Category Archives: Person Centered Design

Three Business Models-Target State Service Architecture

Three Business Models

  • Innovation to Invent
  • Change to Improve
  • Operate to run the business


Sub-Account Code

  • 30 Innovation
  • 20 Change
  • 10 Run


Risk Management

  • High Risk – innovation
  • Medium Risk – change
  • Low Risk – run


Use Case Corporate Sales Tax – unique record

Lisa Martinez @copyright 2014 Wicked Design Solutions

Define the problem

The voice of the customer and laws which are not subject to organizations or agencies decision making has an adverse impact on public opinion and the safety of all citizen’s is at risk with a severe threat to women and children.
 Revenue or Benefits Transaction Capability

Voice of the Customer – Citizen or Consumer 

Privacy is not subjective it must be honored in all transactions 
Legal definition of a customer assume age, intent and understanding
  • An average person has little or no legal experience which would imply terms and conditions accepted by any users assume laws require mass agreement with regard to civil liberties and freedom’s offered a democratic society.
  • Good Faith rules must apply and all corporation decisions must operate in good faith.
  • An average user has far less chance of changing default settings; an indicator of the users adoption with technology and maturity would be considered very low
  • The browser used by a user when changed implies a general use of technology
  • Neither of the above “facts” suggest legal knowledge or wisdom several articles have circulated with the estimated time for a user to read all terms and conditions was a nightmare.  The article was clear on the fact the estimates were merely reading the terms.
  • Terms are a poor way to manage good faith interactions with users.
  • Higher quality records are a valued as an asset-when low quality the risk seems unimportant
  • Women are targeted far more often than men online
  • Children are targeted 43% of the time

Tax payments 

  • Prepaid to your organization
  • On behalf of the employee deduction
  • On behalf of the customer commerce transaction – based on customers location
  • Many companies are not using their chart of accounts in a way to do this systematically
  • ERP is designed to the work for you
  • If you are running offline EDW accounting you are unable to do this systematically.
Let’s not confuse our pass through payments on behalf of the employees and on behalf of what we collect or forget to charge customers.
Keep in mind, customers are not going appreciate an invoice for tax if you failed to include the tax in the original invoice.
  • Assume the invoice is sitting in the closed order pile, which translates into whether or not they open a new order for your inefficiency or do a change order on the original.
  • Either way you look like more work than a customer needs to have or hire resources for your ineffective practices.
  • Why should the customer pay two bank fees for card charges twice?
  • Why should the customer open a closed purchase for your disconnected process?
  • What ways might our customer lose confidence?
  • In scoring any supplier for strategic or maverick relationship positions a key definition would be the ability for the supplier to engage in low touch interactions.
  • The supplier follows our rules and doesn’t operate outside the law.

Corporation tax debt 

  • Do not avoid your corporation tax debt as
  • The results are lowering the opportunity to build or accommodate your foreign workers.
  • The concept of avoiding tax debt alone says you are not acting like an American
  • Degrading our economy while using our vital resources.
  • Why would anyone elect to tax a sale based on the server location
  •  The condition for tax debt payable to foreign countries, known the workers are moving here?
  • In some billion dollar companies we have them operating barges on International waters.
  • Where the tax debts are not even factored in the International development models?


Measure the rows in tables in storage writes to a file, get scripts and assume these are transactional applications for the purpose of threat assessments.  Ensure compliance and current threat assessment portfolio’s.
Every row represents a person represents a threat you and your company have elected to take without a person’s authorization.
  • Remember good faith suggest citizens are least likely to understand the terms you had them approve.
  • Measure the response time from a user from presentation of an update on terms alert
  • When presented time to accept
  • Most immediately accept without reading; an average user doesn’t have the legal expertise to understand the legal mumbo jumbo.
  • The users perception about the alert “an annoying flag” i don’t care about because I assume my entries and the application are controlled by my entry or choice.


