1. design strategy and vision for crisis management
DESCRIPTION
Public and Private Sector Privacy Mitigation with a crisis management framework based on ITIL IT Service Management. Universal WellnessTRANSCRIPT
Strategy and Planning
Cloud Capabilities with Student Led Engineering Simulations
Wicked 2014 @ Copyright Lisa Martinez 408.638.9016
We will design the way service providers will publish
We will design the way a citizen will validate
We will design in a way to meet any industry and any geography
Limitations are geographical regulations and the design assumes
the need to practice local laws.
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Planning consistently, by assuming communications and other media needs to be structured differently. ◦ Based on lifecycle approach
System Thinking rather than focused on the parts
The first phases of our programs will not focus on parts, while knowing parts are required as building blocks. ◦ Out of scope any unique industry or sector requirements
◦ Priority replicate many first and the local preferences are left for the local teams
Understanding the thematic for wellness using IT Service Management for People in a Business Service with Intimacy Gradient Layer in a design pattern.
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Based on the highest threat variable
associated with government waste
Federal to Local Thematic for Wellness
Today, we are frustrated with
government
The government provides us
with the vital needs.
We need a more direct route to
the sponsoring government
We don’t want the government
spying. ◦ Why would you think you can?
Economic
Safety
Healthcare
Family
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Person Centered New Security and Resilience
Person New
0-5 X
K-5 O
6-8 O
9-12 X
13-16 X
Workforce X
Seniors X
Adopting NIEM ◦ Using Pattern Language
◦ Personal Cloud
TMN Server – Linux
Resilience ◦ Crisis
Violence
Prevent
Respond
Monitor
CDD
DHS
IRS
CFP
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Expected =x
Optional = 0
Variables Access None
Lives with both parents
Sustainable Income
Safe Child Care
Healthcare
Food
Housing
Education
Access to Grandparents
0-5 yrs.
k-5th
6-8th
9-12th
13-16th
Workforce
Seniors
Understanding the whole child or person to apply the right amount of effort to restore wellness
WICKED 2014@copyright Lisa Martinez 408.638.9016
Proven Models ◦ Reviewed or recommended based on whether other counties have
the same service organization.
◦ Reviewed based on ability to adopt the same cloud service model.
◦ Based on flexibility in local decisions.
Copyright @2014 Wicked Design Solutions Lisa Martinez 408-638-9016
CDD
DHS
IRS
CFP
Benefits 0-5
years
K-5 6-8 9-12 13-16
Workforce Seniors
One Record Personal Cloud
Prelude – Team Career
X X X X X X X
Safe Child Care - CPR X X X
Taxes – linked to childcare X X X X
Early Detection-certification X
Violence Detection X X X X
Food Program X X X
Cyber threat awareness X X
Framework
High Performance Computing
Design Patterns
Families from Birth Title IV
Nutrition Food Services
Supported By
Mentored By
Zero to Five
K-5th 6-8th 9-12th 13-20th Workforce Seniors
1. Design Vision and Strategy WICKED 2014@copyright Lisa Martinez 408.638.9016
All humans grouped for a minimum viable system
Students
Doesn’t a system approach make it harder for people? ◦ Doing the right things are sometimes harder, not in the solution
proposed herein.
◦ Doing the right thing at the right time is easier than cleaning up a
mess or the system of messes.
In this model we leverage a per cloud solution (proposed)
with a way for parents to confirm who has the right to access
their child records. ◦ In this model, we set up the same configuration from zero to seniors
Identifying the debt only population for assurance of policy based access.
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
• Modeling by Groups or super-systems
• How are we marketing to which groups of consumers?
• Male and Female
• Minors and Adults
• How are we improving?
• Are we meeting legal and financial obligations?
• Are we secure and sustainable?
• Are we socially Responsible?
Gender
Re-use What We Know
We will learn
through out
our life.
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
From a small business to any size
up to the largest Enterprise size
company.
People are associated with one of
the groups in a longitude structure
for use as an individual or an agent
in a population.
