1. design strategy and vision for crisis management

44
Strategy and Planning Cloud Capabilities with Student Led Engineering Simulations Wicked 2014 @ Copyright Lisa Martinez 408.638.9016

Upload: mrsalways-right

Post on 07-May-2015

505 views

Category:

Leadership & Management


0 download

DESCRIPTION

Public and Private Sector Privacy Mitigation with a crisis management framework based on ITIL IT Service Management. Universal Wellness

TRANSCRIPT

Page 1: 1. design strategy and vision for crisis management

Strategy and Planning

Cloud Capabilities with Student Led Engineering Simulations

Wicked 2014 @ Copyright Lisa Martinez 408.638.9016

Page 2: 1. design strategy and vision for crisis management

We will design the way service providers will publish

We will design the way a citizen will validate

We will design in a way to meet any industry and any geography

Limitations are geographical regulations and the design assumes

the need to practice local laws.

Copyright @2013 Wicked Design Solutions

Lisa Martinez 408-638-9016

Page 3: 1. design strategy and vision for crisis management

Planning consistently, by assuming communications and other media needs to be structured differently. ◦ Based on lifecycle approach

System Thinking rather than focused on the parts

The first phases of our programs will not focus on parts, while knowing parts are required as building blocks. ◦ Out of scope any unique industry or sector requirements

◦ Priority replicate many first and the local preferences are left for the local teams

Understanding the thematic for wellness using IT Service Management for People in a Business Service with Intimacy Gradient Layer in a design pattern.

Copyright @2013 Wicked Design Solutions

Lisa Martinez 408-638-9016

Page 4: 1. design strategy and vision for crisis management

Based on the highest threat variable

associated with government waste

Page 5: 1. design strategy and vision for crisis management

Federal to Local Thematic for Wellness

Today, we are frustrated with

government

The government provides us

with the vital needs.

We need a more direct route to

the sponsoring government

We don’t want the government

spying. ◦ Why would you think you can?

Economic

Safety

Healthcare

Family

Copyright @2013 Wicked Design Solutions

Lisa Martinez 408-638-9016

Page 6: 1. design strategy and vision for crisis management

Person Centered New Security and Resilience

Person New

0-5 X

K-5 O

6-8 O

9-12 X

13-16 X

Workforce X

Seniors X

Adopting NIEM ◦ Using Pattern Language

◦ Personal Cloud

TMN Server – Linux

Resilience ◦ Crisis

Violence

Prevent

Respond

Monitor

CDD

DHS

IRS

CFP

Copyright @2013 Wicked Design Solutions

Lisa Martinez 408-638-9016

Expected =x

Optional = 0

Page 7: 1. design strategy and vision for crisis management

Variables Access None

Lives with both parents

Sustainable Income

Safe Child Care

Healthcare

Food

Housing

Education

Access to Grandparents

0-5 yrs.

k-5th

6-8th

9-12th

13-16th

Workforce

Seniors

Understanding the whole child or person to apply the right amount of effort to restore wellness

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 8: 1. design strategy and vision for crisis management

Proven Models ◦ Reviewed or recommended based on whether other counties have

the same service organization.

◦ Reviewed based on ability to adopt the same cloud service model.

◦ Based on flexibility in local decisions.

Copyright @2014 Wicked Design Solutions Lisa Martinez 408-638-9016

CDD

DHS

IRS

CFP

Benefits 0-5

years

K-5 6-8 9-12 13-16

Workforce Seniors

One Record Personal Cloud

Prelude – Team Career

X X X X X X X

Safe Child Care - CPR X X X

Taxes – linked to childcare X X X X

Early Detection-certification X

Violence Detection X X X X

Food Program X X X

Cyber threat awareness X X

Page 9: 1. design strategy and vision for crisis management

Framework

High Performance Computing

Design Patterns

Page 10: 1. design strategy and vision for crisis management

Families from Birth Title IV

Nutrition Food Services

Supported By

Mentored By

Zero to Five

K-5th 6-8th 9-12th 13-20th Workforce Seniors

1. Design Vision and Strategy WICKED 2014@copyright Lisa Martinez 408.638.9016

All humans grouped for a minimum viable system

Students

Page 11: 1. design strategy and vision for crisis management

Doesn’t a system approach make it harder for people? ◦ Doing the right things are sometimes harder, not in the solution

proposed herein.

◦ Doing the right thing at the right time is easier than cleaning up a

mess or the system of messes.

In this model we leverage a per cloud solution (proposed)

with a way for parents to confirm who has the right to access

their child records. ◦ In this model, we set up the same configuration from zero to seniors

Identifying the debt only population for assurance of policy based access.

