Future value of data Final report - Draft summary lr 15 dec 2018Future Agenda
Throughout 2018 a series of 30 workshops were undertaken around the world exploring the key topic of the future value of data. Engaging with around 1000 experts in 25 countries, this major research project has looked at the key issues driving change for how we see data value and their implications for the next ten years - globally and locally.
This is the draft PPT summary of the research findings and will be followed up in the New Year with a detailed Future Agenda global synthesis report plus regional versions in multiple languages.
If you have any comments or questions on this summary, the research or its future use, please do not hesitate to get in touch with either tim.jones@futureagenda.org or caroline.dewing@futureagenda.org or via twitter @futureagenda and @thevalueofdata
Presented by Klee Aiken and Maarten Van Horenbeeck at the 30th Annual FIRST Conference, in Kuala Lumpur, Malaysia.
https://www.first.org/conference/2018/program#pan-internet-of-governments-how-policymakers-became-interested-in-cyber
Future value of data Final report - Draft summary lr 15 dec 2018Future Agenda
Throughout 2018 a series of 30 workshops were undertaken around the world exploring the key topic of the future value of data. Engaging with around 1000 experts in 25 countries, this major research project has looked at the key issues driving change for how we see data value and their implications for the next ten years - globally and locally.
This is the draft PPT summary of the research findings and will be followed up in the New Year with a detailed Future Agenda global synthesis report plus regional versions in multiple languages.
If you have any comments or questions on this summary, the research or its future use, please do not hesitate to get in touch with either tim.jones@futureagenda.org or caroline.dewing@futureagenda.org or via twitter @futureagenda and @thevalueofdata
Presented by Klee Aiken and Maarten Van Horenbeeck at the 30th Annual FIRST Conference, in Kuala Lumpur, Malaysia.
https://www.first.org/conference/2018/program#pan-internet-of-governments-how-policymakers-became-interested-in-cyber
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
This slide presentation was developed to educate and enlighten the Mobile Network Operators, Government Agencies, general public and other stakeholders on how to avert the dangers embedded in lack of privacy laws in the country such that the provisions would eventually give birth to a commission or authority saddled with responsibility of data protection in the country.
The study provides valuable insight into the change in agency investment, awareness, and support for cybersecurity – as well as the challenges and barriers faced in achieving these goals.
Notable Takeaways:
• Financial Risks: According to a 2016 BetaNews article, “the total average cost of a data breach is now put at $6.53M, which includes $3.72M in lost business. Forensic investigations can cost up to $2,000 an hour, and the average annual salary of a security engineer is $92,000. With these high costs, proper preventative attack measures and cybersecurity insurance are crucial for the financial safety of organizations
• Employee Risks: A sizeable percentage of local agencies responded to never having taken cybersecurity awareness training for citizens (71.4%), contractors (61.9%), and local elected officials (50.1%). Given that human error creates vulnerabilities for breaches through targeted attacks like spear-phishing – employee education, RBAC measures, and RMS are of critical importance for agencies.
• What Agencies Want: The top three actions that were recommended by the respondents of the study were (1) Higher funding for cybersecurity; (2) Better cybersecurity polices; and (3) Greater cybersecurity awareness among employees in their local governments.
The Digital Accessibility Landscape: What Your Organization Needs to Know in ...3Play Media
In this webinar, we'll dive into the findings from Level Access's State of Digital Accessibility report and 3Play Media's State of Captioning report for 2019. We'll explore findings into how other organizations are tackling digital accessibility, the drivers behind making content accessible, and the future of digital accessibility standards.
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?Brian K. Dickard
How many of you think that the US power grid can be taken out for an extended time period by a cyberattack? The threat is real and sophisticated, and our ability to mount a coordinated response at both the government and private industry level is limited. This presentation explores the critical issues involved in making meaningful progress to detect and defend against this threat.
Future of Privacy - The Emerging View 11 06 15 Future Agenda
The Future of Privacy is one of 25 topics being explored around the world by the Future Agenda project. 4 events, run in partnership with the IAPP in Washington DC, London, Singapore and Toronto have built on an initial view by Stephen Deadman, formerly Chief Privacy Officer at Vodafone and now at Facebook. With the extra insights from these events, and others from other topics such as the future of data, travel and work, we now have an updated emerging view of some the key shifts seen to be taking place around the world. The PDF brings together some of the key insights gained to date and shares some thoughts on the underlying shifts. It is the first of several presentations sharing insights from the Future Agenda programme.
