make ethical
decisions about the child or responses the child gives. Nor does an algorithm
have the ability to know when a child should be removed from a research
study.
The ability to target the types of research based on what we know, reduces
risk when developing games or offers for education.
Research and Delivery ConsiderationsTechnology - Online Child Protection Framework
Citizens and Consumers are at risk
billions of records are retrieved by
hackers almost daily
Fraud or reporting in a virtual reality
versus FACTs has a far greater
impact on the economic health than
we currently understand.
Recent supreme court rulings support
the NSA programs around
surveillance to end.
International Human Rights goals
were rescheduled to March 2014
Provisioning the enterprise business
data in technology, from the strategy
phase define the business service
which can be applied to all users and
do not deviate.
The five capabilty model enables far
better access and privacy controls.
Data can be of no value, often used in
the wrong context, with no way to
enforce or define the ways to abuse.
Privacy and Data seem unrelated in
most peoples minds these are unique
situations.
P
E
S
T
Lisa Martinez Wicked Design Solutions Copyright @ 2014
• Personal Privacy according
to the 4th amendment
• Acknowledged by all just in
the past weeks
• Many elected officials are
unaware of the problem
• Those who know about it are
unaware of the severity of the
problem.
• Media and Advertising
practices will need to change.
• The problem reported about
the government spying (NSA
problem) was the introduction
to what has revealed itself as
a Wicked Problem.
P
Political
• Privacy isn't part of the
technology vocabulary
• Every data owner will want
individual encryption.
• We are not even close on the
topic in technology.
• We are building security solutions
as a response to threats.
• We rarely connect
data>information>knowledge>wis
dom
• We rarely use data dictionaries in
application implementations.
• We have exploits and Trojans
used in advertising simply
changing the name to allow the
unwanted behavior.
• There are technology or business
people.
• Technology experts have another
set of layers within the practices,
generally expertise is by
technology.
• Enterprise or Platform
• Platform or technology
• Technology or Functional
• All need security, all overlook the
data element.
T
Technological
• People have diverse opinions
about privacy.
• If you have never been a
victim of identity theft you are
least likely to be concerned.
• People are adverse to
government spying yet unable
to imagine companies as
threats either.
• We must understand the
impact on immigration
practices, when we bring
people from regions where
laws are more spiritual than
the types we enjoy in the US.
• We as humans have a right to
privacy under international
law, our problem isn't
needing laws. We need
to have laws enforced.
• Victims of crime are at risk
• Disabled persons are at risk
• Children are at risk
S
Sociological
• The economic life of the
average citizen has severely
degraded.
• Identity theft is no longer
within our control.
• Reputation risk are far
greater when we have no
way to know what might exist
on the web.
• We have no idea what a
recruiters ideas are about
morality
• The opportunity to commit
fraud against the average
consumer has risen.
• SASB has increased a
number of controls to better
manage the types of fraud
we see.
• No card present fraud
• Credit agencies targeted for
key logger exploits
• Social Engineering attacks
E
Economic
Lisa Martinez Wicked Design Solutions Copyright @ 2014
Prevent and Detect
Crisis
Management
Local control by
economic
Discreet
Intervention
Supporting
Roles
Crisis Tiers
(level 1, level
2 etc)
Teams by
Severity
Roles and
Competencies
Crisis
Caused by
Natural
Disaster
Crisis caused
by a
Human(s)
Develop
Communication
System
Contain Threat
Social Media
Strategy
Crisis caused
by Terrorist
or War
Recover
Continuous
Improvement
Change
End
Go To Changes
Google+
Define Types of
Crisis
Idea
Crisis caused
by Industrial
Disaster
Privacy-
Monitoring
Behaviors
Develop Recovery
Plan and Strategy
Lisa Martinez Wicked Design Solutions Copyright @ 2014
Concept Map Crisis Awareness and Challenge Offer
WICKED 2014@copyright Lisa Martinez 408.638.9016
Child
No
Yes
1
Do
nothing 2
Human ecology workforce bullying
Human ecology diversity and inclusion better
interactions
1 Health
2 Education
3 Housing
4 Family
No
Yes
Father role from the start, legal, emotional and
presence
Investigate a safe place for both parents to act in the childs
interest
Child has access to both parents Success
Mental Halth and Self Esteem
Crisis Management
Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
Crisis
Escalates a risk to crisis
when external stakeholders
are threatens life or liberties
Risk
Problem upgrades to a risk
May reach a customer or supplier
Detected by prevent and detect
controls
Problem
More than three users
More than three incidents
Unrelated or ongoing issue
Incident reported by a person
Minimum
Viable System Model
a universal crisis management service
We must assume the most difficult part of change has always been the people changes, mental models or ways we manage our work and
tools are meant to improve our process work. Design for the rule and enable variance, with an exception path for systematic self governing
systems.
When you can show value and gain buyin before changing the users environment you are far more likely to succeed.
Using a consistent framework for both personal and technical issues allows us to manage expectations better and re-use the same tools in
various responding services.
WICKED 2014@copyright Lisa Martinez 408.638.9016
Crisis Preparedness
Minimum Viable Systems
• Ensure access to family
life – people, car and home
• economic life access to
work and financials
• health life – doctors
• private life – Employer
• public life - Social Media
• Devices – Phone and
provider
Locator – how does this help
in a crisis?
Re-use emergency response
service on NIEM
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Cloud Capability Private Clouds
