DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
To do effective data governance, analysts should preview the amount of data their organization is collecting and consider if it is all necessary information to run the business or just “nice to have” data. Today companies are collecting a variety of Personally identifiable information (PII), combining it with location information, and using it to both personalize their own services and to sell to advertisers for behavioral marketing. Data brokers are tracking cell phone applications and insurance companies are installing devices to monitor driving habits. At the same time, however, hackers are embedding malicious software in company computers, opening a virtual door for criminals to rifle through an organization’s valuable personal and financial information.
This presentation explores:
•What company data should be tagged as “sensitive” data?
•Who within the company has access to personal data?
•Is the company breaking any privacy laws by storing PII data?
•Is the data secure from both internal and external hackers?
•What happens if there is an external data breech?
Privacy and Security by Design Spotlight Presentation at HIMMS Privacy and Security Forum, December 5th 2016. Presented by Jeff R. Livingstone, PhD, Vice President and Global Lead, Life Sciences & Healthcare, Unisys Corporation.
DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
To do effective data governance, analysts should preview the amount of data their organization is collecting and consider if it is all necessary information to run the business or just “nice to have” data. Today companies are collecting a variety of Personally identifiable information (PII), combining it with location information, and using it to both personalize their own services and to sell to advertisers for behavioral marketing. Data brokers are tracking cell phone applications and insurance companies are installing devices to monitor driving habits. At the same time, however, hackers are embedding malicious software in company computers, opening a virtual door for criminals to rifle through an organization’s valuable personal and financial information.
This presentation explores:
•What company data should be tagged as “sensitive” data?
•Who within the company has access to personal data?
•Is the company breaking any privacy laws by storing PII data?
•Is the data secure from both internal and external hackers?
•What happens if there is an external data breech?
Privacy and Security by Design Spotlight Presentation at HIMMS Privacy and Security Forum, December 5th 2016. Presented by Jeff R. Livingstone, PhD, Vice President and Global Lead, Life Sciences & Healthcare, Unisys Corporation.
Operations, Change and Innovation with a five capability model
3 Management Capabilities - Party, Offer and Financial
2 Transaction Capabilities - Expense/Cost or Revenue/Benefit Transaction capabilities
BagalaMukhi Dashamahavidya Aghori Tantra Mantra Vashikaran Black Magic Specialist Psychic Vastu Expert Indian Vedic Astrology Tantra Tarot Feng Shui Numerology Remedies Love Marriage Specialist Love Problem Solution Mayang Assam through http://www.tantrik-astrologer.in http://www.astrology-tantra.com (M) +919954375906 University Professor Language Specialist Dr.Rupnathji ( Dr.Rupak Nath ) is an Expert in Sanskrit Grammer.He authored more than 750 books on diverse subjects.He has also released hundreds of audio and video cassettes to detail the exact procedures of performing worship and to record the authentic sound vibration and pronunciation of the Mantras. Many of his articles have been published in leading newspapers and magazines. He has been honoured with several titles of recognition in various fields. He was honoured with the title of "Maha Mahopadhyay" in 1995 by the then vicepresident of India. He was honoured with the title of "Samaj Shiromani" in 1999 by the then Vice-President of India. In 1998, he was honoured by the then Prime Minister of Nepal, for his unique and singular work in the social and religious fields. He was nominated as the President of the World Astrology Conference from amongst representatives of various countries in 1999 and has been nominated as President of most of the All India Astrology Conferences organised since 1997. He was honoured with the title of "Tantra Shiromani" by the Parapsychological Council in 1997. He was honoured with the title of "Mantra Shiromani" by the Mantra Sansthan in 1998. Maha Yogi Paramahamsa Dr.Rupnathji attained great respect, both in India and abroad, and was honoured with many spiritual titles, among others the Hindu Dharma Samrat, which means the upholder of Sat Sanathan Dharma, the eternal ruling "religion" which is above all "confessions" and connects and unites all living beings. http://www.tantrik-astrologer.in http://www.astrology-tantra.com (M) +919954375906
Dr.Rupnathji is a scholar who has earned the Master's Degree in Radiation Physics. Recipient of many medals and honours, He is at once a Physician, an astrophysicist and an applied mathematician. He is an author who has numerous publications, both technical and educational. He is a Professor and has been Distinguished Honors Visiting Lecturer at numerous universities throughout the World.Please see his Books.
Why do smart cities goes lean?
This presentation shares the basics and opportunities for any public sector agency and those in pubic appointed positions.
Digital Transformation in Higher Education - The Changing Student RelationshipAndy Steer
Slide Deck delivered at SAP's Digital Transformation for Public Services event.