Copyright @2013 Wicked Design Solutions

Lisa Martinez 408-638-9016

Page 12: 1. design strategy and vision for crisis management

• Modeling by Groups or super-systems

• How are we marketing to which groups of consumers?

• Male and Female

• Minors and Adults

• How are we improving?

• Are we meeting legal and financial obligations?

• Are we secure and sustainable?

• Are we socially Responsible?

Gender

Re-use What We Know

We will learn

through out

our life.

Copyright @2013 Wicked Design Solutions

Lisa Martinez 408-638-9016

Page 13: 1. design strategy and vision for crisis management

Copyright @2013 Wicked Design Solutions

Lisa Martinez 408-638-9016

From a small business to any size

up to the largest Enterprise size

company.

People are associated with one of

the groups in a longitude structure

for use as an individual or an agent

in a population.

The standard structure enables re-

use and effective planning based on

the audience.

The first four groups are protected

in all cases and must have an

associated authorization from a

parent on all programs.

We must protect children online

Return on Investment

How do I know if the information is true?

Integrity of a population simulation.

Answer: Population Data must be sourced

from the “US Census Bureau”

Engineering

Course

Urban Planning

and Monitoring

Page 14: 1. design strategy and vision for crisis management

Segmentation – Can Protect threats against a child by filtering

Measuring Gains or

adjust based on

population culture or

motivation

techniques

Copyright @2013 Wicked Design Solutions

Lisa Martinez 408-638-9016

Page 15: 1. design strategy and vision for crisis management

Copyright @2013 Wicked Design Solutions

Lisa Martinez 408-638-9016

Page 16: 1. design strategy and vision for crisis management

Copyright @2013 Wicked Design Solutions

Lisa Martinez 408-638-9016

Page 17: 1. design strategy and vision for crisis management

Copyright @2013 Wicked Design Solutions

Lisa Martinez 408-638-9016

Page 18: 1. design strategy and vision for crisis management

Segments which are known to be high risk threat vectors ◦ Assume each grouping is a fixed representation of an audience with

purpose including known research interview techniques for working

with children or seniors.

◦ Assume each grouping has known groups in each population targeted

by white collar criminals

Seniors

Children ages 0-5 year old

◦ Assume a different approach in communication by age and another

cultural, economic and geographical

Development of games or social media venues for children

Copyright @2013 Wicked Design Solutions

Lisa Martinez 408-638-9016

Page 19: 1. design strategy and vision for crisis management

Trusted and regulated source during crisis or everyday life.

One set of building blocks used universally

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 20: 1. design strategy and vision for crisis management

Understanding the common variables with an application of search

tags to enable multi-generational and cross-border association of

the shared for a minimum viable system model. ◦ Experience based learning in a model designed for rapid expansion and

local customization.

◦ Teaching students with hands on learning using open source solutions from

the wisdom of the most recognized experts in these various fields.

◦ Understanding the semantics and stage of an existing practice does not

need its own standard.

In fact, using the approach will cause a train wreck.

Big data offers an example of the subject

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 21: 1. design strategy and vision for crisis management

Person Centered Design Service Providers responsibility

Security and Privacy are inter-dependent ◦ Both topics are best supplied as a

wrapper or layer designed for the rule and assumption must be made in all solutions.

Privacy ◦ Managed via a NIEM service xml

as the data collected has the most granular release of information based on each data owner in the collection.

Any use case ◦ A filter needs to be applied by all

organizations and agencies to eliminate risk being brought into the boundaries by an agent who either has access or works for under a legal arrangement.

It’s the law

Only people who have been authorized and for a specific purpose have a specific use.

The data owner is the citizen ◦ Using NIEM assumes the granularity

for the data owner protections

Access Group X

Roles Based Access X

Policy Based Access X

Copyright @2013 Wicked Design Solutions

Lisa Martinez 408-638-9016

Page 22: 1. design strategy and vision for crisis management

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 23: 1. design strategy and vision for crisis management

Content Id

no private information

public life

Private life

economic life

social life

family life

health and safety

life

2013 @ Copyright WICKED Design Solutions

Type 2 diabetic

Physician

A manager in retail

A major retailer

IGL6 - 7 Public

IGL1-3

Private

IGL4-5

Private

Page 24: 1. design strategy and vision for crisis management

X Public and Private

X

X Cultural and Family

Health and Safety

Economic and Social

Online Wellness Grid

Zer

o to

Fiv

e

K-5

th G

rade

6th-

8th

Gra

de

9th

- 12

th

Gra

de

13-2

0th

grad

e

Wor

kfor

ce

Sen

iors

Offer 1 Big Data Science and Data Centers

Offer 2 A Minimum Viable System Social Engineering X

Offer 3 Cloud with Service Management X

Offer 4 Innovation Incubator

Research – Multi-disciplinary and cross geography

Legend

Canada

Australia(state)