 Central Child Care Store in
◦ Washington, DC
 Determine Resilience Planning and
Service Level Agreements
 Federal Child Nutrition Program
◦ URL access from any location
 Setup master once from any existing
Title IV, Title I or Title IX federal
program
◦ Children in Family or Center based
Childcare
◦ Seniors – Adult Care
 Providers are not hosting any data
locally
◦ Software as a Service
◦ Authenticate based on bio-metrics
 with a NIEM
 An open source model intends to
create personal cloud concepts
with intimacy gradient levels to
interact with the public and private
sectors
 Requires a host provider who will
honor privacy
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Privacy as it relates to person’s as an
individual
Protected Personal Identifiable
Information
WICKED 2014@copyright Lisa Martinez 408.638.9016
 Young women are targeted by stalkers and human traffickers
◦ Enforce laws protecting citizens from others who use locator features
◦ Enable citizens who are not benefiting and prefer to manage identity theft threats
by avoiding the problem managing public and private life as the data owner.
◦ In many communities the system has failed victims, causing a drop in reported
crimes of sexual violence.
 Protecting targets of financial crimes is an international
priority and serious threat to everyone.
◦ An ability to acquire adequate employment or prevent false acquisitions have
become the attractor for organized criminal networks
Enforcing laws far too many are able to put at risk in the current model
Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
David Ing – INCOSE 2014 Intimacy Gradient
 By Lisa Martinez Copyright 2014 @ Wicked Design Solutions
Proposed design for NIEM groups
 Managing my identity
◦ Intimacy Gradient Level 1 without technology
◦ Intimacy Gradient Level 2 with technology as
an individual
 With Dependent children or dependent adult
(probate)
Access Group X
Tax Debt X
Healthcare X
Education X
Justice System X
Federal, State, Local X
**Pattern Language and Intimacy Gradient per David Ing System Science Society speaker – January 2014 Incose
Geographic 01 Self 02 Child 03 Tax 04 HCA 05 EDU 06 JUS
Nation Validate Validate Validate Validate Validate Validate
State/Tribal Validate Validate Validate Validate Validate Validate
County Validate Validate Validate Validate Validate Validate
City Validate Validate Validate Validate Validate Validate
WICKED 2014@copyright Lisa Martinez 408.638.9016
IG6
IG5
IG4
IG3
IG2
IG1
IG Level “Who” can be assigned to a group
IG1 Private a person is alone without devices
IG2 Private with Device and in own domain
IG3 Federal Tax pushes to view in IG2
IG4 Medical and Mental Health with in IG4 with
inputs to IG3
IG5 Education and Mandated Reporters push to IG3
and interact in IG5
IG6 Justice System “Pushes to” IG3 with interactions
in IG6
*See NIEM recovery use case assumes all IG2-5 data secured by region
Per Cloud
WICKED 2014@copyright Lisa Martinez 408.638.9016
IG6
IG5
IG4
IG3
IG2
IG1
IG Level “Who” can be assigned to a group
IG1 Private a person is alone without devices
IG2 Private with Device and in own domain
IG3 Federal Tax pushes to view in IG2
IG4 Medical and Mental Health with in IG4 with
inputs to IG3
IG5 Education and Mandated Reporters push to IG3
and interact in IG5
IG6 Justice System “Pushes to” IG3 with interactions
in IG6
*See NIEM recovery use case assumes all IG2-5 data secured by region
WICKED 2014@copyright Lisa Martinez 408.638.9016
Economic Life Tax
Employment IG4
Culture and
Family Life
IG3
a person
as a
Citizen
IG2
Public and
Private Life
Health and
Safety
IG5
Private Life
Education IG6
Social and
Public Life
IG7
Federal
Commerce – Tax
Healthcare and
Insurance
Education and justice
Roads and
Infrastructure
State
Federal summary
segmented by state
any additional state
contributions
Commerce tax by
state etc
Local
Federal Summary
segmented by State
state summary
segmented by county
with any local
contributions
*Grouping for Pattern Language Standards according to generic themes highlighted by the Women’s Law
Work Group 2013 Report UN meetings in NY
**Each layer in government has contributions to each theme while one owns the integrity and quality of
Privacy related data
WICKED 2014@copyright Lisa Martinez 408.638.9016
Intimacy Gradient Levels (NIEM group)
 Whole government moves from high cost low
enforcement and low effectiveness in government
 action ready using EA as the transformation opportunity
A hierarchy of authority implies the top level rules are adopted at the lowest level
 Intimacy gradient level 90 Federal
 Intimacy gradient level 91 state
 Intimacy gradient level 92 county
 Intimacy gradient level 93 city
 Intimacy gradient level 94 community
 assume Facebook, Google+, Twitter, Yahoo, Instagram, About.me with public access
to minimal viable information based on NIEM adoption.
Local control would only be achieved through adoption of standards universally
Access Group X
Tax Debt X
Healthcare X
Education X
Justice System X
Federal, State, Local X
WICKED 2014@copyright Lisa Martinez 408.638.9016
IG Level Assumptions
IG1 A person has every expectation of privacy and technology has no viable reason for
capture or retention.
IG2 A person expects interactions may be monitored for intelligence purposes although
Federal limitations. Specific to tax payer service layer inputs from IG3 to IG2
Published by Federal. Emergency response or notifications are published to IG2
from IG3
IG3 A person can expect interactions with Federal (view summary total Receipts) in
view form with any response to Federal Tax inquiries from IG2 pushed to Federal in
IG3 from the person or parent on behalf of the child
IG4 Any issues identified by healthcare providers are pushed from IG 4 to IG3 with
provider views and interactions limited to IG4. A person will respond from IG3
IG5 Educators will report into IG3 from IG5 including any mandated reporter to
community support system (TBD)
IG6 Justice System reports into IG3 from IG6
 By Lisa Martinez Copyright 2014 @ Wicked Design Solutions
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016