The standard structure enables re-
use and effective planning based on
the audience.
The first four groups are protected
in all cases and must have an
associated authorization from a
parent on all programs.
We must protect children online
Return on Investment
How do I know if the information is true?
Integrity of a population simulation.
Answer: Population Data must be sourced
from the “US Census Bureau”
Engineering
Course
Urban Planning
and Monitoring
Segmentation – Can Protect threats against a child by filtering
Measuring Gains or
adjust based on
population culture or
motivation
techniques
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Segments which are known to be high risk threat vectors ◦ Assume each grouping is a fixed representation of an audience with
purpose including known research interview techniques for working
with children or seniors.
◦ Assume each grouping has known groups in each population targeted
by white collar criminals
Seniors
Children ages 0-5 year old
◦ Assume a different approach in communication by age and another
cultural, economic and geographical
Development of games or social media venues for children
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Trusted and regulated source during crisis or everyday life.
One set of building blocks used universally
WICKED 2014@copyright Lisa Martinez 408.638.9016
Understanding the common variables with an application of search
tags to enable multi-generational and cross-border association of
the shared for a minimum viable system model. ◦ Experience based learning in a model designed for rapid expansion and
local customization.
◦ Teaching students with hands on learning using open source solutions from
the wisdom of the most recognized experts in these various fields.
◦ Understanding the semantics and stage of an existing practice does not
need its own standard.
In fact, using the approach will cause a train wreck.
Big data offers an example of the subject
WICKED 2014@copyright Lisa Martinez 408.638.9016
Person Centered Design Service Providers responsibility
Security and Privacy are inter-dependent ◦ Both topics are best supplied as a
wrapper or layer designed for the rule and assumption must be made in all solutions.
Privacy ◦ Managed via a NIEM service xml
as the data collected has the most granular release of information based on each data owner in the collection.
Any use case ◦ A filter needs to be applied by all
organizations and agencies to eliminate risk being brought into the boundaries by an agent who either has access or works for under a legal arrangement.
It’s the law
Only people who have been authorized and for a specific purpose have a specific use.
The data owner is the citizen ◦ Using NIEM assumes the granularity
for the data owner protections
Access Group X
Roles Based Access X
Policy Based Access X
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
WICKED 2014@copyright Lisa Martinez 408.638.9016
Content Id
no private information
public life
Private life
economic life
social life
family life
health and safety
life
2013 @ Copyright WICKED Design Solutions
Type 2 diabetic
Physician
A manager in retail
A major retailer
IGL6 - 7 Public
IGL1-3
Private
IGL4-5
Private
X Public and Private
X
X Cultural and Family
Health and Safety
Economic and Social
Online Wellness Grid
Zer
o to
Fiv
e
K-5
th G
rade
6th-
8th
Gra
de
9th
- 12
th
Gra
de
13-2
0th
grad
e
Wor
kfor
ce
Sen
iors
Offer 1 Big Data Science and Data Centers
Offer 2 A Minimum Viable System Social Engineering X
Offer 3 Cloud with Service Management X
Offer 4 Innovation Incubator
Research – Multi-disciplinary and cross geography
Legend
Canada
Australia(state)
Central Asia
Southern Asia Middle east Asia
Southeast Asia
China and Mongolia
Wicked Design Solutions Lisa Martinez Copyright @ 2014
All Local Regional National World
X X X X X X X X X X X X X X X X
Text
Text
Text
Text
Doctorate
Workforce
Employee
Developmen
t Early
Childhood
0-5 year olds
K-5th
Grade
Elementary
School
6-8th Grade
Middle School
9-12th Grade
High School
13-14th
Grade
Community
College
15-18th
University
System Approach to Learning and Planning
Ensure ethical marketing, advertising and research for all private and public
sector delivery and investment planning.
Limitations on Objective Research
Research on Children is very subjective according to the vast research on the
subject.
Experts are in consensus on the FACTS associated with research on children.
The first question asked by an expert would likely be which method of
interviewing was used?
