3. identity, awareness and design patterns

27
A person centered design strategy by Lisa Martinez Copyright 2014 @WICKED 408.638.9016 WICKED 2014@copyright Lisa Martinez 408.638.9016

Upload: mrsalways-right

Post on 07-May-2015

332 views

Category:

Design


0 download

DESCRIPTION

Intimacy gradient with design patterns for identity focused learning for students.

TRANSCRIPT

Page 1: 3. Identity, Awareness and Design Patterns

A person centered design strategy by Lisa Martinez

Copyright 2014 @WICKED 408.638.9016

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 2: 3. Identity, Awareness and Design Patterns

Supply new jobs in communities for local capacity building ◦ Enable resilience for the people who need a hand up, not a handout.

◦ The families in the NCLB schools are limited by poor access to education

These are the highest density parts of every community – purely debt, ◦ We can move debt to income and reduce burden on debt

Enable sustainable economic opportunities.

Do nothing and the debt increases without income to offset and the new majority becomes the burden we could have empowered

Imagine if you learned everything you know about environmental threats from judging a speech contest? ◦ 10th-12th grade students who won their local speech contest compete at

MESA regionals.

Page 3: 3. Identity, Awareness and Design Patterns

A design pattern developed to protect the highest risk least

likely to have economic sustainability and targets for

organized white collar criminals. ◦ A design pattern developed to combat the skills gap across the world.

The proposal enforces control at the lowest level in order to release all non-

PII information into information exchange models without constraints.

A containment strategy designed to compliment a fully vetted per cloud “open

source” with adoption of NIEM services.

Enables foundation for the federal, state, and local services

directly to citizens ◦ Designed to enable rapid adoption with shared service centers based on

each region with new education offers based on open source solutions.

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 4: 3. Identity, Awareness and Design Patterns

Unable to enforce laws White Collar Criminals

Federal Contracts earmark the funds specifically to populations; ◦ The lowest income, veterans,

veterans widows, Seniors, Foster Kids, Victims of Violent crimes including human trafficking

Much of the ineffective components of local and state government are around the way we understand the federal requirements.

The number of people accused

of fraud, without due cause is

unclear. ◦ The ability to target the high risk

populations is unclear and difficult

to track behind “the noise”

◦ While many technology solutions

are viable the number of threats

appears to have increased as the

Cyber-Security infographic skills

crisis shows

Anyone will look like a criminal if their data is used or misused

Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016

Concept Map Crisis Awareness and Challenge Offer

Page 5: 3. Identity, Awareness and Design Patterns

Young women are targeted by stalkers and human traffickers ◦ Enforce laws protecting citizens from others who use locator features

◦ Enable citizens who are not benefiting and prefer to manage identity theft threats

by avoiding the problem managing public and private life as the data owner.

◦ In many communities the system has failed victims, causing a drop in reported

crimes of sexual violence.

Protecting targets of financial crimes is an international

priority and serious threat to everyone. ◦ An ability to acquire adequate employment or prevent false acquisitions have

become the attractor for organized criminal networks

Enforcing laws far too many are able to put at risk in the current model

Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016

Page 6: 3. Identity, Awareness and Design Patterns

Proposed design for NIEM groups

Managing my identity ◦ Intimacy Gradient Level 1 without technology

◦ Intimacy Gradient Level 2 with technology as

an individual

With Dependent children or dependent adult

(probate)

Access Group X

Tax Debt X

Healthcare X

Education X

Justice System X

Federal, State, Local X

**Pattern Language and Intimacy Gradient per David Ing System Science Society speaker – January 2014 Incose

Geographic 01 Self 02 Child 03 Tax 04 HCA 05 EDU 06 JUS

Nation Validate Validate Validate Validate Validate Validate

State/Tribal Validate Validate Validate Validate Validate Validate

County Validate Validate Validate Validate Validate Validate

City Validate Validate Validate Validate Validate Validate

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 7: 3. Identity, Awareness and Design Patterns

IG6

IG5

IG4

IG3

IG2

IG1

IG Level “Who” can be assigned to a group

IG1 Private a person is alone without devices

IG2 Private with Device and in own domain

IG3 Federal Tax pushes to view in IG2

IG4 Medical and Mental Health with in IG4 with

inputs to IG3

IG5 Education and Mandated Reporters push to IG3

and interact in IG5

IG6 Justice System “Pushes to” IG3 with interactions

in IG6

*See NIEM recovery use case assumes all IG2-5 data secured by region

Per Cloud

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 8: 3. Identity, Awareness and Design Patterns

IG6

IG5

IG4

IG3

IG2

IG1

IG Level “Who” can be assigned to a group

IG1 Private a person is alone without devices

IG2 Private with Device and in own domain

IG3 Federal Tax pushes to view in IG2

IG4 Medical and Mental Health with in IG4 with

inputs to IG3

IG5 Education and Mandated Reporters push to IG3

and interact in IG5

IG6 Justice System “Pushes to” IG3 with interactions

in IG6

*See NIEM recovery use case assumes all IG2-5 data secured by region

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 9: 3. Identity, Awareness and Design Patterns