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Bootcamp)Financial Poise
All levels of society rely upon information technology systems. Network operations are pervasive and impact nearly every aspect of our society. The desire of companies to collect, use, store, and secure information about customers, employees, and other individuals is a requirement of the new economy. It is no wonder that the prevalence of electronic communications and a growing dependency on cyber structures and operations also create potential vulnerabilities to cyberattacks. It is critical to preserve information systems and address and prevent weaknesses in cyber protection efforts. This webinar examines the means for companies to reach data goals ethically, efficiently and legally. Best practices and model comprehensive privacy and cybersecurity policies are discussed. And, data breach response and related litigation, including class action litigation issues and fiduciary duty violations under corporate law, are discussed.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/data-privacy-compliance-2019/
The Cybersecurity Whistleblower Protections guide provides a description of the major legal claims and federal whistleblower rewards programs that may be available to employees who report cybersecurity deficiencies. It also offers specific suggestions to help you blow the whistle in a manner that best protects you.
This presentation focuses to the rising prominence of insurance considerations—and more particularly—to legal aspects of insurance as it relates to cybersecurity and privacy.
The presentation defines "Cyber and Privacy Insurance” and organizes such insurance into four main types of cyber insurance coverage: data breach and privacy management coverage, multimedia liability coverage, extortion liability coverage, and network security liability coverage. With these definitions, the presentation then gives snapshot of how the Cyber Insurance Market Is Maturing, its participants, costs, and related attributes.
Consideration is given to the importance of defined terms, before launching into difficulties that providers and users have relative to measuring, modeling, and pricing cyber insurance risk. Particular attention is given to the language of “claims” and how to navigate through associated risk/cost analyses and cost structures.
Additionally, general considerations, pre-conditions, cost of compliance, business interruption, governing board oversight and related issues are brought together is a cohesive manner.
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
This slide presentation was developed to educate and enlighten the Mobile Network Operators, Government Agencies, general public and other stakeholders on how to avert the dangers embedded in lack of privacy laws in the country such that the provisions would eventually give birth to a commission or authority saddled with responsibility of data protection in the country.
The study provides valuable insight into the change in agency investment, awareness, and support for cybersecurity – as well as the challenges and barriers faced in achieving these goals.
Notable Takeaways:
• Financial Risks: According to a 2016 BetaNews article, “the total average cost of a data breach is now put at $6.53M, which includes $3.72M in lost business. Forensic investigations can cost up to $2,000 an hour, and the average annual salary of a security engineer is $92,000. With these high costs, proper preventative attack measures and cybersecurity insurance are crucial for the financial safety of organizations
• Employee Risks: A sizeable percentage of local agencies responded to never having taken cybersecurity awareness training for citizens (71.4%), contractors (61.9%), and local elected officials (50.1%). Given that human error creates vulnerabilities for breaches through targeted attacks like spear-phishing – employee education, RBAC measures, and RMS are of critical importance for agencies.
• What Agencies Want: The top three actions that were recommended by the respondents of the study were (1) Higher funding for cybersecurity; (2) Better cybersecurity polices; and (3) Greater cybersecurity awareness among employees in their local governments.
The Digital Accessibility Landscape: What Your Organization Needs to Know in ...3Play Media
In this webinar, we'll dive into the findings from Level Access's State of Digital Accessibility report and 3Play Media's State of Captioning report for 2019. We'll explore findings into how other organizations are tackling digital accessibility, the drivers behind making content accessible, and the future of digital accessibility standards.
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?Brian K. Dickard
How many of you think that the US power grid can be taken out for an extended time period by a cyberattack? The threat is real and sophisticated, and our ability to mount a coordinated response at both the government and private industry level is limited. This presentation explores the critical issues involved in making meaningful progress to detect and defend against this threat.