What techniques and how was the decision criteria made on which technique
was appropriate?
Ethical Interviewing
Perhaps the expert may want to review the research plan.
the children were interviewed and what credentials the person had performing
the interviews.
Ethical Interviewing techniques must be used or the outcomes are a threat to
children and their families.
Early Childhood Development
Preschool Readiness assessments are vital to the parents and providers must
be well trained, ideally certified in special needs detection and assessments.
Early childhood development and identification of any delays or disabilities has
been a great way to prepare parents for individual learning plans or special
education needs for their child.
Private and Public Sector - On line Child Protection Framework
Game Developers in Education must use ethical practices and be held
accountable to avoid research based games.
Machine Learning for example cannot be programmed to make ethical
decisions about the child or responses the child gives. Nor does an algorithm
have the ability to know when a child should be removed from a research
study.
The ability to target the types of research based on what we know, reduces
risk when developing games or offers for education.
Research and Delivery Considerations Technology - Online Child Protection Framework
Citizens and Consumers are at risk
billions of records are retrieved by
hackers almost daily
Fraud or reporting in a virtual reality
versus FACTs has a far greater
impact on the economic health than
we currently understand.
Recent supreme court rulings support
the NSA programs around
surveillance to end.
International Human Rights goals
were rescheduled to March 2014
Provisioning the enterprise business
data in technology, from the strategy
phase define the business service
which can be applied to all users and
do not deviate.
The five capabilty model enables far
better access and privacy controls.
Data can be of no value, often used in
the wrong context, with no way to
enforce or define the ways to abuse.
Privacy and Data seem unrelated in
most peoples minds these are unique
situations.
P
E
S
T
Lisa Martinez Wicked Design Solutions Copyright @ 2014
• Personal Privacy according
to the 4th amendment
• Acknowledged by all just in
the past weeks
• Many elected officials are
unaware of the problem
• Those who know about it are
unaware of the severity of the
problem.
• Media and Advertising
practices will need to change.
• The problem reported about
the government spying (NSA
problem) was the introduction
to what has revealed itself as
a Wicked Problem.
P Political
• Privacy isn't part of the
technology vocabulary
• Every data owner will want
individual encryption.
• We are not even close on the
topic in technology.
• We are building security solutions
as a response to threats.
• We rarely connect
data>information>knowledge>wis
dom
• We rarely use data dictionaries in
application implementations.
• We have exploits and Trojans
used in advertising simply
changing the name to allow the
unwanted behavior.
• There are technology or business
people.
• Technology experts have another
set of layers within the practices,
generally expertise is by
technology.
• Enterprise or Platform
• Platform or technology
• Technology or Functional
• All need security, all overlook the
data element.
T Technological
• People have diverse opinions
about privacy.
• If you have never been a
victim of identity theft you are
least likely to be concerned.
• People are adverse to
government spying yet unable
to imagine companies as
threats either.
• We must understand the
impact on immigration
practices, when we bring
people from regions where
laws are more spiritual than
the types we enjoy in the US.
• We as humans have a right to
privacy under international
law, our problem isn't
needing laws. We need
to have laws enforced.
• Victims of crime are at risk
• Disabled persons are at risk
• Children are at risk
S Sociological
• The economic life of the
average citizen has severely
degraded.
• Identity theft is no longer
within our control.
• Reputation risk are far
greater when we have no
way to know what might exist
on the web.
• We have no idea what a
recruiters ideas are about
morality
• The opportunity to commit
fraud against the average
consumer has risen.
• SASB has increased a
number of controls to better
manage the types of fraud
we see.