If you think that SAP and higher education is just about finance and HR then think again.
As SAP’s chosen Global Partner for higher education, itelligence are focused on bringing real innovation to your sector. From back office systems that save you time and money to consumer grade engagement platforms that drive student and staff recruitment, retention, and performance through to big data and analytic solutions that deliver actionable insight early to promote positive outcomes.
Bringing the best in SAP Consulting know-how and a range of services from implementation, training, support, and hosting, itelligence is the partner for tomorrow’s higher education institution.
What should organizations be concerned about when using Machine Learning for Predictive Modeling techniques? Divergence Academy and Divergence.AI are leading efforts to bring Algorithmic Accountability awareness to masses.
Futureproof Your Business For The Next Disruption #SXSW2018Minter Dial
Keynote presentation at SXSW2018 #futureproofSXSW
Exploring the 12 disruptive forces and 3 key mindsets to help your business drive through and with the next disruptive forces. Focus on #Genomics and #AI.
Futureproof, Get Your Business Ready for the Next Disruption (Pearson 2017), co-authored by Caleb Storkey and Minter Dial
Book reading and signing in Austin Convention Center on March 10, 2018.
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...Saurabh Mishra
This group reviewed data and measurements indicating the positive potential of AI to serve Sustainable Development Goals (SDG’s). Alongside these optimistic inquiries, this group also investigated the risks of AI in areas such as privacy, vulnerable populations, human rights, workplace and organizational policy. The socio-political consequences of AI raise many complex questions which require continued rigorous examination.
Accenture Public Service Citizen Survey: Public Administrationaccenture
What do people want from digital government? We asked thousands of citizens across six countries: Australia, France, Germany, Singapore, UK and USA. Specifically around Public Administration, citizens are looking for more transparency and better use of digital technology. They also indicate that they are more open to government work if they see improvements in these areas.
Operations, Change and Innovation with a five capability model
3 Management Capabilities - Party, Offer and Financial
2 Transaction Capabilities - Expense/Cost or Revenue/Benefit Transaction capabilities
BagalaMukhi Dashamahavidya Aghori Tantra Mantra Vashikaran Black Magic Specialist Psychic Vastu Expert Indian Vedic Astrology Tantra Tarot Feng Shui Numerology Remedies Love Marriage Specialist Love Problem Solution Mayang Assam through http://www.tantrik-astrologer.in http://www.astrology-tantra.com (M) +919954375906 University Professor Language Specialist Dr.Rupnathji ( Dr.Rupak Nath ) is an Expert in Sanskrit Grammer.He authored more than 750 books on diverse subjects.He has also released hundreds of audio and video cassettes to detail the exact procedures of performing worship and to record the authentic sound vibration and pronunciation of the Mantras. Many of his articles have been published in leading newspapers and magazines. He has been honoured with several titles of recognition in various fields. He was honoured with the title of "Maha Mahopadhyay" in 1995 by the then vicepresident of India. He was honoured with the title of "Samaj Shiromani" in 1999 by the then Vice-President of India. In 1998, he was honoured by the then Prime Minister of Nepal, for his unique and singular work in the social and religious fields. He was nominated as the President of the World Astrology Conference from amongst representatives of various countries in 1999 and has been nominated as President of most of the All India Astrology Conferences organised since 1997. He was honoured with the title of "Tantra Shiromani" by the Parapsychological Council in 1997. He was honoured with the title of "Mantra Shiromani" by the Mantra Sansthan in 1998. Maha Yogi Paramahamsa Dr.Rupnathji attained great respect, both in India and abroad, and was honoured with many spiritual titles, among others the Hindu Dharma Samrat, which means the upholder of Sat Sanathan Dharma, the eternal ruling "religion" which is above all "confessions" and connects and unites all living beings. http://www.tantrik-astrologer.in http://www.astrology-tantra.com (M) +919954375906
Dr.Rupnathji is a scholar who has earned the Master's Degree in Radiation Physics. Recipient of many medals and honours, He is at once a Physician, an astrophysicist and an applied mathematician. He is an author who has numerous publications, both technical and educational. He is a Professor and has been Distinguished Honors Visiting Lecturer at numerous universities throughout the World.Please see his Books.
Why do smart cities goes lean?
This presentation shares the basics and opportunities for any public sector agency and those in pubic appointed positions.
Digital Transformation in Higher Education - The Changing Student RelationshipAndy Steer
Slide Deck delivered at SAP's Digital Transformation for Public Services event.