More Related Content

Viewers also liked

2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data
MrsAlways RigHt
 
4. Five Capability
4. Five Capability 4. Five Capability
4. Five Capability
MrsAlways RigHt
 
Astrology Tantra Solution Remedies
Astrology Tantra Solution RemediesAstrology Tantra Solution Remedies
Astrology Tantra Solution Remedies
DR.RUPAK NATH,MS;PhD DR.RUPNATHJI(DR.RUPAK NATH).
 
Great Important books on top secret topics by dr.rupnathji ( dr.rupak nath )
Great Important books on top secret topics by dr.rupnathji ( dr.rupak nath )Great Important books on top secret topics by dr.rupnathji ( dr.rupak nath )
Great Important books on top secret topics by dr.rupnathji ( dr.rupak nath )
DR.RUPAK NATH,MS;PhD DR.RUPNATHJI(DR.RUPAK NATH).
 
Kamakhya Temple Ameti or Tantric Fertility Festival Mela Parv Ambuvachi Ambub...
Kamakhya Temple Ameti or Tantric Fertility Festival Mela Parv Ambuvachi Ambub...Kamakhya Temple Ameti or Tantric Fertility Festival Mela Parv Ambuvachi Ambub...
Kamakhya Temple Ameti or Tantric Fertility Festival Mela Parv Ambuvachi Ambub...
DR.RUPAK NATH,MS;PhD DR.RUPNATHJI(DR.RUPAK NATH).
 
Scholar
ScholarScholar

Viewers also liked (7)

2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data
 
4. Five Capability
4. Five Capability 4. Five Capability
4. Five Capability
 
Astrology Tantra Solution Remedies
Astrology Tantra Solution RemediesAstrology Tantra Solution Remedies
Astrology Tantra Solution Remedies
 
Great Important books on top secret topics by dr.rupnathji ( dr.rupak nath )
Great Important books on top secret topics by dr.rupnathji ( dr.rupak nath )Great Important books on top secret topics by dr.rupnathji ( dr.rupak nath )
Great Important books on top secret topics by dr.rupnathji ( dr.rupak nath )
 
Kamakhya Temple Ameti or Tantric Fertility Festival Mela Parv Ambuvachi Ambub...
Kamakhya Temple Ameti or Tantric Fertility Festival Mela Parv Ambuvachi Ambub...Kamakhya Temple Ameti or Tantric Fertility Festival Mela Parv Ambuvachi Ambub...
Kamakhya Temple Ameti or Tantric Fertility Festival Mela Parv Ambuvachi Ambub...
 
All Problem Solution Astrology Tantra Black Magic Vashikaran Remedy Specialist
All Problem Solution Astrology Tantra Black Magic Vashikaran Remedy SpecialistAll Problem Solution Astrology Tantra Black Magic Vashikaran Remedy Specialist
All Problem Solution Astrology Tantra Black Magic Vashikaran Remedy Specialist
 
Scholar
ScholarScholar
Scholar
 

Similar to 1. design strategy and vision for crisis management

5. shared service business offers capacity and crisis
5. shared service business offers capacity and crisis5. shared service business offers capacity and crisis
5. shared service business offers capacity and crisis
MrsAlways RigHt
 
6. cloud offers hca edu doj
6. cloud offers hca edu doj6. cloud offers hca edu doj
6. cloud offers hca edu doj
MrsAlways RigHt
 
3. Identity, Awareness and Design Patterns
3. Identity, Awareness and Design Patterns3. Identity, Awareness and Design Patterns
3. Identity, Awareness and Design Patterns
MrsAlways RigHt
 
A system approach to cyber security
A system approach to cyber securityA system approach to cyber security
A system approach to cyber security
MrsAlways RigHt
 
7. Big data proposal to go lean in public
7. Big data proposal to go lean in public7. Big data proposal to go lean in public
7. Big data proposal to go lean in public
MrsAlways RigHt
 
Stefano Testas | CIsco | Big Data
Stefano Testas | CIsco | Big DataStefano Testas | CIsco | Big Data
Stefano Testas | CIsco | Big DataSmash Tech
 
Digital Transformation in Higher Education - The Changing Student Relationship
Digital Transformation in Higher Education - The Changing Student RelationshipDigital Transformation in Higher Education - The Changing Student Relationship
Digital Transformation in Higher Education - The Changing Student Relationship
Andy Steer
 
Creating Mobile Experience
Creating Mobile ExperienceCreating Mobile Experience
Creating Mobile Experience
Cisco Middle East
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
Sravan Ankaraju
 
People part of the equation
People part of the equationPeople part of the equation
People part of the equation
MrsAlways RigHt
 
Futureproof Your Business For The Next Disruption #SXSW2018
Futureproof Your Business For The Next Disruption #SXSW2018Futureproof Your Business For The Next Disruption #SXSW2018
Futureproof Your Business For The Next Disruption #SXSW2018
Minter Dial
 
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Saurabh Mishra
 
Accenture Public Service Citizen Survey: Public Administration
Accenture Public Service Citizen Survey: Public AdministrationAccenture Public Service Citizen Survey: Public Administration
Accenture Public Service Citizen Survey: Public Administration
accenture
 
Big Data Analytics: Challenge or Opportunity?
Big Data Analytics: Challenge or Opportunity?Big Data Analytics: Challenge or Opportunity?
Big Data Analytics: Challenge or Opportunity?
NUS-ISS
 
Data for Impact Fellowship - SocialCops Careers
Data for Impact Fellowship - SocialCops CareersData for Impact Fellowship - SocialCops Careers
Data for Impact Fellowship - SocialCops Careers
SocialCops
 
Learning On The Go: Leverage Mobile Computing in the Workplace
Learning On The Go: Leverage Mobile Computing in the WorkplaceLearning On The Go: Leverage Mobile Computing in the Workplace
Learning On The Go: Leverage Mobile Computing in the Workplace
Saba Software
 