Future of Privacy - The Emerging View 11 06 15 Future Agenda
The Future of Privacy is one of 25 topics being explored around the world by the Future Agenda project. 4 events, run in partnership with the IAPP in Washington DC, London, Singapore and Toronto have built on an initial view by Stephen Deadman, formerly Chief Privacy Officer at Vodafone and now at Facebook. With the extra insights from these events, and others from other topics such as the future of data, travel and work, we now have an updated emerging view of some the key shifts seen to be taking place around the world. The PDF brings together some of the key insights gained to date and shares some thoughts on the underlying shifts. It is the first of several presentations sharing insights from the Future Agenda programme.
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Bootcamp)Financial Poise
All levels of society rely upon information technology systems. Network operations are pervasive and impact nearly every aspect of our society. The desire of companies to collect, use, store, and secure information about customers, employees, and other individuals is a requirement of the new economy. It is no wonder that the prevalence of electronic communications and a growing dependency on cyber structures and operations also create potential vulnerabilities to cyberattacks. It is critical to preserve information systems and address and prevent weaknesses in cyber protection efforts. This webinar examines the means for companies to reach data goals ethically, efficiently and legally. Best practices and model comprehensive privacy and cybersecurity policies are discussed. And, data breach response and related litigation, including class action litigation issues and fiduciary duty violations under corporate law, are discussed.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/data-privacy-compliance-2019/
The Cybersecurity Whistleblower Protections guide provides a description of the major legal claims and federal whistleblower rewards programs that may be available to employees who report cybersecurity deficiencies. It also offers specific suggestions to help you blow the whistle in a manner that best protects you.
This presentation focuses to the rising prominence of insurance considerations—and more particularly—to legal aspects of insurance as it relates to cybersecurity and privacy.
The presentation defines "Cyber and Privacy Insurance” and organizes such insurance into four main types of cyber insurance coverage: data breach and privacy management coverage, multimedia liability coverage, extortion liability coverage, and network security liability coverage. With these definitions, the presentation then gives snapshot of how the Cyber Insurance Market Is Maturing, its participants, costs, and related attributes.
Consideration is given to the importance of defined terms, before launching into difficulties that providers and users have relative to measuring, modeling, and pricing cyber insurance risk. Particular attention is given to the language of “claims” and how to navigate through associated risk/cost analyses and cost structures.
Additionally, general considerations, pre-conditions, cost of compliance, business interruption, governing board oversight and related issues are brought together is a cohesive manner.
Setting up an International Innovation IncubatorMrsAlways RigHt
A proposal for an international innovation incubator school for high school age students. Leveraging any device to bring access to the latest in learning with experience based projects.
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
Upon completion of this module you will:
- Be able to recognize the necessity of regulating big data
- Understand the difference between privacy and data protection
- Know how to implement actions of data protection into your own (future) company
Duration of the module: approximately 1 – 2 hours
Future of data - Insights from Discussions Building on an Initial Perspective...Future Agenda
The initial perspective on the Future of Data kicked off the Future Agenda 2.0 global discussions taking place through 2015. This summary builds on the initial view and is updated as we progress the futureagenda2.0 programme. www.futureagenda.org
All levels of society rely upon information technology systems. Network operations are pervasive and impact nearly every aspect of our society. The desire of companies to collect, use, store, and secure information about customers, employees, and other individuals is a requirement of the new economy. It is no wonder that the prevalence of electronic communications and a growing dependency on cyber structures and operations also create potential vulnerabilities to cyberattacks. It is critical to preserve information systems and address and prevent weaknesses in cyber protection efforts. This webinar examines the means for companies to reach data goals ethically, efficiently and legally. The panel will also discuss the evolving regulatory approaches of the European Union, United States Federal government and significant developments in U.S. state regimes, including California. Best practices and model comprehensive privacy and cybersecurity policies are discussed. And, data breach response and related litigation, including class action litigation issues and fiduciary duty violations under corporate law, are discussed.