If you think that SAP and higher education is just about finance and HR then think again.
As SAP’s chosen Global Partner for higher education, itelligence are focused on bringing real innovation to your sector. From back office systems that save you time and money to consumer grade engagement platforms that drive student and staff recruitment, retention, and performance through to big data and analytic solutions that deliver actionable insight early to promote positive outcomes.
Bringing the best in SAP Consulting know-how and a range of services from implementation, training, support, and hosting, itelligence is the partner for tomorrow’s higher education institution.
What should organizations be concerned about when using Machine Learning for Predictive Modeling techniques? Divergence Academy and Divergence.AI are leading efforts to bring Algorithmic Accountability awareness to masses.
Futureproof Your Business For The Next Disruption #SXSW2018Minter Dial
Keynote presentation at SXSW2018 #futureproofSXSW
Exploring the 12 disruptive forces and 3 key mindsets to help your business drive through and with the next disruptive forces. Focus on #Genomics and #AI.
Futureproof, Get Your Business Ready for the Next Disruption (Pearson 2017), co-authored by Caleb Storkey and Minter Dial
Book reading and signing in Austin Convention Center on March 10, 2018.
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...Saurabh Mishra
This group reviewed data and measurements indicating the positive potential of AI to serve Sustainable Development Goals (SDG’s). Alongside these optimistic inquiries, this group also investigated the risks of AI in areas such as privacy, vulnerable populations, human rights, workplace and organizational policy. The socio-political consequences of AI raise many complex questions which require continued rigorous examination.
Accenture Public Service Citizen Survey: Public Administrationaccenture
What do people want from digital government? We asked thousands of citizens across six countries: Australia, France, Germany, Singapore, UK and USA. Specifically around Public Administration, citizens are looking for more transparency and better use of digital technology. They also indicate that they are more open to government work if they see improvements in these areas.
Data for Impact Fellowship - SocialCops CareersSocialCops
The Data for Impact Fellowship is a unique opportunity where fellows partner with leaders in government, bilateral organizations, foundations and nonprofits — ranging from Ministers, CEOs and District Collectors — to implement a scalable data intelligence solution. The Fellowship seeks to bring together young, enterprising future leaders with experienced leaders in the development sphere to use the power of data to solve some of India's most critical problems.
For more details about the Fellowship and to get started on your application, visit http://soco.ps/2BHK6Ba!
Learning On The Go: Leverage Mobile Computing in the WorkplaceSaba Software
This webinar will explore the explosive growth of mobile computing and the phenomenon of “anywhere, anytime” access to information. You will learn about current trends in the mobile marketplace, how it is evolving, and what the implications are to your organization's mobile learning strategies.
The approach to training is becoming more focused around employing m-learning “bite-sized” nuggets of knowledge that are targeted to the individual's on-demand learning needs. Join us for this webinar to find out how your organization can best adopt a meaningful “learning on the go” strategy.
The World of Mobile Computing Today
How Is Mobile Computing Changing?
How Does Mobile Computing Affect Learning?
Mobility and Micro-Learning
Mobile Learning in the Workplace
Setting up an International Innovation IncubatorMrsAlways RigHt
A proposal for an international innovation incubator school for high school age students. Leveraging any device to bring access to the latest in learning with experience based projects.
Verizon Powerful Answers Award 2014 Hints and Tips-- How to Win!Jeff Medaugh
My preso on the 2014 Verizon Powerful Answers Award program -- 1 million dollars to startups in healthcare, sustainability, transportation and education
Senior Project and Engineering Leader Jim Smith.pdfJim Smith
I am a Project and Engineering Leader with extensive experience as a Business Operations Leader, Technical Project Manager, Engineering Manager and Operations Experience for Domestic and International companies such as Electrolux, Carrier, and Deutz. I have developed new products using Stage Gate development/MS Project/JIRA, for the pro-duction of Medical Equipment, Large Commercial Refrigeration Systems, Appliances, HVAC, and Diesel engines.
My experience includes:
Managed customized engineered refrigeration system projects with high voltage power panels from quote to ship, coordinating actions between electrical engineering, mechanical design and application engineering, purchasing, production, test, quality assurance and field installation. Managed projects $25k to $1M per project; 4-8 per month. (Hussmann refrigeration)
Successfully developed the $15-20M yearly corporate capital strategy for manufacturing, with the Executive Team and key stakeholders. Created project scope and specifications, business case, ROI, managed project plans with key personnel for nine consumer product manufacturing and distribution sites; to support the company’s strategic sales plan.