Setting up an International Innovation Incubator
Setting up an International Innovation IncubatorSetting up an International Innovation Incubator
Setting up an International Innovation Incubator
MrsAlways RigHt
 
Verizon Powerful Answers Award 2014 Hints and Tips-- How to Win!
Verizon Powerful Answers Award 2014 Hints and Tips-- How to Win!Verizon Powerful Answers Award 2014 Hints and Tips-- How to Win!
Verizon Powerful Answers Award 2014 Hints and Tips-- How to Win!
Jeff Medaugh
 
Real-World Data Governance: The Data Governance Road Show from DGIQ – Intervi...
Real-World Data Governance: The Data Governance Road Show from DGIQ – Intervi...Real-World Data Governance: The Data Governance Road Show from DGIQ – Intervi...
Real-World Data Governance: The Data Governance Road Show from DGIQ – Intervi...DATAVERSITY
 

Similar to 1. design strategy and vision for crisis management (20)

5. shared service business offers capacity and crisis
5. shared service business offers capacity and crisis5. shared service business offers capacity and crisis
5. shared service business offers capacity and crisis
 
6. cloud offers hca edu doj
6. cloud offers hca edu doj6. cloud offers hca edu doj
6. cloud offers hca edu doj
 
3. Identity, Awareness and Design Patterns
3. Identity, Awareness and Design Patterns3. Identity, Awareness and Design Patterns
3. Identity, Awareness and Design Patterns
 
A system approach to cyber security
A system approach to cyber securityA system approach to cyber security
A system approach to cyber security
 
7. Big data proposal to go lean in public
7. Big data proposal to go lean in public7. Big data proposal to go lean in public
7. Big data proposal to go lean in public
 
Stefano Testas | CIsco | Big Data
Stefano Testas | CIsco | Big DataStefano Testas | CIsco | Big Data
Stefano Testas | CIsco | Big Data
 
Digital Transformation in Higher Education - The Changing Student Relationship
Digital Transformation in Higher Education - The Changing Student RelationshipDigital Transformation in Higher Education - The Changing Student Relationship
Digital Transformation in Higher Education - The Changing Student Relationship
 
Creating Mobile Experience
Creating Mobile ExperienceCreating Mobile Experience
Creating Mobile Experience
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
People part of the equation
People part of the equationPeople part of the equation
People part of the equation
 
Futureproof Your Business For The Next Disruption #SXSW2018
Futureproof Your Business For The Next Disruption #SXSW2018Futureproof Your Business For The Next Disruption #SXSW2018
Futureproof Your Business For The Next Disruption #SXSW2018
 
Pcd gov v3
Pcd gov v3Pcd gov v3
Pcd gov v3
 
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
 
Accenture Public Service Citizen Survey: Public Administration
Accenture Public Service Citizen Survey: Public AdministrationAccenture Public Service Citizen Survey: Public Administration
Accenture Public Service Citizen Survey: Public Administration
 
Big Data Analytics: Challenge or Opportunity?
Big Data Analytics: Challenge or Opportunity?Big Data Analytics: Challenge or Opportunity?
Big Data Analytics: Challenge or Opportunity?
 
Data for Impact Fellowship - SocialCops Careers
Data for Impact Fellowship - SocialCops CareersData for Impact Fellowship - SocialCops Careers
Data for Impact Fellowship - SocialCops Careers
 
Learning On The Go: Leverage Mobile Computing in the Workplace
Learning On The Go: Leverage Mobile Computing in the WorkplaceLearning On The Go: Leverage Mobile Computing in the Workplace
Learning On The Go: Leverage Mobile Computing in the Workplace
 
Setting up an International Innovation Incubator
Setting up an International Innovation IncubatorSetting up an International Innovation Incubator
Setting up an International Innovation Incubator
 
Verizon Powerful Answers Award 2014 Hints and Tips-- How to Win!
Verizon Powerful Answers Award 2014 Hints and Tips-- How to Win!Verizon Powerful Answers Award 2014 Hints and Tips-- How to Win!
Verizon Powerful Answers Award 2014 Hints and Tips-- How to Win!
 
Real-World Data Governance: The Data Governance Road Show from DGIQ – Intervi...
Real-World Data Governance: The Data Governance Road Show from DGIQ – Intervi...Real-World Data Governance: The Data Governance Road Show from DGIQ – Intervi...
Real-World Data Governance: The Data Governance Road Show from DGIQ – Intervi...
 

More from MrsAlways RigHt

Enabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloudEnabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloud
MrsAlways RigHt
 
Human development cost of quality in a quantified world
Human development cost of quality in a quantified worldHuman development cost of quality in a quantified world
Human development cost of quality in a quantified world
MrsAlways RigHt
 
Bmsqms revisedwithchevrons
Bmsqms revisedwithchevronsBmsqms revisedwithchevrons
Bmsqms revisedwithchevrons
MrsAlways RigHt
 
9. foundation ea to 2 use cases
9. foundation ea to 2 use cases9. foundation ea to 2 use cases
9. foundation ea to 2 use cases
MrsAlways RigHt
 
Socialmediadashboard
SocialmediadashboardSocialmediadashboard
Socialmediadashboard
MrsAlways RigHt
 
Retail SWOT v.2
Retail SWOT v.2 Retail SWOT v.2
Retail SWOT v.2
MrsAlways RigHt
 
Crisis prevention and readinessv2foundation pmc
Crisis prevention and readinessv2foundation pmcCrisis prevention and readinessv2foundation pmc
Crisis prevention and readinessv2foundation pmcMrsAlways RigHt
 
Just wicked
Just wickedJust wicked
Just wicked
MrsAlways RigHt
 
High risk populations with NIEM
High risk populations with NIEMHigh risk populations with NIEM
High risk populations with NIEM
MrsAlways RigHt
 
