Lisa Martinez @copyright 2014 Wicked Design Solutions
Define the problem
The voice of the customer and laws which are not subject to organizations or agencies decision making has an adverse impact on public opinion and the safety of all citizen’s is at risk with a severe threat to women and children.
Voice of the Customer – Citizen or Consumer
Privacy is not subjective it must be honored in all transactions
Legal definition of a customer assume age, intent and understanding
An average person has little or no legal experience which would imply terms and conditions accepted by any users assume laws require mass agreement with regard to civil liberties and freedom’s offered a democratic society.
Good Faith rules must apply and all corporation decisions must operate in good faith.
An average user has far less chance of changing default settings; an indicator of the users adoption with technology and maturity would be considered very low
The browser used by a user when changed implies a general use of technology
Neither of the above “facts” suggest legal knowledge or wisdom several articles have circulated with the estimated time for a user to read all terms and conditions was a nightmare. The article was clear on the fact the estimates were merely reading the terms.
Terms are a poor way to manage good faith interactions with users.
Higher quality records are a valued as an asset-when low quality the risk seems unimportant
Women are targeted far more often than men online
Children are targeted 43% of the time
Prepaid to your organization
On behalf of the employee deduction
On behalf of the customer commerce transaction – based on customers location
Many companies are not using their chart of accounts in a way to do this systematically
ERP is designed to the work for you
If you are running offline EDW accounting you are unable to do this systematically.
Let’s not confuse our pass through payments on behalf of the employees and on behalf of what we collect or forget to charge customers.
Keep in mind, customers are not going appreciate an invoice for tax if you failed to include the tax in the original invoice.
Assume the invoice is sitting in the closed order pile, which translates into whether or not they open a new order for your inefficiency or do a change order on the original.
Either way you look like more work than a customer needs to have or hire resources for your ineffective practices.
Why should the customer pay two bank fees for card charges twice?
Why should the customer open a closed purchase for your disconnected process?
What ways might our customer lose confidence?
In scoring any supplier for strategic or maverick relationship positions a key definition would be the ability for the supplier to engage in low touch interactions.
The supplier follows our rules and doesn’t operate outside the law.
Corporation tax debt
Do not avoid your corporation tax debt as
The results are lowering the opportunity to build or accommodate your foreign workers.
The concept of avoiding tax debt alone says you are not acting like an American
Degrading our economy while using our vital resources.
Why would anyone elect to tax a sale based on the server location
The condition for tax debt payable to foreign countries, known the workers are moving here?
In some billion dollar companies we have them operating barges on International waters.
Where the tax debts are not even factored in the International development models?
Measure the rows in tables in storage writes to a file, get scripts and assume these are transactional applications for the purpose of threat assessments. Ensure compliance and current threat assessment portfolio’s.
Every row represents a person represents a threat you and your company have elected to take without a person’s authorization.
Remember good faith suggest citizens are least likely to understand the terms you had them approve.
Measure the response time from a user from presentation of an update on terms alert
When presented time to accept
Most immediately accept without reading; an average user doesn’t have the legal expertise to understand the legal mumbo jumbo.
The users perception about the alert “an annoying flag” i don’t care about because I assume my entries and the application are controlled by my entry or choice.
Commerce event transactions
General rules from the consumer or person making a purchase online
Frightening to think congressional decisions can be made in direct conflict with the economic health of the nation.
Tax liability – online purchases – Legislation supporting location of your servers
Rationale from business stakeholders
Why should corporations pay taxes twice?
Internal View on tax liability
Likely a limited view on the tax payment system
unlikely these people are aware of the way an employee deduction is an employee earning payment collected and paid by the corporation on funds acquired from an employee
unlikely these people are aware of the way a customer pays tax on the revenue
Both scenarios are paid by others with a corporate payment system
The taxable point in a transaction
is always based on users location
The fact most companies are unable to translate the way an ERP system works by design, is a different problem and not one an American company should have had a chance to negatively impact.
Financial Integrity Risk
Credit card disputes due to incorrect taxation
I will object to any tax charged beyond my local sales tax rate.
In no way would I purchase any item from a company in my community when the company ELECTS to pay taxes in another region.
Tax evasion is a crime – Congressional leaders who authorize such practices should be removed from office.
Citizens social responsibility – anyone would be offended and disturbed by any company who has a headquarters in our community and they are not paying taxes
Tax allows us to support the housing, roads, healthcare and justice systems for their employees.
If these companies are not employing the workers locally and bringing in people outside the area
AND avoiding taxes we need to support the people who you will not employ.
AND avoiding the taxes locally needed to build for all the foreign people you will bring to the area – despite the overpopulation of unemployed workers.
Re-engineer the process as the majority of the person’s information is collected about is not going to spend enough to justify the risk nor the return.
Create a single record for every person
Create a single party record for every company and apply the customer relationship and supplier relationship to each party.
allowing location to remain fixed while changes to the organization or agency are going to promote the new relationship at any physical location.
change for a party without causing a new physical record.
Create guide for appropriate use of ERP for taxation which is a transaction calculation derived from the ship to and country with regional tax tables.
Discover ways to outsource work to local workers for the same lower rates with higher quality of service
Employment for younger students left behind will increase rather than push these students into pregnancy and criminal populations.
Employing long term unemployed
Equal Employment Opportunities
Fair Labor Practices
Any company whose employees are not an equal representation of the community where they have offices and manage their business may be at risk of not meeting social responsibility or the spirit of the equal employment opportunity laws.
The spirit of the law intends to ensure hiring within a community well before going elsewhere, especially in dense urban communities where the populations are typically spilling over at all edges.
