Victims of Crime in a Big Data World – Sandy Hook Parent’s letter with alarming crime statistics

Powerful words from a parent who lost a child in the Sandy Hook Elementary School massacre.

  • Can you imagine the following statistics included in the letter?

“According to the 2011-12 National Survey of Children’s Health, nearly half of America’s children will have suffered at least one childhood trauma before the age of 18. They need your love.”

  • We must assume at least half the children in the country (USA) will be a victim or experience a traumatic event related to violence.
    • What significance does this bring to a series on technology?
      • Common sense tells us a threat for a victim of crime would be the person who committed the crime or a person trying to protect the violent offender.
      • Before we had a reasonable expectation of privacy and countless laws protecting us.
      • When we have few opportunities for a threat we can rely on prayers and hope for the best.
    • When our quest for innovation promotes more at higher velocity, we are moving from innovators to something I am unable to put in words or assign a label.
      • Victims of crime are threatened by Big Data of certain types-Locator Data, photographs or images in any formats
  • We must prevent criminals from locating children or adults who’ve already been harmed by violence
  • We must prevent abusive partners from tormenting or kidnapping children to force the victim to their death.

Design for the rule, protect and prevent.

If we follow the approach and understand that when we design something, especially in relationship with kids we must assume the following;

  1. Economic Liability
    1. A child cannot accept terms therefore the assumption that your company is free from harm or covered legally based on forcing acceptance of terms at download;
    2. A child is not eligible for the rule of entering into an agreement with a legal entity.
    3. A child nor the parent can be liable for any commerce arrangement unless a parents authorization has been acquired on each application.
    4. Any BYOD and Mobile Device solutions must acquire a parents approval from a device large enough to read the terms.
      1. each photo image opportunity,
      2. on any research performed on a child and any behavioral profiling done with any of the same.
  2. Social and Public Privacy
    1. In some cultures a photograph of a person violates a spiritual belief
    2. Threats to a child in public and private life are long lasting – Ie; minors photographs with any sexually explicit images are associated with bullying and Sexting far too often.
    3. Any collector or provider in possession may be considered child pornography and illegal in the US.
    4. While we may be immediately inclined to inform a parent-it’s illegal to monitor without a parents expressed consent.
    5. Teenagers are finding the trust placed with a partner can be damaging to their reputation and in some cases the situation ends in death.

Here’s my argument with an understanding that I am a proven innovation expert. Not bragging, rather qualifying my ability to speak on innovation.


Big Data – Financial and Operational Type

Types of Big Data

Why Big Data isn’t about financial and operational data?

  • The blog intends to identify the different types of big data
  • In the post we advise the separation of concerns with regard to financial and operational data.
  • The material provides templates from the NIST work group for reference architecture although the templates changed after I prepared these.

Five Capability Model

Understand the value and purpose of the five capability model.  A way to segment and separate concerns moving what MUST be governed and segregation of duties applied with record retention and zero data loss.
Yes, the five capabilities has synthesized the corporate policies, the Board priorities, the legal and legislative landscape in addition to the United Nations requirements.

Financial, Reputation, and Regulatory Threats and Weakness


Horizontal Flow

The type used to run the business during transactional events used to report revenue or on expenses.  In the public sector we refer to this type of data as cost and benefits.

  • Record Retention, zero data loss and zero down time are all applicable for the operational scope.
  • The best approach for any organization or agency is to separate concerns and DO NOT mix your operational parts of the business with your fit for purpose or analytic decision support systems.
    • Choose to mix the two and you have a higher cost on every project.
    • You must govern all and assume every release has a potential to influence your key controls.
  • Segmenting the operational scope enables speed and agility and a smaller set of applications to invest in P1 support systems.
    • Governance around the key control systems has supporting corporate policies and buy-in has greater probability.
7 year retention is an average for all financial records-assume zero data loss and zero downtime

Financial Transactions by stakeholder dependency across the life of the activities.  Each output becomes the input to the next process stakeholder with a record as an output.  The record retention requirements for financial transactions typically is 7 years or more.

Transaction Capabilities – International and Generic

Today, we are trying very hard to not include these points to avoid this issue with compliance or another which sends up read flags with security.

What’s my cure for these types dilemma’s?  I eliminate or move the threats vectors to their rightful home.  Big Data isn’t the system of record for financial management capabilities, nor the home for the party or offer management capabilities.  For the same reason, a single copy of the expense and revenue transaction capability results are protected within a data store.

How does the suggestion help solve the problems with security, governance and compliance?  The 5 capabilities are operational and the foundation of any companies business management system.  The scope for Sarbanes Oxley and all regulatory reporting.   Record retention requirements with zero data loss and zero down time are all part of the scope.

IF we scale the operational and financial information back to their system of record, integrity of the financial records and retention is not going to hinder the objectives of a big data solution.  The technology and requirements are only a problem in regard to the financial and operational processing moving to a big data store.

A great example being records management outside the technology designed to retain records for an organization or agency.  The management of data derived from a record is not going to attain the right retention treatment when converted back to a data expert in a data store.

Requirements Capability Template

Gary Mazzaferro supplied this template to the Reference Architecture team in NIST Big Data Work Groups in the first phase of NIST development on the subject.  

Private Sector

A horizontal segmentation of inbound from source using 1 of 3 types of feeds over a network connection an API requires an ACL or similar connection.

The segmentation within the data mart section allows each functional group to own their connections and sharing with external parties based on the containment of the authorized users within the data mart for each function.  Rather than rely on offline tickets which are merely rubber stamps without the integrity of the segregation of duties requirement and intent continues to be lost in the translation between IT and Business.

Three types of inbound feeds ensures the proper management of data sources, encryption specifically

In the private sector we have an option to include the 2nd horizontal data as segmented by types and use in most organizations across the world.  Most businesses are not integrating their voice, video, and data and when they are we can assume streaming (real time) feeds or unstructured in column 1 or column 3.

Column 2 Operational (see above)

Column 4 Fit for purpose anything goes information we all know and most peoples desires are in their data marts.


The requirements we hear about are best segmented by the groupings identified as the grouping will manage access and allow containment when sharing beyond the organization in a shared cloud scenario.  Marketing allows other marketing stakeholders to access their information.

Business Function – Roles based access

We want to avoid situations where marketing grants access to operations data without operations having anything to do with the decision.


Public Sector

Vertical Processing

The concept in the vertical or horizontal flows are through an online protection framework.  The framework segments the grouping of people to ensure in and out of the big data store anyone operating a big data store solution has the ethical and socially responsible indicator in all service capabilities.