Patterns within patterns in architecture v2
Patterns within patterns in architecture v2Patterns within patterns in architecture v2
Patterns within patterns in architecture v2
MrsAlways RigHt
 
Standards for a blue ocean
Standards for a blue oceanStandards for a blue ocean
Standards for a blue oceanMrsAlways RigHt
 
A wicked problem with perceptions
A wicked problem with perceptionsA wicked problem with perceptions
A wicked problem with perceptionsMrsAlways RigHt
 
Assume entity types offer management capability
Assume entity types offer management capabilityAssume entity types offer management capability
Assume entity types offer management capabilityMrsAlways RigHt
 
Government ICT Process Benchmarking
Government ICT Process BenchmarkingGovernment ICT Process Benchmarking
Government ICT Process Benchmarking
MrsAlways RigHt
 
Sustainable Architectures
Sustainable Architectures Sustainable Architectures
Sustainable Architectures
MrsAlways RigHt
 

More from MrsAlways RigHt (15)

Enabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloudEnabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloud
 
Human development cost of quality in a quantified world
Human development cost of quality in a quantified worldHuman development cost of quality in a quantified world
Human development cost of quality in a quantified world
 
Bmsqms revisedwithchevrons
Bmsqms revisedwithchevronsBmsqms revisedwithchevrons
Bmsqms revisedwithchevrons
 
9. foundation ea to 2 use cases
9. foundation ea to 2 use cases9. foundation ea to 2 use cases
9. foundation ea to 2 use cases
 
Socialmediadashboard
SocialmediadashboardSocialmediadashboard
Socialmediadashboard
 
Retail SWOT v.2
Retail SWOT v.2 Retail SWOT v.2
Retail SWOT v.2
 
Crisis prevention and readinessv2foundation pmc
Crisis prevention and readinessv2foundation pmcCrisis prevention and readinessv2foundation pmc
Crisis prevention and readinessv2foundation pmc
 
Just wicked
Just wickedJust wicked
Just wicked
 
High risk populations with NIEM
High risk populations with NIEMHigh risk populations with NIEM
High risk populations with NIEM
 
Patterns within patterns in architecture v2
Patterns within patterns in architecture v2Patterns within patterns in architecture v2
Patterns within patterns in architecture v2
 
Standards for a blue ocean
Standards for a blue oceanStandards for a blue ocean
Standards for a blue ocean
 
A wicked problem with perceptions
A wicked problem with perceptionsA wicked problem with perceptions
A wicked problem with perceptions
 
Assume entity types offer management capability
Assume entity types offer management capabilityAssume entity types offer management capability
Assume entity types offer management capability
 
Government ICT Process Benchmarking
Government ICT Process BenchmarkingGovernment ICT Process Benchmarking
Government ICT Process Benchmarking
 
Sustainable Architectures
Sustainable Architectures Sustainable Architectures
Sustainable Architectures
 

Recently uploaded

Founder-Game Director Workshop (Session 1)
Founder-Game Director  Workshop (Session 1)Founder-Game Director  Workshop (Session 1)
Founder-Game Director Workshop (Session 1)
Amir H. Fassihi
 
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
tdt5v4b
 
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish GermanCV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
EUS+ Management & Consulting Excellence
 
Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
Jim Smith
 
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
tdt5v4b
 
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
William (Bill) H. Bender, FCSI
 
Training- integrated management system (iso)
Training- integrated management system (iso)Training- integrated management system (iso)
Training- integrated management system (iso)
akaash13
 
TCS AI for Business Study – Key Findings
TCS AI for Business Study – Key FindingsTCS AI for Business Study – Key Findings
TCS AI for Business Study – Key Findings
Tata Consultancy Services
 
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
tdt5v4b
 
Protected Workmen required today for growth
Protected Workmen required today for growthProtected Workmen required today for growth
Protected Workmen required today for growth
rivaraj2711
 
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
gcljeuzdu
 
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
tdt5v4b
 
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
juniourjohnstone
 
W.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest ExperienceW.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest Experience
William (Bill) H. Bender, FCSI
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
Muhammad Adil Jamil
 
Case Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of ManagementCase Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of Management
A. F. M. Rubayat-Ul Jannat
 

Recently uploaded (16)

Founder-Game Director Workshop (Session 1)
Founder-Game Director  Workshop (Session 1)Founder-Game Director  Workshop (Session 1)
Founder-Game Director Workshop (Session 1)
 
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
 
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish GermanCV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
 
Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
 
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
 
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
 
Training- integrated management system (iso)
Training- integrated management system (iso)Training- integrated management system (iso)
Training- integrated management system (iso)
 
TCS AI for Business Study – Key Findings
TCS AI for Business Study – Key FindingsTCS AI for Business Study – Key Findings
TCS AI for Business Study – Key Findings
 
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
 
Protected Workmen required today for growth
Protected Workmen required today for growthProtected Workmen required today for growth
Protected Workmen required today for growth
 
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
 
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
 
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
 
W.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest ExperienceW.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest Experience
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
 
Case Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of ManagementCase Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of Management
 