Over 15 years of experience managing and developing cost improvement projects with key Stakeholders, site Manufacturing Engineers, Mechanical Engineers, Maintenance, and facility support personnel to optimize pro-duction operations, safety, EHS, and new product development. (BioLab, Deutz, Caire)
Experience working as a Technical Manager developing new products with chemical engineers and packaging engineers to enhance and reduce the cost of retail products. I have led the activities of multiple engineering groups with diverse backgrounds.
Great experience managing the product development of products which utilize complex electrical controls, high voltage power panels, product testing, and commissioning.
Created project scope, business case, ROI for multiple capital projects to support electrotechnical assembly and CPG goods. Identified project cost, risk, success criteria, and performed equipment qualifications. (Carrier, Electrolux, Biolab, Price, Hussmann)
Created detailed projects plans using MS Project, Gant charts in excel, and updated new product development in Jira for stakeholders and project team members including critical path.
Great knowledge of ISO9001, NFPA, OSHA regulations.
User level knowledge of MRP/SAP, MS Project, Powerpoint, Visio, Mastercontrol, JIRA, Power BI and Tableau.
I appreciate your consideration, and look forward to discussing this role with you, and how I can lead your company’s growth and profitability. I can be contacted via LinkedIn via phone or E Mail.
Jim Smith
678-993-7195
jimsmith30024@gmail.com
Specific ServPoints should be tailored for restaurants in all food service segments. Your ServPoints should be the centerpiece of brand delivery training (guest service) and align with your brand position and marketing initiatives, especially in high-labor-cost conditions.
408-784-7371
Foodservice Consulting + Design
Artificial intelligence (AI) offers new opportunities to radically reinvent the way we do business. This study explores how CEOs and top decision makers around the world are responding to the transformative potential of AI.
The Team Member and Guest Experience - Lead and Take Care of your restaurant team. They are the people closest to and delivering Hospitality to your paying Guests!
Make the call, and we can assist you.
408-784-7371
Foodservice Consulting + Design
The case study discusses the potential of drone delivery and the challenges that need to be addressed before it becomes widespread.
Key takeaways:
Drone delivery is in its early stages: Amazon's trial in the UK demonstrates the potential for faster deliveries, but it's still limited by regulations and technology.
Regulations are a major hurdle: Safety concerns around drone collisions with airplanes and people have led to restrictions on flight height and location.
Other challenges exist: Who will use drone delivery the most? Is it cost-effective compared to traditional delivery trucks?
Discussion questions:
Managerial challenges: Integrating drones requires planning for new infrastructure, training staff, and navigating regulations. There are also marketing and recruitment considerations specific to this technology.
External forces vary by country: Regulations, consumer acceptance, and infrastructure all differ between countries.
Demographics matter: Younger generations might be more receptive to drone delivery, while older populations might have concerns.
Stakeholders for Amazon: Customers, regulators, aviation authorities, and competitors are all stakeholders. Regulators likely hold the greatest influence as they determine the feasibility of drone delivery.
Case Analysis - The Sky is the Limit | Principles of Management
1. design strategy and vision for crisis management
1. Strategy and Planning
Cloud Capabilities with Student Led Engineering Simulations
Wicked 2014 @ Copyright Lisa Martinez 408.638.9016
2. We will design the way service providers will publish
We will design the way a citizen will validate
We will design in a way to meet any industry and any geography
Limitations are geographical regulations and the design assumes
the need to practice local laws.
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
3. Planning consistently, by assuming communications and
other media needs to be structured differently.
◦ Based on lifecycle approach
System Thinking rather than focused on the parts
The first phases of our programs will not focus on parts, while
knowing parts are required as building blocks.
◦ Out of scope any unique industry or sector requirements
◦ Priority replicate many first and the local preferences are left for the
local teams
Understanding the thematic for wellness using IT Service
Management for People in a Business Service with Intimacy
Gradient Layer in a design pattern.
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
4. Based on the highest threat variable
associated with government waste
5. Federal to Local Thematic for Wellness
Today, we are frustrated with
government
The government provides us
with the vital needs.
We need a more direct route to
the sponsoring government
We don’t want the government
spying.
◦ Why would you think you can?
