Risk Threating Civil Society or Common People

Risk Associated With People 

a common approach to issues management

How often do we hear about alignment between business and IT causing less than desired outcomes?  Many respond by trying again, again and again.

Let’s take a different approach for a change.  Let’s bring business to IT.  Irregardless of your sector (public or private); we all have done a poor job of keeping technology aligned with the physical world. Expecting business people to translate beyond the devices they use and the outcomes they need technology to produce is impossible.  Translating business outcomes as a technology provider, is another complete impossibility.  

GDPR requires every business to deliver and sustain the impossible for both business and IT.  

  1. If we assume people have only one physical representation in the real world…
  2. If we claim to protect each users privacy…
  3. If we (business and IT) feel we own these individuals Data…
  4. If we acquire and resell or distribute these individuals data for a profit or benefit…

Does it make sense to expect each person to understand who uses, when it’s used, how many benefit, why the risk to economic, cultural and social life is ignored?  Does it seem fair to throw the negative outcomes over the fence when no one benefits for the business or agency use?

Parallel Conversations

Today, people in all parts of the world must try to exist in a world where everything’s really different from what we believed.  Our constitution for example, the right to life and liberty once allowed each person the opportunity to pursue happiness.  Human rights supported our national civil rights and social norms relied upon equal access promised to all.  As time passed, those education systems designed to empower us failed the many.  Justice systems turned the poor into a commodity and equal access eroded.  Safety in any part of the world can determine whether a person is likely to succeed.  Employers, financial, healthcare, insurance and student acceptance or student loans factor the individuals and rates are determined based on the zip code first.  As activist realized this systemic failure with behaviors of discrimination the list of zip codes known to reflect the poor communities were identified and put through the states (California) in 1998 Escutia legislation.  

Why do we care?

First, we all want people to carry their own weight.  In order to change the climate we must begin by looking within ourselves.  If we understand the research shows our universities graduate students who have empathy for others least of any emotional intelligence behavior.  We might want to apply new tools without bias introduced and further removing equal access to opportunities.  

  1. Self Awareness and respect for our differences – skills associated and majors for further education
  2. Empathy or acceptance of others differences in the workforce-how to organize for maximum results

There’s an application for that!

One application created by a group of pchycologist was designed with a Khan Academy style interface.  A coach or teacher can see the whole group in a single view.  A user has a series of organized views from a dashboard. 

What if the same tool was designed to improve virtual teams?  Yes, we might have a tool which supplies a way to improve teams in remote or geographically disbursed situations.  Yes, we could improve visibility into a diverse set of future workers.  A forecast tool without a team of quants or data scientist.  

Secondly, we have an imbalance of crisis amongst the haves and have nots with homelessness and mental illness showing up like never before.  We relocate people in mass numbers who lack the cultural awareness and even less tolerance for others than what we know.  We would benefit greatly from a tool (software) which could extract those who could be groomed into more sustainable futures.  Crime prevention rather than our current models of social segregation and mass incarceration.

Avoidance or Prediction by Profiling

False positives error of ommission -we don’t know what we don’t know and therefore we rarely produce fact based results.

What we do know?  Anyone’s environment or forced failure can cause any person into violence.  The research done at Stanford in the 1970’s;  The Lucifer effect proved anyone can become a criminal and when given power over others anyone can become a monster.

Humans are born kind and experiences develop in either direction causing personal biases and every human has the capacity to become a violent terrorist.  These new predictive techniques are based on low quality information often taken out of context derived by persons with no cultural nor shared social experiences.  Even more of a threat would be the opinions formed by higher incomes looking at the lowest incomes results in comparison there’s really no correlation.

Financing for Development

We learned a concentrated effort applied to global threats would quickly return long term results.  Imagine enabling the poor to become contributing members of society.  The majority as a target for economic growth rather than a commodity in the prison system.  Fathers in the home ensures less threat of a juvenile entering the justice system.  Public and private partnerships into cooperatives supplies a social sharing society with civil society.

Promoting peace

Preventing crime by empowering and supporting families to keep both parents in the home, avoids the high cost associated with prisons, healthcare and non-taxable populations, in general.

Both parents in the home or actively parenting reduces a child threat of trauma in childhood.  Research proves the child exposed to violent trauma or negligence will have far more serious health issues and recurring or escalating mental health issues.  

ICT enabling internet for all

Reverse engineering our delivery systems from many versions and variations to an online marketplace which civil society connects into versus our current confusion we have with what users want.   Build it once and use often, use globally and open up the economic opportunities for the hardest to reach.  Prioritize the funding into these hard to reach places.  

Technology advances and better infrastructures

The proposals outcomes are an investment very much like a long term investment or innovation.  These are smaller than running day to day operations and slower returns.  

My proposal suggest we leverage the innovation work done today and invest without all the internal risk pooling into public and private partnerships with civil society.  We target the hardest to reach and emerging growth which continues to elude the best of us.  Our conversations need to change from talking at to eliciting and active listening to new solutions.  In fact, these persons who benefit will be reached using the most advanced innovations. 

Measuring in a universal solution

Each business, organization or agency has its own way a person can open an issue.  Within each of these three entity types another set of business groups might require a person to report an issue another way beyond the way a person reports the issue to an entity.   Once an issue is reviewed, it just depends on the subjectivity of the individual on the recieving end to accept or defer once closed.  Rarely, is an issue understood from the persons point of view.  You see, far more of your practices are centered around your supply chain, service providers and partners.   

Knowing these deficiencies exist, it makes more sense to find what’s common amongst people and in seeking these common themes we could bring IT best practices to business.  The benefits in this article merely touch the surface for operational excellence, effectiveness and effeciency.  

Technology – An online global platform 

iCAAN manages the domains and IP addressing with many participant organized to ensure governance of the worldwide web.  We can assume the Platform as a Service connects to the Infrastructure as a Service and a Marketplace, Education and Governance would require the alignment with our physical world from the platform and infrastructure which requires Software as a Service.

Content of any type=Software, whether text or in any situation we have a data form of software, video and audio.  Bits and bytes transfer over various types of connections;

  1. In form of handwritten communications before the 1980’s
  2. In the form of text organized as information before the 2000’s
  3. In the biggest form as metadata or digital data taken from content, reduced to information then aggregated into its lowest form “data”

If I choose an application and download on my device a minimum set of data points need to exist.  My user name, my first, my last, my device, my network, my machine ID, and my password.

If I shop at a retail store, a video stream may integrate with the video resulting in comparison of my facial features.  Once identified my bank information and/or criminal history or associates would determine the response by internal protection or kind responses seeking to assist in my shopping.  Therefore, we have to understand how images and features measured for identification supplies personal identifiable details like ones we already know exist.

Ask the important questions;

  1. How much risk does your business take in?
  2. How confident are you in the actual threat?
  3. What quality measures in the current state?
  4. How do you know you have the right skills on board to manage GDPR?

If any of these questions are in doubt?  You are a prime candidate for reverse engineering the highest risk part of your organization.

Service Management for WellnessRisk(s)

A risk would be associated with any problem classified as a threat with external to the organization or agency from a business context.

A risk would be associated to any threats to a population or people.

A risk must be mitigated from the source of a problem.

A risk may seem harmless to one group or those in a certain economic class has no threat of the types of risk a person in the lowest economic class could have.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s