Economic Life Tax

Employment IG4

Culture and Family Life

IG3

a person as a

Citizen

IG2

Public and Private Life

Health and Safety

IG5

Private Life

Education IG6

Social and Public Life

IG7

Federal

Commerce – Tax

Healthcare and Insurance

Education and justice

Roads and Infrastructure

State

Federal summary segmented by state

any additional state contributions

Commerce tax by state etc

Local

Federal Summary segmented by State

state summary segmented by county with any local contributions

*Grouping for Pattern Language Standards according to generic themes highlighted by the Women’s Law

Work Group 2013 Report UN meetings in NY

**Each layer in government has contributions to each theme while one owns the integrity and quality of

Privacy related data

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 10: 3. Identity, Awareness and Design Patterns

Intimacy Gradient Levels (NIEM group)

Whole government moves from high cost low

enforcement and low effectiveness in government

action ready using EA as the transformation opportunity

A hierarchy of authority implies the top level rules are adopted at the lowest level

Intimacy gradient level 90 Federal

Intimacy gradient level 91 state

Intimacy gradient level 92 county

Intimacy gradient level 93 city

Intimacy gradient level 94 community

assume Facebook, Google+, Twitter, Yahoo, Instagram, About.me with public access

to minimal viable information based on NIEM adoption.

Local control would only be achieved through adoption of standards universally

Access Group X

Tax Debt X

Healthcare X

Education X

Justice System X

Federal, State, Local X

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 11: 3. Identity, Awareness and Design Patterns

Everything we have today is in IGL07 ◦ We are suggesting that we carve out the risk and protect, only leaving

enforcement of the laws we have today.

◦ We’ve done the heavy lifting and only require social responsible

companies to remove the risk from their organizations.

Corporate Boards and Executive Officers have not been insured to cover

the threats.

It’s in everyone’s best interest to respond quickly to these types of risk

with threats to regulatory, financial, reputation and competitive risk.

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 12: 3. Identity, Awareness and Design Patterns

IG Level Assumptions

IG1 A person has every expectation of privacy and technology has no viable reason for capture or

retention.

IG2 A person expects interactions may be monitored for intelligence purposes although Federal

limitations. Specific to tax payer service layer inputs from IG3 to IG2 Published by Federal.

Emergency response or notifications are published to IG2 from IG3

IG3 A person can expect interactions with Federal (view summary total Receipts) in view form with

any response to Federal Tax inquiries from IG2 pushed to Federal in IG3 from the person or

parent on behalf of the child

IG4 Any issues identified by healthcare providers are pushed from IG 4 to IG3 with provider views

and interactions limited to IG4. A person will respond from IG3

IG5 Educators will report into IG3 from IG5 including any mandated reporter to community support

system (TBD)

IG6 Justice System reports into IG3 from IG6

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 13: 3. Identity, Awareness and Design Patterns

5/12/2014

By Yaoxochitl Martinez

Page 14: 3. Identity, Awareness and Design Patterns

The Risk Potential Benefits

Current Culture ◦ You really need to understand your

workforce and culture

www.playprelude.com

◦ Breaking the glass before it

shatters on your organization

www.workplacebullying.com

Self worth and esteem ◦ Complimentary career paths

◦ Self regulate based on new

learning

◦ Sovereignty

Direct access with less

administrative barriers

Tribal run social services

Wholeness with children safer

Wellness Benchmarking

Lisa Martinez Wicked Design Solutions Copyright @ 2014

Emotional Health & Safety

Page 15: 3. Identity, Awareness and Design Patterns

Variables True or

False

None

Lives with both parents

Sustainable Income

Safe Child Care

Healthcare

Food

Housing

Education

Access to Grandparents

0-5 yrs.

k-5th

6-8th

9-12th

13-20th

Workforce

Seniors

Understanding the whole child to apply the right amount of effort to restore

wellness

Wellness Variables

Page 16: 3. Identity, Awareness and Design Patterns

Line Theme Activity

1 Understanding Yourself Participants will reflect upon how their elemental iStar strengths are reflected in

their lives and the lives of those they know

2 Understanding Others Using examples, prompts, and knowledge gained from Prelude, participants will

develop greater understanding of the way their co-workers see the world

3 Effective Communication Participants will reflect on what other personality types need to experience for

them to successfully share their ideas

4 Practical Application Participants will choose from a roster of "test applications" and try to use their

Prelude knowledge for communication and collaboration

5 Self-Understanding &

Advancement

Using what they have learned, participants will develop some personal action

steps that allow them to better meet personal goals and contribute to their team.

iStar

Self Exploration

iTag

Self Expression

weTag

Team Work

allTag

Group Work

Star Smart Mendela

Cross cultural benchmarking strengths may serve as a tool to aid mental health scenarios.