Economic
Safety
Healthcare
Family
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
6. Person Centered New Security and Resilience
Person New
0-5 X
K-5 O
6-8 O
9-12 X
13-16 X
Workforce X
Seniors X
Adopting NIEM
◦ Using Pattern Language
◦ Personal Cloud
TMN Server – Linux
Resilience
◦ Crisis
Violence
Prevent
Respond
Monitor
CDD
DHS
IRS
CFP
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Expected =x
Optional = 0
7. Variables Access None
Lives with both parents
Sustainable Income
Safe Child Care
Healthcare
Food
Housing
Education
Access to Grandparents
0-5 yrs.
k-5th
6-8th
9-12th
13-16th
Workforce
Seniors
Understanding the whole child or person to apply the right amount of effort to restore wellness
WICKED 2014@copyright Lisa Martinez 408.638.9016
8. Proven Models
◦ Reviewed or recommended based on whether other counties have
the same service organization.
◦ Reviewed based on ability to adopt the same cloud service model.
◦ Based on flexibility in local decisions.
Copyright @2014 Wicked Design Solutions Lisa Martinez 408-638-9016
CDD
DHS
IRS
CFP
Benefits 0-5
years
K-5 6-8 9-12 13-16 Workforce Seniors
One Record Personal Cloud
Prelude – Team Career
X X X X X X X
Safe Child Care - CPR X X X
Taxes – linked to childcare X X X X
Early Detection-certification X
Violence Detection X X X X
Food Program X X X
Cyber threat awareness X X
10. Families from
Birth Title IV
Nutrition Food
Services
Supported
By
Mentored
By
Zero to
Five
K-5th 6-8th 9-12th 13-20th Workforce Seniors
1. Design Vision and Strategy
WICKED 2014@copyright Lisa Martinez 408.638.9016
All humans grouped for a minimum viable system
Students
11. Doesn’t a system approach make it harder for people?
◦ Doing the right things are sometimes harder, not in the solution
proposed herein.
◦ Doing the right thing at the right time is easier than cleaning up a
mess or the system of messes.
In this model we leverage a per cloud solution (proposed)
with a way for parents to confirm who has the right to access
their child records.
◦ In this model, we set up the same configuration from zero to seniors
Identifying the debt only population for assurance of policy based access.
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
12. • Modeling by Groups or super-systems
• How are we marketing to which groups of consumers?
• Male and Female
• Minors and Adults
• How are we improving?
• Are we meeting legal and financial obligations?
• Are we secure and sustainable?
• Are we socially Responsible?
Gender
Re-use What We Know
We will learn
through out
our life.
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
13. Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
From a small business to any size
up to the largest Enterprise size
company.
People are associated with one of
the groups in a longitude structure
for use as an individual or an agent
in a population.
The standard structure enables re-
use and effective planning based on
the audience.
The first four groups are protected
in all cases and must have an
associated authorization from a
parent on all programs.
We must protect children online
Return on Investment
How do I know if the information is true?
Integrity of a population simulation.
Answer: Population Data must be sourced
from the “US Census Bureau”
Engineering
Course
Urban Planning
and Monitoring
14. Segmentation – Can Protect threats against a child by filtering
Measuring Gains or
adjust based on
population culture or
motivation
techniques
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
18. Segments which are known to be high risk threat vectors
◦ Assume each grouping is a fixed representation of an audience with
purpose including known research interview techniques for working
with children or seniors.
◦ Assume each grouping has known groups in each population targeted
by white collar criminals
Seniors
Children ages 0-5 year old
◦ Assume a different approach in communication by age and another
cultural, economic and geographical
Development of games or social media venues for children
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
19. Trusted and regulated source during
crisis or everyday life.
One set of building blocks used
universally
WICKED 2014@copyright Lisa Martinez 408.638.9016
20. Understanding the common variables with an application of search
tags to enable multi-generational and cross-border association of
the shared for a minimum viable system model.
◦ Experience based learning in a model designed for rapid expansion and
local customization.
◦ Teaching students with hands on learning using open source solutions from
the wisdom of the most recognized experts in these various fields.
◦ Understanding the semantics and stage of an existing practice does not
need its own standard.
In fact, using the approach will cause a train wreck.
Big data offers an example of the subject
WICKED 2014@copyright Lisa Martinez 408.638.9016
21. Person Centered Design Service Providers responsibility
Security and Privacy are inter-
dependent
◦ Both topics are best supplied as a
wrapper or layer designed for the
rule and assumption must be
made in all solutions.
Privacy
◦ Managed via a NIEM service xml
as the data collected has the most
granular release of information
based on each data owner in the
collection.
Any use case
◦ A filter needs to be applied by all
organizations and agencies to
eliminate risk being brought into the
boundaries by an agent who either
has access or works for under a
legal arrangement.
It’s the law
Only people who have been
authorized and for a specific purpose
have a specific use.