Central Asia

Southern Asia Middle east Asia

Southeast Asia

China and Mongolia

Wicked Design Solutions Lisa Martinez Copyright @ 2014

All Local Regional National World

X X X X X X X X X X X X X X X X

Page 25: 1. design strategy and vision for crisis management

Text

Text

Text

Text

Doctorate

Workforce

Employee

Developmen

t Early

Childhood

0-5 year olds

K-5th

Grade

Elementary

School

6-8th Grade

Middle School

9-12th Grade

High School

13-14th

Grade

Community

College

15-18th

University

System Approach to Learning and Planning

Ensure ethical marketing, advertising and research for all private and public

sector delivery and investment planning.

Limitations on Objective Research

Research on Children is very subjective according to the vast research on the

subject.

Experts are in consensus on the FACTS associated with research on children.

The first question asked by an expert would likely be which method of

interviewing was used?

What techniques and how was the decision criteria made on which technique

was appropriate?

Ethical Interviewing

Perhaps the expert may want to review the research plan.

the children were interviewed and what credentials the person had performing

the interviews.

Ethical Interviewing techniques must be used or the outcomes are a threat to

children and their families.

Early Childhood Development

Preschool Readiness assessments are vital to the parents and providers must

be well trained, ideally certified in special needs detection and assessments.

Early childhood development and identification of any delays or disabilities has

been a great way to prepare parents for individual learning plans or special

education needs for their child.

Private and Public Sector - On line Child Protection Framework

Game Developers in Education must use ethical practices and be held

accountable to avoid research based games.

Machine Learning for example cannot be programmed to make ethical

decisions about the child or responses the child gives. Nor does an algorithm

have the ability to know when a child should be removed from a research

study.

The ability to target the types of research based on what we know, reduces

risk when developing games or offers for education.

Research and Delivery Considerations Technology - Online Child Protection Framework

Page 26: 1. design strategy and vision for crisis management

Citizens and Consumers are at risk

billions of records are retrieved by

hackers almost daily

Fraud or reporting in a virtual reality

versus FACTs has a far greater

impact on the economic health than

we currently understand.

Recent supreme court rulings support

the NSA programs around

surveillance to end.

International Human Rights goals

were rescheduled to March 2014

Provisioning the enterprise business

data in technology, from the strategy

phase define the business service

which can be applied to all users and

do not deviate.

The five capabilty model enables far

better access and privacy controls.

Data can be of no value, often used in

the wrong context, with no way to

enforce or define the ways to abuse.

Privacy and Data seem unrelated in

most peoples minds these are unique

situations.

P

E

S

T

Lisa Martinez Wicked Design Solutions Copyright @ 2014

Page 27: 1. design strategy and vision for crisis management

• Personal Privacy according

to the 4th amendment

• Acknowledged by all just in

the past weeks

• Many elected officials are

unaware of the problem

• Those who know about it are

unaware of the severity of the

problem.

• Media and Advertising

practices will need to change.

• The problem reported about

the government spying (NSA

problem) was the introduction

to what has revealed itself as

a Wicked Problem.

P Political

• Privacy isn't part of the

technology vocabulary

• Every data owner will want

individual encryption.

• We are not even close on the

topic in technology.

• We are building security solutions

as a response to threats.

• We rarely connect

data>information>knowledge>wis

dom

• We rarely use data dictionaries in

application implementations.

• We have exploits and Trojans

used in advertising simply

changing the name to allow the

unwanted behavior.

• There are technology or business

people.

• Technology experts have another

set of layers within the practices,

generally expertise is by

technology.

• Enterprise or Platform

• Platform or technology

• Technology or Functional

• All need security, all overlook the

data element.

T Technological

• People have diverse opinions

about privacy.

• If you have never been a

victim of identity theft you are

least likely to be concerned.

• People are adverse to

government spying yet unable

to imagine companies as

threats either.

• We must understand the

impact on immigration

practices, when we bring

people from regions where

laws are more spiritual than

the types we enjoy in the US.

• We as humans have a right to

privacy under international

law, our problem isn't

needing laws. We need

to have laws enforced.

• Victims of crime are at risk

• Disabled persons are at risk

• Children are at risk

S Sociological

• The economic life of the

average citizen has severely

degraded.

• Identity theft is no longer

within our control.

• Reputation risk are far

greater when we have no

way to know what might exist

on the web.