Commerce event transactions
  • General rules from the consumer or person making a purchase online
  • Frightening to think congressional decisions can be made in direct conflict with the economic health of the nation.
  • Tax liability – online purchases – Legislation supporting location of your servers
Rationale from business stakeholders
  • Why should corporations pay taxes twice?
  • Internal View on tax liability
  • Likely a limited view on the tax payment system
  • unlikely  these people are aware of the way an employee deduction is an employee  earning payment collected and paid by the corporation on funds acquired  from an employee
  • unlikely these people are aware of the way a customer pays tax on the revenue
  • Both scenarios are paid by others with a corporate payment system
  • The taxable point in a transaction
  •  is always based on users location
  • The  fact most companies are unable to translate the way an ERP system works  by design, is a different problem and not one an American company  should have had a chance to negatively impact.
  • Financial Integrity Risk
  • Credit card disputes due to incorrect taxation
  • I will object to any tax charged beyond my local sales tax rate.
  • Brand Risk 
  • In no way would I purchase any item from a company in my community when the company ELECTS to pay taxes in another region.
  • Tax  evasion is a crime – Congressional leaders who authorize such practices should be removed from office.
  • Citizens  social responsibility – anyone would be offended and disturbed by any  company who has a headquarters  in  our community and they are not  paying taxes
  • Tax allows us to support the housing, roads, healthcare and justice systems for  their  employees.
  • Regulatory Risk
  • If these companies are not employing the workers locally and bringing in people outside the area
  • AND avoiding taxes we need to support the people who you will not employ.
  • AND  avoiding the taxes locally needed to build for all the foreign people  you will bring to the area – despite the overpopulation of unemployed  workers.


Re-engineer the process as the majority of the person’s information is collected about is not going to spend enough to justify the risk nor the return.
  • Create a single record for every person
  • Create a single party record for every company and apply the customer relationship and supplier relationship to each party.
  • allowing location to remain fixed while changes to the organization or agency are going to promote the new relationship at any physical location.
  •  change for a party without causing a new physical record.
  • Create guide for appropriate use of ERP for taxation which is a transaction calculation derived from the ship to and country with regional tax tables.
Discover ways to outsource work to local workers for the same lower rates with higher quality of service
  • Employment for younger students left behind will increase rather than push these students into pregnancy and criminal populations.
  • Employing long term unemployed

Equal Employment Opportunities

Fair Labor Practices

  • Any company whose employees are not an equal representation of the community where they have offices and manage their business may be at risk of not meeting social responsibility or the spirit of the equal employment opportunity laws.
  • The spirit of the law intends to ensure hiring within a community well before going elsewhere, especially in dense urban communities where the populations are typically spilling over at all edges.
  • Considering  the highest growth population will be forced into poverty, who would we  blame for the higher tax rates to care for the poorest population with  the highest growth states like California, Texas and
  • If you insist on college degrees, knowing you will eliminate the low income workforce opportunities  as we have the largest drop out populations in your companies backyard.
  • Lets assume I’m a 1st grader.  How are you using fair hiring practices?


  • Create an online cost and benefit model
  • Create an online expense and revenue model

Crisis Detection and Prevention – Grandparents Rights

Crisis Management Detection

Grandparents rights

  • Grandparents as a support and safety system for the children living in violence
  • Grandparents as the first consideration when children are proposed to be removed from the home.
    • There’s no excuse for removing children from their home to place the child with strangers.

First, let’s understand the cost of doing nothing.

A grandmother in Florida had a suspicion  “something was very wrong” with her daughter and her relationship.

Imagine for just a few moments.  Would you be very forgiving if you knew something was wrong and you had no rights no way to intervene? 

For any parent/grandparent – being helpless to save your child and her children. 

Many people immediately blame the woman being abused.  Sure, it’s easy to make judgements about things we don’t understand.  Please, open your mind to the FACT a woman with confidence and all “the will” on Earth can and does find herself “isolated”, then emotionally broken down by her abusive partner and eventually the emotional abuse and control turn violent.



Personally, it would simply break down all hope for me if I was helpless.  The nightmare no grandparent should ever face knowing their child is being harmed, then knowing our grandchildren are being harmed too?

Could you even imagine the horror?  

Nothing compares to being without anyway to respond nor any way to protect the innocent grandchildren. 

This grandmother in Florida lives her nightmare every day knowing she was helpless and because grandparents have no rights, she lost her daughter and her grandchildren.  The abuser killed her daughter and her grandchildren.

In any situation where domestic violence is concerned we must assume the children are harmed when they are forced to watch a parent abused by another parent.   The children must be allowed to go with their grandparents before strangers.


The opportunity in having “the Rights of a grandparent” forces the abuser to be much more subtle about the degree of abuse children witness.

A primary benefit of the concept of grandparent rights ensures the children are not removed and placed with strangers.   The foster care system must support the transition to grandparents just as it would support a stranger to care for the children.  The same issues will exist and often grandparents are not in a position to financially support the child(ren).