The data owner is the citizen
◦ Using NIEM assumes the granularity
for the data owner protections
Access Group X
Roles Based Access X
Policy Based Access X
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
23. Content Id
no private
information
public life
Private
life
economic
life
social life
family life
health
and safety
life
2013 @ Copyright WICKED Design Solutions
Type 2
diabetic
Physician
A manager in
retail
A major
retailer
IGL6 - 7
Public
IGL1-3
Private
IGL4-5
Private
24. XPublic and Private
X XCultural and Family
Health and Safety
Economic and Social
Online Wellness Grid
ZerotoFive
K-5thGrade
6th-8th
Grade
9th-12th
Grade
13-20th
grade
Workforce
Seniors
Offer 1 Big Data Science and Data Centers
Offer 2 A Minimum Viable System Social Engineering
X
Offer 3 Cloud with Service Management
X
Offer 4 Innovation Incubator
Research – Multi-disciplinary and cross geography
Legend
Canada
Australia(state)
Central Asia
Southern Asia
Middle east Asia
Southeast Asia
China and Mongolia
Wicked Design Solutions
Lisa Martinez Copyright @ 2014
All Local Regional National World
X X X X X X X X X X X X X X X X
25. Text
Text
Text
Text
Doctorate
Workforce
Employee
Developmen
t
Early
Childhood
0-5 year olds
K-5th
Grade
Elementary
School
6-8th Grade
Middle School
9-12th Grade
High School
13-14th
Grade
Community
College
15-18th
University
System Approach to Learning and Planning
Ensure ethical marketing, advertising and research for all private and public
sector delivery and investment planning.
Limitations on Objective Research
Research on Children is very subjective according to the vast research on the
subject.
Experts are in consensus on the FACTS associated with research on children.
The first question asked by an expert would likely be which method of
interviewing was used?
What techniques and how was the decision criteria made on which technique
was appropriate?
Ethical Interviewing
Perhaps the expert may want to review the research plan.
the children were interviewed and what credentials the person had performing
the interviews.
Ethical Interviewing techniques must be used or the outcomes are a threat to
children and their families.
Early Childhood Development
Preschool Readiness assessments are vital to the parents and providers must
be well trained, ideally certified in special needs detection and assessments.
Early childhood development and identification of any delays or disabilities has
been a great way to prepare parents for individual learning plans or special
education needs for their child.
Private and Public Sector - On line Child Protection Framework
Game Developers in Education must use ethical practices and be held
accountable to avoid research based games.
Machine Learning for example cannot be programmed to make ethical
decisions about the child or responses the child gives. Nor does an algorithm
have the ability to know when a child should be removed from a research
study.
The ability to target the types of research based on what we know, reduces
risk when developing games or offers for education.
Research and Delivery ConsiderationsTechnology - Online Child Protection Framework
26. Citizens and Consumers are at risk
billions of records are retrieved by
hackers almost daily
Fraud or reporting in a virtual reality
versus FACTs has a far greater
impact on the economic health than
we currently understand.
Recent supreme court rulings support
the NSA programs around
surveillance to end.
International Human Rights goals
were rescheduled to March 2014
Provisioning the enterprise business
data in technology, from the strategy
phase define the business service
which can be applied to all users and
do not deviate.
The five capabilty model enables far
better access and privacy controls.
Data can be of no value, often used in
the wrong context, with no way to
enforce or define the ways to abuse.
Privacy and Data seem unrelated in
most peoples minds these are unique
situations.
P
E
S
T
Lisa Martinez Wicked Design Solutions Copyright @ 2014
27. • Personal Privacy according
to the 4th amendment
• Acknowledged by all just in
the past weeks
• Many elected officials are
unaware of the problem
• Those who know about it are
unaware of the severity of the
problem.
• Media and Advertising
practices will need to change.
• The problem reported about
the government spying (NSA
problem) was the introduction
to what has revealed itself as
a Wicked Problem.
P
Political
• Privacy isn't part of the
technology vocabulary
• Every data owner will want
individual encryption.
• We are not even close on the
topic in technology.
• We are building security solutions
as a response to threats.
• We rarely connect
data>information>knowledge>wis
dom
• We rarely use data dictionaries in
application implementations.
• We have exploits and Trojans
used in advertising simply
changing the name to allow the
unwanted behavior.
• There are technology or business
people.
• Technology experts have another
set of layers within the practices,
generally expertise is by
technology.
• Enterprise or Platform
• Platform or technology
• Technology or Functional
• All need security, all overlook the
data element.
T
Technological
• People have diverse opinions
about privacy.
• If you have never been a
victim of identity theft you are
least likely to be concerned.
• People are adverse to
government spying yet unable
to imagine companies as
threats either.