Part of the webinar series: CORPORATE & REGULATORY COMPLIANCE BOOTCAMP 2022 - PART I
See more at https://www.financialpoise.com/webinars/
All levels of society rely upon information technology systems. Network operations are pervasive and impact nearly every aspect of our society. The desire of companies to collect, use, store, and secure information about customers, employees, and other individuals is a requirement of the new economy. It is no wonder that the prevalence of electronic communications and a growing dependency on cyber structures and operations also create potential vulnerabilities to cyberattacks. It is critical to preserve information systems and address and prevent weaknesses in cyber protection efforts. This webinar examines the means for companies to reach data goals ethically, efficiently and legally. The panel will also discuss the evolving regulatory approaches of the European Union, United States Federal government and significant developments in U.S. state regimes, including California. Best practices and model comprehensive privacy and cybersecurity policies are discussed. And, data breach response and related litigation, including class action litigation issues and fiduciary duty violations under corporate law, are discussed.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/data-privacy-compliance-2021/
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP) Evolver Inc.
The President announced the Cybersecurity National Action Plan (CNAP) on February 9, 2016 that called for a significant increase in funding and major reorganization of cyber activities within the Government. This cybersecurity mandate has spawned conferences and meetings on both coasts discussing technologies and policy issues related to the CNAP initiative.
As cybersecurity experts begin to plan reorganizations and cyber protocols to meet the CNAP guidelines, we realize there are several “elephant in the room” topics that are hard questions for the Government and contractors who make up the ecosystem of the Federal marketplace.
These are eight questions for Federal cybersecurity that will need to be addressed in the upcoming year.
AWS Institute | Digital Identity: The Opportunity for GovernmentFairTechInstitute
This report focusing on Digital Identity Systems was published by AWS Institute and co-authored by Access Partnership. The report consists of four main chapters, as it draws practical insights for public leaders looking to direct their countries towards a well-designed digital ID system. Designing an effective digital ID system is also a key topic in this report. Finally, lessons learned, and best practices are explored to provide the reader with a concrete take away from the paper.
Operations, Change and Innovation with a five capability model
3 Management Capabilities - Party, Offer and Financial
2 Transaction Capabilities - Expense/Cost or Revenue/Benefit Transaction capabilities
Why do smart cities goes lean?
This presentation shares the basics and opportunities for any public sector agency and those in pubic appointed positions.
Visual Style and Aesthetics: Basics of Visual Design
Visual Design for Enterprise Applications
Range of Visual Styles.
Mobile Interfaces:
Challenges and Opportunities of Mobile Design
Approach to Mobile Design
Patterns
Technoblade The Legacy of a Minecraft Legend.Techno Merch
Technoblade, born Alex on June 1, 1999, was a legendary Minecraft YouTuber known for his sharp wit and exceptional PvP skills. Starting his channel in 2013, he gained nearly 11 million subscribers. His private battle with metastatic sarcoma ended in June 2022, but his enduring legacy continues to inspire millions.
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page pmgdscunsri
Figma is a cloud-based design tool widely used by designers for prototyping, UI/UX design, and real-time collaboration. With features such as precision pen tools, grid system, and reusable components, Figma makes it easy for teams to work together on design projects. Its flexibility and accessibility make Figma a top choice in the digital age.
Storytelling For The Web: Integrate Storytelling in your Design ProcessChiara Aliotta
In this slides I explain how I have used storytelling techniques to elevate websites and brands and create memorable user experiences. You can discover practical tips as I showcase the elements of good storytelling and its applied to some examples of diverse brands/projects..
Hello everyone! I am thrilled to present my latest portfolio on LinkedIn, marking the culmination of my architectural journey thus far. Over the span of five years, I've been fortunate to acquire a wealth of knowledge under the guidance of esteemed professors and industry mentors. From rigorous academic pursuits to practical engagements, each experience has contributed to my growth and refinement as an architecture student. This portfolio not only showcases my projects but also underscores my attention to detail and to innovative architecture as a profession.
1. A person centered design strategy by Lisa Martinez
Copyright 2014 @WICKED 408.638.9016
WICKED 2014@copyright Lisa Martinez 408.638.9016
2. Supply new jobs in communities for local capacity building
◦ Enable resilience for the people who need a hand up, not a handout.
◦ The families in the NCLB schools are limited by poor access to education
These are the highest density parts of every community – purely
debt,
◦ We can move debt to income and reduce burden on debt
Enable sustainable economic opportunities.
Do nothing and the debt increases without income to offset and the new majority
becomes the burden we could have empowered
Imagine if you learned everything you know about environmental
threats from judging a speech contest?
◦ 10th-12th grade students who won their local speech contest compete at
MESA regionals.