Legislation must be written and passed to support grandparent rights.

Grandparents Rights as an intervention

A grandparent rights approach allows the law to guide the inclusion of grandparents.

  • Having grandparent rights as a global law-ensures a certain safeguard in having no way to isolate the parent from their own parents.
    • An abuser must not have a way to isolate the victim or the children of the victim

Support systems for grandparents

Systems which allow grandparents an objective forum to warrant temporary placement away from the abuse

  • As the first response to any mandated report filed and justified to remove the children from the home.
    • Any victims parents would be eligible for placement of the children while the investigation occurs – unless a child specifically raises concerns about their safety.
    • Any accused parents family would not be a good choice as the parent would be likely to protect the victim at the expense of the children.

Preventing grandparents from abusing their rights must be considered and safeguards put in place to prevent such threats.

Family First and Community Support Models

Families First for First Time Parents


  • Triage for Urban Communities and teen pregnancy downfalls

  • Mentor support networks

  • Focused Support

Train both parents to be partners in healthy and realistic roles where both parents respect and treat each other fairly.

  • Prelude is a tool where each parent can first learn about themselves and then how they work in teams.
    • Extend private spaces where communications are written or guided with healthy single parents supporting each parent.
      • Objective supporting roles
      • Conflict Management skills or students seeking roles in social worker
  • Train both parents in the art of building healthy communication and skills which are vital to estranged families.
    • For the best interest of the child
      • Ideally ensuring respectful parenting relationships
    • Private forums where both parents are able to have visibility into education, medical and financial care
  • Knowing the investments are having positive returns and fairly distributed ensures better long term relationships.

Parents who are estranged and unable to communicate

Escalation Model Service Management

A risk for the child in all cases, when two adults are unable to put their own feelings aside for the best interest of their child is a risk for the child.  Irrespective of the reason, no parent should be unable to separate the interest of the child above their own interest.   In some cases, the problem is more about the new partners insecurity or expectations.

    • A forum where abusive partners can receive intervention to rebuild their lives accepting the dissolution of the hope of being family.
      • Many Fathers rights forums are bringing forward the reality that woman are also abusers
        • Especially, in using the children as a weapon against the father.
        • Safeguards must be put in place to address the gap in our current family court system.
  • Addressing Family Court – inequality

  • Parentage Rights and Responsibility

Perhaps rapid family court models

  • Crisis Prevention Planning and Intervention

    • Grandparents rights

  • Grandparents as a support and safety system for children

A grandmother in Florida had a suspicion something was very wrong with her daughters relationship and was left no options and no rights.  The woman was left with the bitter taste of helplessness as she buried her daughter and grandchildren.

The scenario appears to be a unique or something beyond the woman’s control.  I assure you, having rights established for all grandparents is a safety net for the children.   A parent being abused is slowly backed into a corner and often the person has no idea they are being groomed for a life of abuse.  The only way to protect some children will be to through a mechanism where the grandparent and children are allowed the bond an abuser cannot control.  The opportunity in having “the Rights of a grandparent” forces the abuser to be much more subtle about the degree of abuse children witness.

A primary benefit being the rights of the grandparent as unavoidable and non-negotiable without the legal system.   Specifically, the elimination of such rights must be difficult and formal.

Well outside the abusers ability to control.

  • Establishing tax credit rules at birth

    • Ensuring joint custody allows tax credit equally as an attractor
    • Establishing any child care pretax or credit at filing returns is equal or identified and not submitted by both parents.
  • Establishing HIPPA relationships between both parents
    • Ensure joint visibility on all healthcare related matters for the child

Grandparents Rights as an intervention and prevention mechanism

Creating the role of grandparents in the child’s life allows a subtle presence allowed by law when a woman is pushed into isolation by an abusive partner.

In the same context a role for fraternal grandparents when a female is the abuser.

Domestic Violence has many forms and the disturbing trend around female abusers is a no win situation for a man.

Whether the abuse is of the mental form or physical form has little bearing on the children.  Abuse in any form is an unhealthy scenario and one where most crisis are born.

Abusive partners are determined to eliminate any interference from anyone close to the person being prepared for abuse.

Partners who harm are predictable and religious about the isolation stage.

The abuser will often accuse the person of not being sane or thinking irrational and isolation protects them from what others will say or do.

Early warning signs are the breakdowns in family relationships or loyalty test.