• We must understand the
impact on immigration
practices, when we bring
people from regions where
laws are more spiritual than
the types we enjoy in the US.
• We as humans have a right to
privacy under international
law, our problem isn't
needing laws. We need
to have laws enforced.
• Victims of crime are at risk
• Disabled persons are at risk
• Children are at risk
S
Sociological
• The economic life of the
average citizen has severely
degraded.
• Identity theft is no longer
within our control.
• Reputation risk are far
greater when we have no
way to know what might exist
on the web.
• We have no idea what a
recruiters ideas are about
morality
• The opportunity to commit
fraud against the average
consumer has risen.
• SASB has increased a
number of controls to better
manage the types of fraud
we see.
• No card present fraud
• Credit agencies targeted for
key logger exploits
• Social Engineering attacks
E
Economic
Lisa Martinez Wicked Design Solutions Copyright @ 2014
28. Prevent and Detect
Crisis
Management
Local control by
economic
Discreet
Intervention
Supporting
Roles
Crisis Tiers
(level 1, level
2 etc)
Teams by
Severity
Roles and
Competencies
Crisis
Caused by
Natural
Disaster
Crisis caused
by a
Human(s)
Develop
Communication
System
Contain Threat
Social Media
Strategy
Crisis caused
by Terrorist
or War
Recover
Continuous
Improvement
Change
End
Go To Changes
Google+
Define Types of
Crisis
Idea
Crisis caused
by Industrial
Disaster
Privacy-
Monitoring
Behaviors
Develop Recovery
Plan and Strategy
Lisa Martinez Wicked Design Solutions Copyright @ 2014
Concept Map Crisis Awareness and Challenge Offer
30. Child
No
Yes
1
Do
nothing 2
Human ecology workforce bullying
Human ecology diversity and inclusion better
interactions
1 Health
2 Education
3 Housing
4 Family
No
Yes
Father role from the start, legal, emotional and
presence
Investigate a safe place for both parents to act in the childs
interest
Child has access to both parents Success
Mental Halth and Self Esteem
Crisis Management
Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
31. Crisis
Escalates a risk to crisis
when external stakeholders
are threatens life or liberties
Risk
Problem upgrades to a risk
May reach a customer or supplier
Detected by prevent and detect
controls
Problem
More than three users
More than three incidents
Unrelated or ongoing issue
Incident reported by a person
Minimum
Viable System Model
a universal crisis management service
We must assume the most difficult part of change has always been the people changes, mental models or ways we manage our work and
tools are meant to improve our process work. Design for the rule and enable variance, with an exception path for systematic self governing
systems.
When you can show value and gain buyin before changing the users environment you are far more likely to succeed.
Using a consistent framework for both personal and technical issues allows us to manage expectations better and re-use the same tools in
various responding services.
WICKED 2014@copyright Lisa Martinez 408.638.9016
32. Crisis Preparedness
Minimum Viable Systems
• Ensure access to family
life – people, car and home
• economic life access to
work and financials
• health life – doctors
• private life – Employer
• public life - Social Media
• Devices – Phone and
provider
Locator – how does this help
in a crisis?
Re-use emergency response
service on NIEM
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
33. Cloud Capability Private Clouds
Central Child Care Store in
◦ Washington, DC
Determine Resilience Planning and
Service Level Agreements
Federal Child Nutrition Program
◦ URL access from any location
Setup master once from any existing
Title IV, Title I or Title IX federal
program
◦ Children in Family or Center based
Childcare
◦ Seniors – Adult Care
Providers are not hosting any data
locally
◦ Software as a Service
◦ Authenticate based on bio-metrics
with a NIEM
An open source model intends to
create personal cloud concepts
with intimacy gradient levels to
interact with the public and private
sectors
Requires a host provider who will
honor privacy
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
34. Privacy as it relates to person’s as an
individual
Protected Personal Identifiable
Information
WICKED 2014@copyright Lisa Martinez 408.638.9016
35. Young women are targeted by stalkers and human traffickers
◦ Enforce laws protecting citizens from others who use locator features
◦ Enable citizens who are not benefiting and prefer to manage identity theft threats
by avoiding the problem managing public and private life as the data owner.
◦ In many communities the system has failed victims, causing a drop in reported
crimes of sexual violence.
Protecting targets of financial crimes is an international
priority and serious threat to everyone.