3. A design pattern developed to protect the highest risk least
likely to have economic sustainability and targets for
organized white collar criminals.
◦ A design pattern developed to combat the skills gap across the world.
The proposal enforces control at the lowest level in order to release all non-
PII information into information exchange models without constraints.
A containment strategy designed to compliment a fully vetted per cloud “open
source” with adoption of NIEM services.
Enables foundation for the federal, state, and local services
directly to citizens
◦ Designed to enable rapid adoption with shared service centers based on
each region with new education offers based on open source solutions.
WICKED 2014@copyright Lisa Martinez 408.638.9016
4. Unable to enforce laws White Collar Criminals
Federal Contracts earmark the
funds specifically to
populations;
◦ The lowest income, veterans,
veterans widows, Seniors, Foster
Kids, Victims of Violent crimes
including human trafficking
Much of the ineffective
components of local and state
government are around the
way we understand the federal
requirements.
The number of people accused
of fraud, without due cause is
unclear.
◦ The ability to target the high risk
populations is unclear and difficult
to track behind “the noise”
◦ While many technology solutions
are viable the number of threats
appears to have increased as the
Cyber-Security infographic skills
crisis shows
Anyone will look like a criminal if their data is used or misused
Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
Concept Map Crisis Awareness and Challenge Offer
5. Young women are targeted by stalkers and human traffickers
◦ Enforce laws protecting citizens from others who use locator features
◦ Enable citizens who are not benefiting and prefer to manage identity theft threats
by avoiding the problem managing public and private life as the data owner.
◦ In many communities the system has failed victims, causing a drop in reported
crimes of sexual violence.
Protecting targets of financial crimes is an international
priority and serious threat to everyone.
◦ An ability to acquire adequate employment or prevent false acquisitions have
become the attractor for organized criminal networks
Enforcing laws far too many are able to put at risk in the current model
Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
6. Proposed design for NIEM groups
Managing my identity
◦ Intimacy Gradient Level 1 without technology
◦ Intimacy Gradient Level 2 with technology as
an individual
With Dependent children or dependent adult
(probate)
Access Group X
Tax Debt X
Healthcare X
Education X
Justice System X
Federal, State, Local X
**Pattern Language and Intimacy Gradient per David Ing System Science Society speaker – January 2014 Incose
Geographic 01 Self 02 Child 03 Tax 04 HCA 05 EDU 06 JUS
Nation Validate Validate Validate Validate Validate Validate
State/Tribal Validate Validate Validate Validate Validate Validate
County Validate Validate Validate Validate Validate Validate
City Validate Validate Validate Validate Validate Validate
WICKED 2014@copyright Lisa Martinez 408.638.9016
7. IG6
IG5
IG4
IG3
IG2
IG1
IG Level “Who” can be assigned to a group
IG1 Private a person is alone without devices
IG2 Private with Device and in own domain
IG3 Federal Tax pushes to view in IG2
IG4 Medical and Mental Health with in IG4 with
inputs to IG3
IG5 Education and Mandated Reporters push to IG3
and interact in IG5
IG6 Justice System “Pushes to” IG3 with interactions
in IG6
*See NIEM recovery use case assumes all IG2-5 data secured by region
Per Cloud
WICKED 2014@copyright Lisa Martinez 408.638.9016
8. IG6
IG5
IG4
IG3
IG2
IG1
IG Level “Who” can be assigned to a group
IG1 Private a person is alone without devices
IG2 Private with Device and in own domain
IG3 Federal Tax pushes to view in IG2
IG4 Medical and Mental Health with in IG4 with
inputs to IG3
IG5 Education and Mandated Reporters push to IG3
and interact in IG5
IG6 Justice System “Pushes to” IG3 with interactions
in IG6
*See NIEM recovery use case assumes all IG2-5 data secured by region
WICKED 2014@copyright Lisa Martinez 408.638.9016
9. Economic Life Tax
Employment IG4
Culture and
Family Life
IG3
a person
as a
Citizen
IG2
Public and
Private Life
Health and
Safety
IG5
Private Life
Education IG6
Social and
Public Life
IG7
Federal
Commerce – Tax
Healthcare and
Insurance
Education and justice
Roads and
Infrastructure
State
Federal summary
segmented by state
any additional state
contributions
Commerce tax by
state etc
Local
Federal Summary
segmented by State
state summary
segmented by county
with any local
contributions
*Grouping for Pattern Language Standards according to generic themes highlighted by the Women’s Law
Work Group 2013 Report UN meetings in NY
**Each layer in government has contributions to each theme while one owns the integrity and quality of
Privacy related data
WICKED 2014@copyright Lisa Martinez 408.638.9016
10. Intimacy Gradient Levels (NIEM group)
Whole government moves from high cost low
enforcement and low effectiveness in government
action ready using EA as the transformation opportunity
A hierarchy of authority implies the top level rules are adopted at the lowest level
Intimacy gradient level 90 Federal
Intimacy gradient level 91 state
Intimacy gradient level 92 county
Intimacy gradient level 93 city
Intimacy gradient level 94 community
assume Facebook, Google+, Twitter, Yahoo, Instagram, About.me with public access
to minimal viable information based on NIEM adoption.