Who means more to you?

I can’t love someone who doesn’t put our relationship first.

These people are just trying to hurt us and our love.

A grandparent rights approach allows the law to guide the inclusion of grandparents.

-having rights as a grandparent breaks down the first layer of isolation

Victims of Crime in a Big Data World – Sandy Hook Parent’s letter with alarming crime statistics

Powerful words from a parent who lost a child in the Sandy Hook Elementary School massacre.

  • Can you imagine the following statistics included in the letter?

“According to the 2011-12 National Survey of Children’s Health, nearly half of America’s children will have suffered at least one childhood trauma before the age of 18. They need your love.”

  • We must assume at least half the children in the country (USA) will be a victim or experience a traumatic event related to violence.
    • What significance does this bring to a series on technology?
      • Common sense tells us a threat for a victim of crime would be the person who committed the crime or a person trying to protect the violent offender.
      • Before we had a reasonable expectation of privacy and countless laws protecting us.
      • When we have few opportunities for a threat we can rely on prayers and hope for the best.
    • When our quest for innovation promotes more at higher velocity, we are moving from innovators to something I am unable to put in words or assign a label.
      • Victims of crime are threatened by Big Data of certain types-Locator Data, photographs or images in any formats
  • We must prevent criminals from locating children or adults who’ve already been harmed by violence
  • We must prevent abusive partners from tormenting or kidnapping children to force the victim to their death.

Design for the rule, protect and prevent.

If we follow the approach and understand that when we design something, especially in relationship with kids we must assume the following;

  1. Economic Liability
    1. A child cannot accept terms therefore the assumption that your company is free from harm or covered legally based on forcing acceptance of terms at download;
    2. A child is not eligible for the rule of entering into an agreement with a legal entity.
    3. A child nor the parent can be liable for any commerce arrangement unless a parents authorization has been acquired on each application.
    4. Any BYOD and Mobile Device solutions must acquire a parents approval from a device large enough to read the terms.
      1. each photo image opportunity,
      2. on any research performed on a child and any behavioral profiling done with any of the same.
  2. Social and Public Privacy
    1. In some cultures a photograph of a person violates a spiritual belief
    2. Threats to a child in public and private life are long lasting – Ie; minors photographs with any sexually explicit images are associated with bullying and Sexting far too often.
    3. Any collector or provider in possession may be considered child pornography and illegal in the US.
    4. While we may be immediately inclined to inform a parent-it’s illegal to monitor without a parents expressed consent.
    5. Teenagers are finding the trust placed with a partner can be damaging to their reputation and in some cases the situation ends in death.

Here’s my argument with an understanding that I am a proven innovation expert. Not bragging, rather qualifying my ability to speak on innovation.

Big Data – Financial and Operational Type

Types of Big Data

Why Big Data isn’t about financial and operational data?

  • The blog intends to identify the different types of big data
  • In the post we advise the separation of concerns with regard to financial and operational data.
  • The material provides templates from the NIST work group for reference architecture although the templates changed after I prepared these.

Five Capability Model

Understand the value and purpose of the five capability model.  A way to segment and separate concerns moving what MUST be governed and segregation of duties applied with record retention and zero data loss.
Yes, the five capabilities has synthesized the corporate policies, the Board priorities, the legal and legislative landscape in addition to the United Nations requirements.

Financial, Reputation, and Regulatory Threats and Weakness


Horizontal Flow

The type used to run the business during transactional events used to report revenue or on expenses.  In the public sector we refer to this type of data as cost and benefits.

  • Record Retention, zero data loss and zero down time are all applicable for the operational scope.
  • The best approach for any organization or agency is to separate concerns and DO NOT mix your operational parts of the business with your fit for purpose or analytic decision support systems.
    • Choose to mix the two and you have a higher cost on every project.
    • You must govern all and assume every release has a potential to influence your key controls.
  • Segmenting the operational scope enables speed and agility and a smaller set of applications to invest in P1 support systems.
    • Governance around the key control systems has supporting corporate policies and buy-in has greater probability.
7 year retention is an average for all financial records-assume zero data loss and zero downtime

Financial Transactions by stakeholder dependency across the life of the activities.  Each output becomes the input to the next process stakeholder with a record as an output.  The record retention requirements for financial transactions typically is 7 years or more.

Transaction Capabilities – International and Generic

Today, we are trying very hard to not include these points to avoid this issue with compliance or another which sends up read flags with security.