• No card present fraud
• Credit agencies targeted for
key logger exploits
• Social Engineering attacks
E Economic
Lisa Martinez Wicked Design Solutions Copyright @ 2014
Prevent and Detect
Crisis
Management
Local control by
economic
Discreet
Intervention
Supporting
Roles Crisis Tiers
(level 1, level
2 etc)
Teams by
Severity Roles and
Competencies
Crisis
Caused by
Natural
Disaster
Crisis caused
by a
Human(s)
Develop
Communication
System
Contain Threat
Social Media
Strategy
Crisis caused
by Terrorist
or War
Recover Continuous
Improvement
Change
End
Go To Changes
Google+
Define Types of
Crisis
Idea
Crisis caused
by Industrial
Disaster
Privacy-
Monitoring
Behaviors
Develop Recovery
Plan and Strategy
Lisa Martinez Wicked Design Solutions Copyright @ 2014
Concept Map Crisis Awareness and Challenge Offer
WICKED 2014@copyright Lisa Martinez 408.638.9016
Child
No
Yes
1 Do
nothing 2
Human ecology workforce bullying
Human ecology diversity and inclusion better
interactions
1 Health
2 Education
3 Housing
4 Family
No
Yes
Father role from the start, legal, emotional and
presence
Investigate a safe place for both parents to act in the childs
interest
Child has access to both parents Success
Mental Halth and Self Esteem
Crisis Management
Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
Crisis
Escalates a risk to crisis
when external stakeholders
are threatens life or liberties
Risk
Problem upgrades to a risk
May reach a customer or supplier
Detected by prevent and detect
controls
Problem
More than three users
More than three incidents
Unrelated or ongoing issue
Incident reported by a person
Minimum
Viable System Model
a universal crisis management service
We must assume the most difficult part of change has always been the people changes, mental models or ways we manage our work and
tools are meant to improve our process work. Design for the rule and enable variance, with an exception path for systematic self governing
systems.
When you can show value and gain buyin before changing the users environment you are far more likely to succeed.
Using a consistent framework for both personal and technical issues allows us to manage expectations better and re-use the same tools in
various responding services.
WICKED 2014@copyright Lisa Martinez 408.638.9016
Crisis Preparedness
Minimum Viable Systems
• Ensure access to family
life – people, car and home
• economic life access to
work and financials
• health life – doctors
• private life – Employer
• public life - Social Media
• Devices – Phone and
provider
Locator – how does this help
in a crisis?
Re-use emergency response
service on NIEM
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Cloud Capability Private Clouds
Central Child Care Store in
◦ Washington, DC
Determine Resilience Planning and
Service Level Agreements
Federal Child Nutrition Program
◦ URL access from any location
Setup master once from any existing
Title IV, Title I or Title IX federal
program
◦ Children in Family or Center based
Childcare
◦ Seniors – Adult Care
Providers are not hosting any data locally ◦ Software as a Service
◦ Authenticate based on bio-metrics
with a NIEM
An open source model intends to create personal cloud concepts with intimacy gradient levels to interact with the public and private sectors
Requires a host provider who will honor privacy
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Privacy as it relates to person’s as an individual
Protected Personal Identifiable Information
WICKED 2014@copyright Lisa Martinez 408.638.9016
Young women are targeted by stalkers and human traffickers ◦ Enforce laws protecting citizens from others who use locator features
◦ Enable citizens who are not benefiting and prefer to manage identity theft threats
by avoiding the problem managing public and private life as the data owner.
◦ In many communities the system has failed victims, causing a drop in reported
crimes of sexual violence.