Local control would only be achieved through adoption of standards universally
Access Group X
Tax Debt X
Healthcare X
Education X
Justice System X
Federal, State, Local X
WICKED 2014@copyright Lisa Martinez 408.638.9016
11. Everything we have today is in IGL07
◦ We are suggesting that we carve out the risk and protect, only leaving
enforcement of the laws we have today.
◦ We’ve done the heavy lifting and only require social responsible
companies to remove the risk from their organizations.
Corporate Boards and Executive Officers have not been insured to cover
the threats.
It’s in everyone’s best interest to respond quickly to these types of risk
with threats to regulatory, financial, reputation and competitive risk.
WICKED 2014@copyright Lisa Martinez 408.638.9016
12. IG Level Assumptions
IG1 A person has every expectation of privacy and technology has no viable reason for capture or
retention.
IG2 A person expects interactions may be monitored for intelligence purposes although Federal
limitations. Specific to tax payer service layer inputs from IG3 to IG2 Published by Federal.
Emergency response or notifications are published to IG2 from IG3
IG3 A person can expect interactions with Federal (view summary total Receipts) in view form with
any response to Federal Tax inquiries from IG2 pushed to Federal in IG3 from the person or
parent on behalf of the child
IG4 Any issues identified by healthcare providers are pushed from IG 4 to IG3 with provider views
and interactions limited to IG4. A person will respond from IG3
IG5 Educators will report into IG3 from IG5 including any mandated reporter to community support
system (TBD)
IG6 Justice System reports into IG3 from IG6
WICKED 2014@copyright Lisa Martinez 408.638.9016
14. The Risk Potential Benefits
Current Culture
◦ You really need to understand your
workforce and culture
www.playprelude.com
◦ Breaking the glass before it
shatters on your organization
www.workplacebullying.com
Self worth and esteem
◦ Complimentary career paths
◦ Self regulate based on new
learning
◦ Sovereignty
Direct access with less
administrative barriers
Tribal run social services
Wholeness with children safer
Wellness Benchmarking
Lisa Martinez Wicked Design Solutions Copyright @ 2014
Emotional Health & Safety
15. Variables True or
False
None
Lives with both parents
Sustainable Income
Safe Child Care
Healthcare
Food
Housing
Education
Access to Grandparents
0-5 yrs.
k-5th
6-8th
9-12th
13-20th
Workforce
Seniors
Understanding the whole child to apply the right amount of effort to restore
wellness
Wellness Variables
16. Line Theme Activity
1 Understanding Yourself
Participants will reflect upon how their elemental iStar strengths are reflected in
their lives and the lives of those they know
2 Understanding Others
Using examples, prompts, and knowledge gained from Prelude, participants will
develop greater understanding of the way their co-workers see the world
3 Effective Communication
Participants will reflect on what other personality types need to experience for
them to successfully share their ideas
4 Practical Application
Participants will choose from a roster of "test applications" and try to use their
Prelude knowledge for communication and collaboration
5
Self-Understanding &
Advancement
Using what they have learned, participants will develop some personal action
steps that allow them to better meet personal goals and contribute to their team.
iStar
Self
Exploration
iTag
Self
Expression
weTag
Team Work
allTag
Group Work
Star Smart
Mendela
Cross cultural benchmarking strengths may serve as a tool to aid mental health scenarios.