What’s my cure for these types dilemma’s?  I eliminate or move the threats vectors to their rightful home.  Big Data isn’t the system of record for financial management capabilities, nor the home for the party or offer management capabilities.  For the same reason, a single copy of the expense and revenue transaction capability results are protected within a data store.

How does the suggestion help solve the problems with security, governance and compliance?  The 5 capabilities are operational and the foundation of any companies business management system.  The scope for Sarbanes Oxley and all regulatory reporting.   Record retention requirements with zero data loss and zero down time are all part of the scope.

IF we scale the operational and financial information back to their system of record, integrity of the financial records and retention is not going to hinder the objectives of a big data solution.  The technology and requirements are only a problem in regard to the financial and operational processing moving to a big data store.

A great example being records management outside the technology designed to retain records for an organization or agency.  The management of data derived from a record is not going to attain the right retention treatment when converted back to a data expert in a data store.

Requirements Capability Template

Gary Mazzaferro supplied this template to the Reference Architecture team in NIST Big Data Work Groups in the first phase of NIST development on the subject.  

Private Sector

A horizontal segmentation of inbound from source using 1 of 3 types of feeds over a network connection an API requires an ACL or similar connection.

The segmentation within the data mart section allows each functional group to own their connections and sharing with external parties based on the containment of the authorized users within the data mart for each function.  Rather than rely on offline tickets which are merely rubber stamps without the integrity of the segregation of duties requirement and intent continues to be lost in the translation between IT and Business.

Three types of inbound feeds ensures the proper management of data sources, encryption specifically

In the private sector we have an option to include the 2nd horizontal data as segmented by types and use in most organizations across the world.  Most businesses are not integrating their voice, video, and data and when they are we can assume streaming (real time) feeds or unstructured in column 1 or column 3.

Column 2 Operational (see above)

Column 4 Fit for purpose anything goes information we all know and most peoples desires are in their data marts.


The requirements we hear about are best segmented by the groupings identified as the grouping will manage access and allow containment when sharing beyond the organization in a shared cloud scenario.  Marketing allows other marketing stakeholders to access their information.

Business Function – Roles based access

We want to avoid situations where marketing grants access to operations data without operations having anything to do with the decision.


Public Sector

Vertical Processing

The concept in the vertical or horizontal flows are through an online protection framework.  The framework segments the grouping of people to ensure in and out of the big data store anyone operating a big data store solution has the ethical and socially responsible indicator in all service capabilities.

Real World versus Fit for Purpose

Measuring “Real World” for fact based Decision Making

The real world assumes fact based sources and actual dimensions for example zip codes are fact based and actual dimensions are related to the zip code.

If we acquire information from the Census Buruea we have acquired “facts”.  If we acquire information from a report, we are acquiring a sponsored report which will reflect the views of the person sponsoring the report.  Certainly some reports are derived by people who intend to acquire facts, although the scope and facts are limited to the views and understanding of the people performing the work.

Fit for Purpose

The report sponsored by anyone whether private or public sector and regardless of the people performing the work, the results must be assumed as “Fit for Purpose”.  The world has taken on this assumption about the viability of a any successful company as an example; people believe the company requires fit for purpose above the Real World in all scenarios.

However, we know that most companies are in silo’s and this introduces significant waste in an organization.  Therefore, fit for purpose is not the best approach it is an acceptable approach if the business and management systems are tightly integrated away from fit for purpose layer.


These two terms were introduced to me by an expert blogger Jim Harris via a Radio Show he hosted with a guest speaker who framed the conversation in the same way with different examples.

External Auditors – Annual Financial or Bi-annual Re-certifications

Let’s consider the external stakeholders, shareholders, investors and regulatory requirements for any company would need to be working by Real World definitions.  We might have very strategic ways of supplying both with little disruption in most cases.

Systems Approach To Management

The approach would restore systems with leverage points and feedback looks at the places where both suppliers and customers interact with an organization and employees in ways that could be determined by each company, knowing these are vital to the companies quality management systems.

Using a system simulation tool

Enabling discreet monitoring and fact based decision making using the highway analogy.


Assume that Wisdom as a Service offers the client just what I am describing beginning with a baseline assessment of the organization as it today and what we measure as a standard.  The standard is the basis for Real World when applied to your organization.


Wisdom as a Service

Wicked Design Solutions

Lisa Martinez 408.638.9016