• We have no idea what a

recruiters ideas are about

morality

• The opportunity to commit

fraud against the average

consumer has risen.

• SASB has increased a

number of controls to better

manage the types of fraud

we see.

• No card present fraud

• Credit agencies targeted for

key logger exploits

• Social Engineering attacks

E Economic

Lisa Martinez Wicked Design Solutions Copyright @ 2014

Page 28: 1. design strategy and vision for crisis management

Prevent and Detect

Crisis

Management

Local control by

economic

Discreet

Intervention

Supporting

Roles Crisis Tiers

(level 1, level

2 etc)

Teams by

Severity Roles and

Competencies

Crisis

Caused by

Natural

Disaster

Crisis caused

by a

Human(s)

Develop

Communication

System

Contain Threat

Social Media

Strategy

Crisis caused

by Terrorist

or War

Recover Continuous

Improvement

Change

End

Go To Changes

Google+

Define Types of

Crisis

Idea

Crisis caused

by Industrial

Disaster

Privacy-

Monitoring

Behaviors

Develop Recovery

Plan and Strategy

Lisa Martinez Wicked Design Solutions Copyright @ 2014

Concept Map Crisis Awareness and Challenge Offer

Page 29: 1. design strategy and vision for crisis management

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 30: 1. design strategy and vision for crisis management

Child

No

Yes

1 Do

nothing 2

Human ecology workforce bullying

Human ecology diversity and inclusion better

interactions

1 Health

2 Education

3 Housing

4 Family

No

Yes

Father role from the start, legal, emotional and

presence

Investigate a safe place for both parents to act in the childs

interest

Child has access to both parents Success

Mental Halth and Self Esteem

Crisis Management

Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016

Page 31: 1. design strategy and vision for crisis management

Crisis

Escalates a risk to crisis

when external stakeholders

are threatens life or liberties

Risk

Problem upgrades to a risk

May reach a customer or supplier

Detected by prevent and detect

controls

Problem

More than three users

More than three incidents

Unrelated or ongoing issue

Incident reported by a person

Minimum

Viable System Model

a universal crisis management service

We must assume the most difficult part of change has always been the people changes, mental models or ways we manage our work and

tools are meant to improve our process work. Design for the rule and enable variance, with an exception path for systematic self governing

systems.

When you can show value and gain buyin before changing the users environment you are far more likely to succeed.

Using a consistent framework for both personal and technical issues allows us to manage expectations better and re-use the same tools in

various responding services.

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 32: 1. design strategy and vision for crisis management

Crisis Preparedness

Minimum Viable Systems

• Ensure access to family

life – people, car and home

• economic life access to

work and financials

• health life – doctors

• private life – Employer

• public life - Social Media

• Devices – Phone and

provider

Locator – how does this help

in a crisis?

Re-use emergency response

service on NIEM

Copyright @2013 Wicked Design Solutions

Lisa Martinez 408-638-9016

Page 33: 1. design strategy and vision for crisis management

Cloud Capability Private Clouds

Central Child Care Store in

◦ Washington, DC

Determine Resilience Planning and

Service Level Agreements

Federal Child Nutrition Program

◦ URL access from any location

Setup master once from any existing

Title IV, Title I or Title IX federal

program

◦ Children in Family or Center based

Childcare

◦ Seniors – Adult Care

Providers are not hosting any data locally ◦ Software as a Service

◦ Authenticate based on bio-metrics

with a NIEM

An open source model intends to create personal cloud concepts with intimacy gradient levels to interact with the public and private sectors

Requires a host provider who will honor privacy

Copyright @2013 Wicked Design Solutions

Lisa Martinez 408-638-9016

Page 34: 1. design strategy and vision for crisis management

Privacy as it relates to person’s as an individual

Protected Personal Identifiable Information

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 35: 1. design strategy and vision for crisis management

Young women are targeted by stalkers and human traffickers ◦ Enforce laws protecting citizens from others who use locator features

◦ Enable citizens who are not benefiting and prefer to manage identity theft threats

by avoiding the problem managing public and private life as the data owner.

◦ In many communities the system has failed victims, causing a drop in reported

crimes of sexual violence.