1. design strategy and vision for crisis management

  • 1. Strategy and Planning Cloud Capabilities with Student Led Engineering Simulations Wicked 2014 @ Copyright Lisa Martinez 408.638.9016
  • 2. We will design the way service providers will publish We will design the way a citizen will validate We will design in a way to meet any industry and any geography Limitations are geographical regulations and the design assumes the need to practice local laws. Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
  • 3.  Planning consistently, by assuming communications and other media needs to be structured differently. ◦ Based on lifecycle approach  System Thinking rather than focused on the parts  The first phases of our programs will not focus on parts, while knowing parts are required as building blocks. ◦ Out of scope any unique industry or sector requirements ◦ Priority replicate many first and the local preferences are left for the local teams  Understanding the thematic for wellness using IT Service Management for People in a Business Service with Intimacy Gradient Layer in a design pattern. Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
  • 4. Based on the highest threat variable associated with government waste
  • 5. Federal to Local Thematic for Wellness  Today, we are frustrated with government  The government provides us with the vital needs.  We need a more direct route to the sponsoring government  We don’t want the government spying. ◦ Why would you think you can? Economic Safety Healthcare Family Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
  • 6. Person Centered New Security and Resilience Person New 0-5 X K-5 O 6-8 O 9-12 X 13-16 X Workforce X Seniors X  Adopting NIEM ◦ Using Pattern Language ◦ Personal Cloud  TMN Server – Linux  Resilience ◦ Crisis  Violence  Prevent  Respond  Monitor CDD DHS IRS CFP Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016 Expected =x Optional = 0
  • 7. Variables Access None Lives with both parents Sustainable Income Safe Child Care Healthcare Food Housing Education Access to Grandparents 0-5 yrs. k-5th 6-8th 9-12th 13-16th Workforce Seniors Understanding the whole child or person to apply the right amount of effort to restore wellness WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 8.  Proven Models ◦ Reviewed or recommended based on whether other counties have the same service organization. ◦ Reviewed based on ability to adopt the same cloud service model. ◦ Based on flexibility in local decisions. Copyright @2014 Wicked Design Solutions Lisa Martinez 408-638-9016 CDD DHS IRS CFP Benefits 0-5 years K-5 6-8 9-12 13-16 Workforce Seniors One Record Personal Cloud Prelude – Team Career X X X X X X X Safe Child Care - CPR X X X Taxes – linked to childcare X X X X Early Detection-certification X Violence Detection X X X X Food Program X X X Cyber threat awareness X X
  • 10. Families from Birth Title IV Nutrition Food Services Supported By Mentored By Zero to Five K-5th 6-8th 9-12th 13-20th Workforce Seniors 1. Design Vision and Strategy WICKED 2014@copyright Lisa Martinez 408.638.9016 All humans grouped for a minimum viable system Students
  • 11.  Doesn’t a system approach make it harder for people? ◦ Doing the right things are sometimes harder, not in the solution proposed herein. ◦ Doing the right thing at the right time is easier than cleaning up a mess or the system of messes.  In this model we leverage a per cloud solution (proposed) with a way for parents to confirm who has the right to access their child records. ◦ In this model, we set up the same configuration from zero to seniors  Identifying the debt only population for assurance of policy based access. Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
  • 12. • Modeling by Groups or super-systems • How are we marketing to which groups of consumers? • Male and Female • Minors and Adults • How are we improving? • Are we meeting legal and financial obligations? • Are we secure and sustainable? • Are we socially Responsible? Gender Re-use What We Know We will learn through out our life. Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
  • 13. Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016 From a small business to any size up to the largest Enterprise size company. People are associated with one of the groups in a longitude structure for use as an individual or an agent in a population. The standard structure enables re- use and effective planning based on the audience. The first four groups are protected in all cases and must have an associated authorization from a parent on all programs. We must protect children online Return on Investment How do I know if the information is true? Integrity of a population simulation. Answer: Population Data must be sourced from the “US Census Bureau” Engineering Course Urban Planning and Monitoring
  • 14. Segmentation – Can Protect threats against a child by filtering Measuring Gains or adjust based on population culture or motivation techniques Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
  • 15. Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
  • 16. Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
  • 17. Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
  • 18.  Segments which are known to be high risk threat vectors ◦ Assume each grouping is a fixed representation of an audience with purpose including known research interview techniques for working with children or seniors. ◦ Assume each grouping has known groups in each population targeted by white collar criminals  Seniors  Children ages 0-5 year old ◦ Assume a different approach in communication by age and another cultural, economic and geographical  Development of games or social media venues for children Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
  • 19. Trusted and regulated source during crisis or everyday life. One set of building blocks used universally WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 20.  Understanding the common variables with an application of search tags to enable multi-generational and cross-border association of the shared for a minimum viable system model. ◦ Experience based learning in a model designed for rapid expansion and local customization. ◦ Teaching students with hands on learning using open source solutions from the wisdom of the most recognized experts in these various fields. ◦ Understanding the semantics and stage of an existing practice does not need its own standard.  In fact, using the approach will cause a train wreck.  Big data offers an example of the subject WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 21. Person Centered Design Service Providers responsibility  Security and Privacy are inter- dependent ◦ Both topics are best supplied as a wrapper or layer designed for the rule and assumption must be made in all solutions.  Privacy ◦ Managed via a NIEM service xml as the data collected has the most granular release of information based on each data owner in the collection.  Any use case ◦ A filter needs to be applied by all organizations and agencies to eliminate risk being brought into the boundaries by an agent who either has access or works for under a legal arrangement.  It’s the law  Only people who have been authorized and for a specific purpose have a specific use.  The data owner is the citizen ◦ Using NIEM assumes the granularity for the data owner protections Access Group X Roles Based Access X Policy Based Access X Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