◦ An ability to acquire adequate employment or prevent false acquisitions have
become the attractor for organized criminal networks
Enforcing laws far too many are able to put at risk in the current model
Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
36. David Ing – INCOSE 2014 Intimacy Gradient
By Lisa Martinez Copyright 2014 @ Wicked Design Solutions
37. Proposed design for NIEM groups
Managing my identity
◦ Intimacy Gradient Level 1 without technology
◦ Intimacy Gradient Level 2 with technology as
an individual
With Dependent children or dependent adult
(probate)
Access Group X
Tax Debt X
Healthcare X
Education X
Justice System X
Federal, State, Local X
**Pattern Language and Intimacy Gradient per David Ing System Science Society speaker – January 2014 Incose
Geographic 01 Self 02 Child 03 Tax 04 HCA 05 EDU 06 JUS
Nation Validate Validate Validate Validate Validate Validate
State/Tribal Validate Validate Validate Validate Validate Validate
County Validate Validate Validate Validate Validate Validate
City Validate Validate Validate Validate Validate Validate
WICKED 2014@copyright Lisa Martinez 408.638.9016
38. IG6
IG5
IG4
IG3
IG2
IG1
IG Level “Who” can be assigned to a group
IG1 Private a person is alone without devices
IG2 Private with Device and in own domain
IG3 Federal Tax pushes to view in IG2
IG4 Medical and Mental Health with in IG4 with
inputs to IG3
IG5 Education and Mandated Reporters push to IG3
and interact in IG5
IG6 Justice System “Pushes to” IG3 with interactions
in IG6
*See NIEM recovery use case assumes all IG2-5 data secured by region
Per Cloud
WICKED 2014@copyright Lisa Martinez 408.638.9016
39. IG6
IG5
IG4
IG3
IG2
IG1
IG Level “Who” can be assigned to a group
IG1 Private a person is alone without devices
IG2 Private with Device and in own domain
IG3 Federal Tax pushes to view in IG2
IG4 Medical and Mental Health with in IG4 with
inputs to IG3
IG5 Education and Mandated Reporters push to IG3
and interact in IG5
IG6 Justice System “Pushes to” IG3 with interactions
in IG6
*See NIEM recovery use case assumes all IG2-5 data secured by region
WICKED 2014@copyright Lisa Martinez 408.638.9016
40. Economic Life Tax
Employment IG4
Culture and
Family Life
IG3
a person
as a
Citizen
IG2
Public and
Private Life
Health and
Safety
IG5
Private Life
Education IG6
Social and
Public Life
IG7
Federal
Commerce – Tax
Healthcare and
Insurance
Education and justice
Roads and
Infrastructure
State
Federal summary
segmented by state
any additional state
contributions
Commerce tax by
state etc
Local
Federal Summary
segmented by State
state summary
segmented by county
with any local
contributions
*Grouping for Pattern Language Standards according to generic themes highlighted by the Women’s Law
Work Group 2013 Report UN meetings in NY
**Each layer in government has contributions to each theme while one owns the integrity and quality of
Privacy related data
WICKED 2014@copyright Lisa Martinez 408.638.9016
41. Intimacy Gradient Levels (NIEM group)
Whole government moves from high cost low
enforcement and low effectiveness in government
action ready using EA as the transformation opportunity
A hierarchy of authority implies the top level rules are adopted at the lowest level
Intimacy gradient level 90 Federal
Intimacy gradient level 91 state
Intimacy gradient level 92 county
Intimacy gradient level 93 city
Intimacy gradient level 94 community
assume Facebook, Google+, Twitter, Yahoo, Instagram, About.me with public access
to minimal viable information based on NIEM adoption.
Local control would only be achieved through adoption of standards universally
Access Group X
Tax Debt X
Healthcare X
Education X
Justice System X
Federal, State, Local X
WICKED 2014@copyright Lisa Martinez 408.638.9016
42. IG Level Assumptions
IG1 A person has every expectation of privacy and technology has no viable reason for
capture or retention.
IG2 A person expects interactions may be monitored for intelligence purposes although
Federal limitations. Specific to tax payer service layer inputs from IG3 to IG2
Published by Federal. Emergency response or notifications are published to IG2
from IG3
IG3 A person can expect interactions with Federal (view summary total Receipts) in
view form with any response to Federal Tax inquiries from IG2 pushed to Federal in
IG3 from the person or parent on behalf of the child
IG4 Any issues identified by healthcare providers are pushed from IG 4 to IG3 with
provider views and interactions limited to IG4. A person will respond from IG3
IG5 Educators will report into IG3 from IG5 including any mandated reporter to
community support system (TBD)
IG6 Justice System reports into IG3 from IG6
By Lisa Martinez Copyright 2014 @ Wicked Design Solutions