Self - Awareness
17. Person Centered Income from Federal
Person New
0-5 X
K-5 0
6-8 0
9-12 X
13-20 X
Workforce O
Seniors X
Adopting NIEM
◦ Using Pattern Language
Intimacy Gradient
◦ Personal Cloud
Resilience
◦ Title IV
Families from birth – parentage
Child support and Foster Care in
tribal territory
TANF
CDD
DHS
IRS
CFP
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Expected =x
Optional = 0
Person Segments for agent
Populations or a person
NIEM Capability
18. Proven Models – Adopting Child and Adult (seniors)
◦ Food program
Reviewed or recommended based on whether other counties have the same
service organization.
Reviewed based on ability to adopt NIEM with Minute Menu
Prelude-Self, how I want others to see me, like minded Teams and others
Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
CDD
DHS
IRS
CFP
Benefits 0-5
years
K-5 6-8 9-12 13-16 Workforce Seniors
Cyber Security and Open Source Design X X X X X X X
Child Care – Family home care new business – Livescan X X X
Families First – Birth to five year Community Support
w/Prelude
X X X X
Early Detection-certification Physical Safety and Health Life X
Violence Detection – Physical Safety and Health Life X X X X
Food Program – Physical Safety and Health LIfe X X X
Cyber threat and online reputation Economic and Social Life X X
Assumptions – Benefits Map
19. Variables in Crisis Prevent Mitigate Respond Recover
Lives with both parents x x
Financial Sustainability x xx xx
Safe Child Care x x xx xx
Healthcare x xx xx xx
Food x xx xx xx
Housing x xx xx xx
Education x x xx xx
Access to Grandparents x xx x x
Lisa Martinez Wicked Design Solutions Copyright @ 2014
Concept Map Crisis Awareness and Challenge Offer
20. Federal Contract Scalability Development Validate Scale Up
TANF (a), (b),
(c) & (e)
Region
State Nation
or World
Plus
I3 Innovation
CAFP
Food Program
Region
State
Nation or
World
Plus
I3 Innovation
Teacher
Development
Region
State Nation
or World
Play Prelude
22. People interact in the information, content(application or a
combination of information and knowledge), knowledge and
record domains
23. Recent Terms to become familiar with; introduced by the
report to the President May 2014.
◦ Born Digital
◦ Born Analog
◦ Friendly Cameras
Distinguishing the known in a way that enables informed
decision making according to the two dimensions of human
interactions with or without machines.
◦ to a person as a citizen
◦ a person as an agent with roles and interactions with an organization
or agency.
24. Data
Raw Format
Applications
(information
and
Knowledge)
Content
Knowledge
(Content and
Information)
Information
(Documents)
Records
Display
User Transactional
User
Management
user
Company LDAP
or AD account
X X –Restricted
group see
Sarbanes Oxley
rules
Network IP and
Host
X X
Secure access
certificate or Key
X X
Monitor and
Design
Key Controls
SOD
404 Assurances
Any financial
Management,
based on roles
based access
Any create, read,
update or archive
Financial
Management
Quality
Management
Employee
Performance
All request are
pre-authorized
and validated
All approvals are
approved or
delegated to a
person with same
or greater
authority.
Asset Device Any organization
or agency
supplied
Any organization
or agency
supplied
25. Assume the conceptual model will converge into the data.
◦ In these materials we assume data represents content in many forms
when presented to a user who may have no technology experience.
◦ The following table suggest a person will potentially never understand
and not need to understanding that the four domains are also data.
View(s) Organization
or Agency
Content Information Knowledge Records
Person as
an
individual
No Video or Audio
or digital data in
an application
or other form of
presentation
Video or Audio
or digital data in
an application or
other form of
presentation
Video or Audio
or digital data in
an application
or other form of
presentation
An official recording of an
event or transaction which
requires validation and
reporting to regulatory
authorities.
Person as
an Agent
Yes Video or Audio
or digital data in
an application
or other form of
presentation
Video or Audio
or digital data in
an application or
other form of
presentation
Video or Audio
or digital data in
an application
or other form of
presentation
An official recording of an
event or transaction which
requires validation and
reporting to regulatory
authorities.