  • 22. WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 23. Content Id no private information public life Private life economic life social life family life health and safety life 2013 @ Copyright WICKED Design Solutions Type 2 diabetic Physician A manager in retail A major retailer IGL6 - 7 Public IGL1-3 Private IGL4-5 Private
  • 24. XPublic and Private X XCultural and Family Health and Safety Economic and Social Online Wellness Grid ZerotoFive K-5thGrade 6th-8th Grade 9th-12th Grade 13-20th grade Workforce Seniors Offer 1 Big Data Science and Data Centers Offer 2 A Minimum Viable System Social Engineering X Offer 3 Cloud with Service Management X Offer 4 Innovation Incubator Research – Multi-disciplinary and cross geography Legend Canada Australia(state) Central Asia Southern Asia Middle east Asia Southeast Asia China and Mongolia Wicked Design Solutions Lisa Martinez Copyright @ 2014 All Local Regional National World X X X X X X X X X X X X X X X X
  • 25. Text Text Text Text Doctorate Workforce Employee Developmen t Early Childhood 0-5 year olds K-5th Grade Elementary School 6-8th Grade Middle School 9-12th Grade High School 13-14th Grade Community College 15-18th University System Approach to Learning and Planning Ensure ethical marketing, advertising and research for all private and public sector delivery and investment planning. Limitations on Objective Research Research on Children is very subjective according to the vast research on the subject. Experts are in consensus on the FACTS associated with research on children. The first question asked by an expert would likely be which method of interviewing was used? What techniques and how was the decision criteria made on which technique was appropriate? Ethical Interviewing Perhaps the expert may want to review the research plan. the children were interviewed and what credentials the person had performing the interviews. Ethical Interviewing techniques must be used or the outcomes are a threat to children and their families. Early Childhood Development Preschool Readiness assessments are vital to the parents and providers must be well trained, ideally certified in special needs detection and assessments. Early childhood development and identification of any delays or disabilities has been a great way to prepare parents for individual learning plans or special education needs for their child. Private and Public Sector - On line Child Protection Framework Game Developers in Education must use ethical practices and be held accountable to avoid research based games. Machine Learning for example cannot be programmed to make ethical decisions about the child or responses the child gives. Nor does an algorithm have the ability to know when a child should be removed from a research study. The ability to target the types of research based on what we know, reduces risk when developing games or offers for education. Research and Delivery ConsiderationsTechnology - Online Child Protection Framework
  • 26. Citizens and Consumers are at risk billions of records are retrieved by hackers almost daily Fraud or reporting in a virtual reality versus FACTs has a far greater impact on the economic health than we currently understand. Recent supreme court rulings support the NSA programs around surveillance to end. International Human Rights goals were rescheduled to March 2014 Provisioning the enterprise business data in technology, from the strategy phase define the business service which can be applied to all users and do not deviate. The five capabilty model enables far better access and privacy controls. Data can be of no value, often used in the wrong context, with no way to enforce or define the ways to abuse. Privacy and Data seem unrelated in most peoples minds these are unique situations. P E S T Lisa Martinez Wicked Design Solutions Copyright @ 2014
  • 27. • Personal Privacy according to the 4th amendment • Acknowledged by all just in the past weeks • Many elected officials are unaware of the problem • Those who know about it are unaware of the severity of the problem. • Media and Advertising practices will need to change. • The problem reported about the government spying (NSA problem) was the introduction to what has revealed itself as a Wicked Problem. P Political • Privacy isn't part of the technology vocabulary • Every data owner will want individual encryption. • We are not even close on the topic in technology. • We are building security solutions as a response to threats. • We rarely connect data>information>knowledge>wis dom • We rarely use data dictionaries in application implementations. • We have exploits and Trojans used in advertising simply changing the name to allow the unwanted behavior. • There are technology or business people. • Technology experts have another set of layers within the practices, generally expertise is by technology. • Enterprise or Platform • Platform or technology • Technology or Functional • All need security, all overlook the data element. T Technological • People have diverse opinions about privacy. • If you have never been a victim of identity theft you are least likely to be concerned. • People are adverse to government spying yet unable to imagine companies as threats either. • We must understand the impact on immigration practices, when we bring people from regions where laws are more spiritual than the types we enjoy in the US. • We as humans have a right to privacy under international law, our problem isn't needing laws. We need to have laws enforced. • Victims of crime are at risk • Disabled persons are at risk • Children are at risk S Sociological • The economic life of the average citizen has severely degraded. • Identity theft is no longer within our control. • Reputation risk are far greater when we have no way to know what might exist on the web. • We have no idea what a recruiters ideas are about morality • The opportunity to commit fraud against the average consumer has risen. • SASB has increased a number of controls to better manage the types of fraud we see. • No card present fraud • Credit agencies targeted for key logger exploits • Social Engineering attacks E Economic Lisa Martinez Wicked Design Solutions Copyright @ 2014
  • 28. Prevent and Detect Crisis Management Local control by economic Discreet Intervention Supporting Roles Crisis Tiers (level 1, level 2 etc) Teams by Severity Roles and Competencies Crisis Caused by Natural Disaster Crisis caused by a Human(s) Develop Communication System Contain Threat Social Media Strategy Crisis caused by Terrorist or War Recover Continuous Improvement Change End Go To Changes Google+ Define Types of Crisis Idea Crisis caused by Industrial Disaster Privacy- Monitoring Behaviors Develop Recovery Plan and Strategy Lisa Martinez Wicked Design Solutions Copyright @ 2014 Concept Map Crisis Awareness and Challenge Offer
  • 29. WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 30. Child No Yes 1 Do nothing 2 Human ecology workforce bullying Human ecology diversity and inclusion better interactions 1 Health 2 Education 3 Housing 4 Family No Yes Father role from the start, legal, emotional and presence Investigate a safe place for both parents to act in the childs interest Child has access to both parents Success Mental Halth and Self Esteem Crisis Management Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