Protecting targets of financial crimes is an international

priority and serious threat to everyone. ◦ An ability to acquire adequate employment or prevent false acquisitions have

become the attractor for organized criminal networks

Enforcing laws far too many are able to put at risk in the current model

Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016

Page 36: 1. design strategy and vision for crisis management

David Ing – INCOSE 2014 Intimacy Gradient

By Lisa Martinez Copyright 2014 @ Wicked Design Solutions

Page 37: 1. design strategy and vision for crisis management

Proposed design for NIEM groups

Managing my identity ◦ Intimacy Gradient Level 1 without technology

◦ Intimacy Gradient Level 2 with technology as

an individual

With Dependent children or dependent adult

(probate)

Access Group X

Tax Debt X

Healthcare X

Education X

Justice System X

Federal, State, Local X

**Pattern Language and Intimacy Gradient per David Ing System Science Society speaker – January 2014 Incose

Geographic 01 Self 02 Child 03 Tax 04 HCA 05 EDU 06 JUS

Nation Validate Validate Validate Validate Validate Validate

State/Tribal Validate Validate Validate Validate Validate Validate

County Validate Validate Validate Validate Validate Validate

City Validate Validate Validate Validate Validate Validate

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 38: 1. design strategy and vision for crisis management

IG6

IG5

IG4

IG3

IG2

IG1

IG Level “Who” can be assigned to a group

IG1 Private a person is alone without devices

IG2 Private with Device and in own domain

IG3 Federal Tax pushes to view in IG2

IG4 Medical and Mental Health with in IG4 with

inputs to IG3

IG5 Education and Mandated Reporters push to IG3

and interact in IG5

IG6 Justice System “Pushes to” IG3 with interactions

in IG6

*See NIEM recovery use case assumes all IG2-5 data secured by region

Per Cloud

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 39: 1. design strategy and vision for crisis management

IG6

IG5

IG4

IG3

IG2

IG1

IG Level “Who” can be assigned to a group

IG1 Private a person is alone without devices

IG2 Private with Device and in own domain

IG3 Federal Tax pushes to view in IG2

IG4 Medical and Mental Health with in IG4 with

inputs to IG3

IG5 Education and Mandated Reporters push to IG3

and interact in IG5

IG6 Justice System “Pushes to” IG3 with interactions

in IG6

*See NIEM recovery use case assumes all IG2-5 data secured by region

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 40: 1. design strategy and vision for crisis management

Economic Life Tax

Employment IG4

Culture and Family Life

IG3

a person as a

Citizen

IG2

Public and Private Life

Health and Safety

IG5

Private Life

Education IG6

Social and Public Life

IG7

Federal

Commerce – Tax

Healthcare and Insurance

Education and justice

Roads and Infrastructure

State

Federal summary segmented by state

any additional state contributions

Commerce tax by state etc

Local

Federal Summary segmented by State

state summary segmented by county with any local contributions

*Grouping for Pattern Language Standards according to generic themes highlighted by the Women’s Law

Work Group 2013 Report UN meetings in NY

**Each layer in government has contributions to each theme while one owns the integrity and quality of

Privacy related data

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 41: 1. design strategy and vision for crisis management

Intimacy Gradient Levels (NIEM group)

Whole government moves from high cost low

enforcement and low effectiveness in government

action ready using EA as the transformation opportunity

A hierarchy of authority implies the top level rules are adopted at the lowest level

Intimacy gradient level 90 Federal

Intimacy gradient level 91 state

Intimacy gradient level 92 county

Intimacy gradient level 93 city

Intimacy gradient level 94 community

assume Facebook, Google+, Twitter, Yahoo, Instagram, About.me with public access

to minimal viable information based on NIEM adoption.

Local control would only be achieved through adoption of standards universally

Access Group X

Tax Debt X

Healthcare X

Education X

Justice System X

Federal, State, Local X

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 42: 1. design strategy and vision for crisis management

IG Level Assumptions

IG1 A person has every expectation of privacy and technology has no viable reason for

capture or retention.

IG2 A person expects interactions may be monitored for intelligence purposes although

Federal limitations. Specific to tax payer service layer inputs from IG3 to IG2

Published by Federal. Emergency response or notifications are published to IG2

from IG3

IG3 A person can expect interactions with Federal (view summary total Receipts) in

view form with any response to Federal Tax inquiries from IG2 pushed to Federal in

IG3 from the person or parent on behalf of the child

IG4 Any issues identified by healthcare providers are pushed from IG 4 to IG3 with

provider views and interactions limited to IG4. A person will respond from IG3

IG5 Educators will report into IG3 from IG5 including any mandated reporter to

community support system (TBD)

IG6 Justice System reports into IG3 from IG6

By Lisa Martinez Copyright 2014 @ Wicked Design Solutions

Page 43: 1. design strategy and vision for crisis management

Copyright @2013 Wicked Design Solutions

Lisa Martinez 408-638-9016

Page 44: 1. design strategy and vision for crisis management

Copyright @2013 Wicked Design Solutions

Lisa Martinez 408-638-9016