Self - Awareness

Page 17: 3. Identity, Awareness and Design Patterns

Person Centered Income from Federal

Person New

0-5 X

K-5 0

6-8 0

9-12 X

13-20 X

Workforce O

Seniors X

Adopting NIEM ◦ Using Pattern Language

Intimacy Gradient

◦ Personal Cloud

Resilience ◦ Title IV

Families from birth – parentage

Child support and Foster Care in

tribal territory

TANF

CDD

DHS

IRS

CFP

Copyright @2013 Wicked Design Solutions

Lisa Martinez 408-638-9016

Expected =x

Optional = 0

Person Segments for agent

Populations or a person

NIEM Capability

Page 18: 3. Identity, Awareness and Design Patterns

Proven Models – Adopting Child and Adult (seniors)

◦ Food program

Reviewed or recommended based on whether other counties have the same

service organization.

Reviewed based on ability to adopt NIEM with Minute Menu

Prelude-Self, how I want others to see me, like minded Teams and others

Copyright @2013 Wicked Design Solutions Lisa Martinez 408-638-9016

CDD

DHS

IRS

CFP

Benefits 0-5

years

K-5 6-8 9-12 13-16

Workforce Seniors

Cyber Security and Open Source Design X X X X X X X

Child Care – Family home care new business – Livescan X X X

Families First – Birth to five year Community Support

w/Prelude

X X X X

Early Detection-certification Physical Safety and Health Life X

Violence Detection – Physical Safety and Health Life X X X X

Food Program – Physical Safety and Health LIfe X X X

Cyber threat and online reputation Economic and Social Life X X

Assumptions – Benefits Map

Page 19: 3. Identity, Awareness and Design Patterns

Variables in Crisis Prevent Mitigate Respond Recover

Lives with both parents x x

Financial Sustainability x xx xx

Safe Child Care x x xx xx

Healthcare x xx xx xx

Food x xx xx xx

Housing x xx xx xx

Education x x xx xx

Access to Grandparents x xx x x

Lisa Martinez Wicked Design Solutions Copyright @ 2014

Concept Map Crisis Awareness and Challenge Offer

Page 20: 3. Identity, Awareness and Design Patterns

Federal Contract Scalability Development Validate Scale Up

TANF (a), (b),

(c) & (e)

Region

State Nation

or World

Plus

I3 Innovation

CAFP

Food Program

Region

State

Nation or

World

Plus

I3 Innovation

Teacher

Development

Region

State Nation

or World

Play Prelude

Page 21: 3. Identity, Awareness and Design Patterns

Engineering

Systems and Quality

Systems Design and Architecture

Advanced Learning Concepts

Lisa Martinez Wicked Design Solutions Copyright @ 2014

Revenue & Benefits

Page 22: 3. Identity, Awareness and Design Patterns

People interact in the information, content(application or a combination of information and knowledge), knowledge and

record domains

Page 23: 3. Identity, Awareness and Design Patterns

Recent Terms to become familiar with; introduced by the

report to the President May 2014. ◦ Born Digital

◦ Born Analog

◦ Friendly Cameras

Distinguishing the known in a way that enables informed

decision making according to the two dimensions of human

interactions with or without machines. ◦ to a person as a citizen

◦ a person as an agent with roles and interactions with an organization

or agency.

Page 24: 3. Identity, Awareness and Design Patterns

Data

Raw Format

Applications

(information and

Knowledge)

Content

Knowledge

(Content and Information)

Information

(Documents)

Records

Display

User Transactional

User

Management

user

Company LDAP

or AD account

X X –Restricted

group see

Sarbanes Oxley

rules

Network IP and

Host

X X

Secure access

certificate or Key

X X

Monitor and

Design

Key Controls

SOD

404 Assurances

Any financial

Management,

based on roles

based access

Any create, read,

update or archive

Financial

Management

Quality

Management

Employee

Performance

All request are

pre-authorized

and validated

All approvals are

approved or

delegated to a

person with same

or greater

authority.

Asset Device Any organization

or agency

supplied

Any organization

or agency

supplied

Page 25: 3. Identity, Awareness and Design Patterns

Assume the conceptual model will converge into the data. ◦ In these materials we assume data represents content in many forms

when presented to a user who may have no technology experience.

◦ The following table suggest a person will potentially never understand

and not need to understanding that the four domains are also data.

View(s) Organization

or Agency

Content Information Knowledge Records

Person as

an

individual

No Video or Audio

or digital data in

an application

or other form of

presentation

Video or Audio

or digital data in

an application or

other form of

presentation

Video or Audio

or digital data in

an application

or other form of

presentation

An official recording of an

event or transaction which

requires validation and

reporting to regulatory

authorities.

Person as

an Agent

Yes Video or Audio

or digital data in

an application

or other form of

presentation

Video or Audio

or digital data in

an application or

other form of

presentation

Video or Audio

or digital data in

an application

or other form of

presentation

An official recording of an

event or transaction which

requires validation and

reporting to regulatory

authorities.

Page 26: 3. Identity, Awareness and Design Patterns
Page 27: 3. Identity, Awareness and Design Patterns

The end Lisa Martinez 2014@Wicked Design Solutions 408.638.9016