Protecting targets of financial crimes is an international
priority and serious threat to everyone. ◦ An ability to acquire adequate employment or prevent false acquisitions have
become the attractor for organized criminal networks
Enforcing laws far too many are able to put at risk in the current model
Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016
David Ing – INCOSE 2014 Intimacy Gradient
By Lisa Martinez Copyright 2014 @ Wicked Design Solutions
Proposed design for NIEM groups
Managing my identity ◦ Intimacy Gradient Level 1 without technology
◦ Intimacy Gradient Level 2 with technology as
an individual
With Dependent children or dependent adult
(probate)
Access Group X
Tax Debt X
Healthcare X
Education X
Justice System X
Federal, State, Local X
**Pattern Language and Intimacy Gradient per David Ing System Science Society speaker – January 2014 Incose
Geographic 01 Self 02 Child 03 Tax 04 HCA 05 EDU 06 JUS
Nation Validate Validate Validate Validate Validate Validate
State/Tribal Validate Validate Validate Validate Validate Validate
County Validate Validate Validate Validate Validate Validate
City Validate Validate Validate Validate Validate Validate
WICKED 2014@copyright Lisa Martinez 408.638.9016
IG6
IG5
IG4
IG3
IG2
IG1
IG Level “Who” can be assigned to a group
IG1 Private a person is alone without devices
IG2 Private with Device and in own domain
IG3 Federal Tax pushes to view in IG2
IG4 Medical and Mental Health with in IG4 with
inputs to IG3
IG5 Education and Mandated Reporters push to IG3
and interact in IG5
IG6 Justice System “Pushes to” IG3 with interactions
in IG6
*See NIEM recovery use case assumes all IG2-5 data secured by region
Per Cloud
WICKED 2014@copyright Lisa Martinez 408.638.9016
IG6
IG5
IG4
IG3
IG2
IG1
IG Level “Who” can be assigned to a group
IG1 Private a person is alone without devices
IG2 Private with Device and in own domain
IG3 Federal Tax pushes to view in IG2
IG4 Medical and Mental Health with in IG4 with
inputs to IG3
IG5 Education and Mandated Reporters push to IG3
and interact in IG5
IG6 Justice System “Pushes to” IG3 with interactions
in IG6
*See NIEM recovery use case assumes all IG2-5 data secured by region
WICKED 2014@copyright Lisa Martinez 408.638.9016
Economic Life Tax
Employment IG4
Culture and Family Life
IG3
a person as a
Citizen
IG2
Public and Private Life
Health and Safety
IG5
Private Life
Education IG6
Social and Public Life
IG7
Federal
Commerce – Tax
Healthcare and Insurance
Education and justice
Roads and Infrastructure
State
Federal summary segmented by state
any additional state contributions
Commerce tax by state etc
Local
Federal Summary segmented by State
state summary segmented by county with any local contributions
*Grouping for Pattern Language Standards according to generic themes highlighted by the Women’s Law
Work Group 2013 Report UN meetings in NY
**Each layer in government has contributions to each theme while one owns the integrity and quality of
Privacy related data
WICKED 2014@copyright Lisa Martinez 408.638.9016
Intimacy Gradient Levels (NIEM group)
Whole government moves from high cost low
enforcement and low effectiveness in government
action ready using EA as the transformation opportunity
A hierarchy of authority implies the top level rules are adopted at the lowest level
Intimacy gradient level 90 Federal
Intimacy gradient level 91 state
Intimacy gradient level 92 county
Intimacy gradient level 93 city
Intimacy gradient level 94 community
assume Facebook, Google+, Twitter, Yahoo, Instagram, About.me with public access
to minimal viable information based on NIEM adoption.
Local control would only be achieved through adoption of standards universally
Access Group X
Tax Debt X
Healthcare X
Education X
Justice System X
Federal, State, Local X
WICKED 2014@copyright Lisa Martinez 408.638.9016
IG Level Assumptions
IG1 A person has every expectation of privacy and technology has no viable reason for
capture or retention.
IG2 A person expects interactions may be monitored for intelligence purposes although
Federal limitations. Specific to tax payer service layer inputs from IG3 to IG2
Published by Federal. Emergency response or notifications are published to IG2
from IG3
IG3 A person can expect interactions with Federal (view summary total Receipts) in
view form with any response to Federal Tax inquiries from IG2 pushed to Federal in
IG3 from the person or parent on behalf of the child
IG4 Any issues identified by healthcare providers are pushed from IG 4 to IG3 with
provider views and interactions limited to IG4. A person will respond from IG3
IG5 Educators will report into IG3 from IG5 including any mandated reporter to
community support system (TBD)
IG6 Justice System reports into IG3 from IG6
By Lisa Martinez Copyright 2014 @ Wicked Design Solutions
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016
Copyright @2013 Wicked Design Solutions
Lisa Martinez 408-638-9016