  • 31. Crisis Escalates a risk to crisis when external stakeholders are threatens life or liberties Risk Problem upgrades to a risk May reach a customer or supplier Detected by prevent and detect controls Problem More than three users More than three incidents Unrelated or ongoing issue Incident reported by a person Minimum Viable System Model a universal crisis management service We must assume the most difficult part of change has always been the people changes, mental models or ways we manage our work and tools are meant to improve our process work. Design for the rule and enable variance, with an exception path for systematic self governing systems. When you can show value and gain buyin before changing the users environment you are far more likely to succeed. Using a consistent framework for both personal and technical issues allows us to manage expectations better and re-use the same tools in various responding services. WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 32. Crisis Preparedness Minimum Viable Systems • Ensure access to family life – people, car and home • economic life access to work and financials • health life – doctors • private life – Employer • public life - Social Media • Devices – Phone and provider Locator – how does this help in a crisis? Re-use emergency response service on NIEM Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
  • 33. Cloud Capability Private Clouds  Central Child Care Store in ◦ Washington, DC  Determine Resilience Planning and Service Level Agreements  Federal Child Nutrition Program ◦ URL access from any location  Setup master once from any existing Title IV, Title I or Title IX federal program ◦ Children in Family or Center based Childcare ◦ Seniors – Adult Care  Providers are not hosting any data locally ◦ Software as a Service ◦ Authenticate based on bio-metrics  with a NIEM  An open source model intends to create personal cloud concepts with intimacy gradient levels to interact with the public and private sectors  Requires a host provider who will honor privacy Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
  • 34. Privacy as it relates to person’s as an individual Protected Personal Identifiable Information WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 35.  Young women are targeted by stalkers and human traffickers ◦ Enforce laws protecting citizens from others who use locator features ◦ Enable citizens who are not benefiting and prefer to manage identity theft threats by avoiding the problem managing public and private life as the data owner. ◦ In many communities the system has failed victims, causing a drop in reported crimes of sexual violence.  Protecting targets of financial crimes is an international priority and serious threat to everyone. ◦ An ability to acquire adequate employment or prevent false acquisitions have become the attractor for organized criminal networks Enforcing laws far too many are able to put at risk in the current model Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
  • 36. David Ing – INCOSE 2014 Intimacy Gradient  By Lisa Martinez Copyright 2014 @ Wicked Design Solutions
  • 37. Proposed design for NIEM groups  Managing my identity ◦ Intimacy Gradient Level 1 without technology ◦ Intimacy Gradient Level 2 with technology as an individual  With Dependent children or dependent adult (probate) Access Group X Tax Debt X Healthcare X Education X Justice System X Federal, State, Local X **Pattern Language and Intimacy Gradient per David Ing System Science Society speaker – January 2014 Incose Geographic 01 Self 02 Child 03 Tax 04 HCA 05 EDU 06 JUS Nation Validate Validate Validate Validate Validate Validate State/Tribal Validate Validate Validate Validate Validate Validate County Validate Validate Validate Validate Validate Validate City Validate Validate Validate Validate Validate Validate WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 38. IG6 IG5 IG4 IG3 IG2 IG1 IG Level “Who” can be assigned to a group IG1 Private a person is alone without devices IG2 Private with Device and in own domain IG3 Federal Tax pushes to view in IG2 IG4 Medical and Mental Health with in IG4 with inputs to IG3 IG5 Education and Mandated Reporters push to IG3 and interact in IG5 IG6 Justice System “Pushes to” IG3 with interactions in IG6 *See NIEM recovery use case assumes all IG2-5 data secured by region Per Cloud WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 39. IG6 IG5 IG4 IG3 IG2 IG1 IG Level “Who” can be assigned to a group IG1 Private a person is alone without devices IG2 Private with Device and in own domain IG3 Federal Tax pushes to view in IG2 IG4 Medical and Mental Health with in IG4 with inputs to IG3 IG5 Education and Mandated Reporters push to IG3 and interact in IG5 IG6 Justice System “Pushes to” IG3 with interactions in IG6 *See NIEM recovery use case assumes all IG2-5 data secured by region WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 40. Economic Life Tax Employment IG4 Culture and Family Life IG3 a person as a Citizen IG2 Public and Private Life Health and Safety IG5 Private Life Education IG6 Social and Public Life IG7 Federal Commerce – Tax Healthcare and Insurance Education and justice Roads and Infrastructure State Federal summary segmented by state any additional state contributions Commerce tax by state etc Local Federal Summary segmented by State state summary segmented by county with any local contributions *Grouping for Pattern Language Standards according to generic themes highlighted by the Women’s Law Work Group 2013 Report UN meetings in NY **Each layer in government has contributions to each theme while one owns the integrity and quality of Privacy related data WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 41. Intimacy Gradient Levels (NIEM group)  Whole government moves from high cost low enforcement and low effectiveness in government  action ready using EA as the transformation opportunity A hierarchy of authority implies the top level rules are adopted at the lowest level  Intimacy gradient level 90 Federal  Intimacy gradient level 91 state  Intimacy gradient level 92 county  Intimacy gradient level 93 city  Intimacy gradient level 94 community  assume Facebook, Google+, Twitter, Yahoo, Instagram, About.me with public access to minimal viable information based on NIEM adoption. Local control would only be achieved through adoption of standards universally Access Group X Tax Debt X Healthcare X Education X Justice System X Federal, State, Local X WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 42. IG Level Assumptions IG1 A person has every expectation of privacy and technology has no viable reason for capture or retention. IG2 A person expects interactions may be monitored for intelligence purposes although Federal limitations. Specific to tax payer service layer inputs from IG3 to IG2 Published by Federal. Emergency response or notifications are published to IG2 from IG3 IG3 A person can expect interactions with Federal (view summary total Receipts) in view form with any response to Federal Tax inquiries from IG2 pushed to Federal in IG3 from the person or parent on behalf of the child IG4 Any issues identified by healthcare providers are pushed from IG 4 to IG3 with provider views and interactions limited to IG4. A person will respond from IG3 IG5 Educators will report into IG3 from IG5 including any mandated reporter to community support system (TBD) IG6 Justice System reports into IG3 from IG6  By Lisa Martinez Copyright 2014 @ Wicked Design Solutions
  • 43. Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
  • 44. Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016