Considering the highest growth population will be forced into poverty, who would we blame for the higher tax rates to care for the poorest population with the highest growth states like California, Texas and
If you insist on college degrees, knowing you will eliminate the low income workforce opportunities as we have the largest drop out populations in your companies backyard.
Lets assume I’m a 1st grader. How are you using fair hiring practices?
Why Big Data isn’t about financial and operational data?
The blog intends to identify the different types of big data
In the post we advise the separation of concerns with regard to financial and operational data.
The material provides templates from the NIST work group for reference architecture although the templates changed after I prepared these.
Five Capability Model
Understand the value and purpose of the five capability model. A way to segment and separate concerns moving what MUST be governed and segregation of duties applied with record retention and zero data loss.
Yes, the five capabilities has synthesized the corporate policies, the Board priorities, the legal and legislative landscape in addition to the United Nations requirements.
Financial, Reputation, and Regulatory Threats and Weakness
The type used to run the business during transactional events used to report revenue or on expenses. In the public sector we refer to this type of data as cost and benefits.
Record Retention, zero data loss and zero down time are all applicable for the operational scope.
The best approach for any organization or agency is to separate concerns and DO NOT mix your operational parts of the business with your fit for purpose or analytic decision support systems.
Choose to mix the two and you have a higher cost on every project.
You must govern all and assume every release has a potential to influence your key controls.
Segmenting the operational scope enables speed and agility and a smaller set of applications to invest in P1 support systems.
Governance around the key control systems has supporting corporate policies and buy-in has greater probability.
Financial Transactions by stakeholder dependency across the life of the activities. Each output becomes the input to the next process stakeholder with a record as an output. The record retention requirements for financial transactions typically is 7 years or more.
Transaction Capabilities – International and Generic
Today, we are trying very hard to not include these points to avoid this issue with compliance or another which sends up read flags with security.
What’s my cure for these types dilemma’s? I eliminate or move the threats vectors to their rightful home. Big Data isn’t the system of record for financial management capabilities, nor the home for the party or offer management capabilities. For the same reason, a single copy of the expense and revenue transaction capability results are protected within a data store.
How does the suggestion help solve the problems with security, governance and compliance? The 5 capabilities are operational and the foundation of any companies business management system. The scope for Sarbanes Oxley and all regulatory reporting. Record retention requirements with zero data loss and zero down time are all part of the scope.
IF we scale the operational and financial information back to their system of record, integrity of the financial records and retention is not going to hinder the objectives of a big data solution. The technology and requirements are only a problem in regard to the financial and operational processing moving to a big data store.
A great example being records management outside the technology designed to retain records for an organization or agency. The management of data derived from a record is not going to attain the right retention treatment when converted back to a data expert in a data store.
Requirements Capability Template
Gary Mazzaferro supplied this template to the Reference Architecture team in NIST Big Data Work Groups in the first phase of NIST development on the subject.
A horizontal segmentation of inbound from source using 1 of 3 types of feeds over a network connection an API requires an ACL or similar connection.
The segmentation within the data mart section allows each functional group to own their connections and sharing with external parties based on the containment of the authorized users within the data mart for each function. Rather than rely on offline tickets which are merely rubber stamps without the integrity of the segregation of duties requirement and intent continues to be lost in the translation between IT and Business.
Three types of inbound feeds ensures the proper management of data sources, encryption specifically
In the private sector we have an option to include the 2nd horizontal data as segmented by types and use in most organizations across the world. Most businesses are not integrating their voice, video, and data and when they are we can assume streaming (real time) feeds or unstructured in column 1 or column 3.
Column 2 Operational (see above)
Column 4 Fit for purpose anything goes information we all know and most peoples desires are in their data marts.
The requirements we hear about are best segmented by the groupings identified as the grouping will manage access and allow containment when sharing beyond the organization in a shared cloud scenario. Marketing allows other marketing stakeholders to access their information.
Business Function – Roles based access
We want to avoid situations where marketing grants access to operations data without operations having anything to do with the decision.
The concept in the vertical or horizontal flows are through an online protection framework. The framework segments the grouping of people to ensure in and out of the big data store anyone operating a big data store solution has the ethical and socially responsible indicator in all service capabilities.
The real world assumes fact based sources and actual dimensions for example zip codes are fact based and actual dimensions are related to the zip code.
If we acquire information from the Census Buruea we have acquired “facts”. If we acquire information from a report, we are acquiring a sponsored report which will reflect the views of the person sponsoring the report. Certainly some reports are derived by people who intend to acquire facts, although the scope and facts are limited to the views and understanding of the people performing the work.
Fit for Purpose
The report sponsored by anyone whether private or public sector and regardless of the people performing the work, the results must be assumed as “Fit for Purpose”. The world has taken on this assumption about the viability of a any successful company as an example; people believe the company requires fit for purpose above the Real World in all scenarios.
However, we know that most companies are in silo’s and this introduces significant waste in an organization. Therefore, fit for purpose is not the best approach it is an acceptable approach if the business and management systems are tightly integrated away from fit for purpose layer.
These two terms were introduced to me by an expert blogger Jim Harris via a Radio Show he hosted with a guest speaker who framed the conversation in the same way with different examples.
Let’s consider the external stakeholders, shareholders, investors and regulatory requirements for any company would need to be working by Real World definitions. We might have very strategic ways of supplying both with little disruption in most cases.
The approach would restore systems with leverage points and feedback looks at the places where both suppliers and customers interact with an organization and employees in ways that could be determined by each company, knowing these are vital to the companies quality management systems.
Using a system simulation tool
Enabling discreet monitoring and fact based decision making using the highway analogy.
Assume that Wisdom as a Service offers the client just what I am describing beginning with a baseline assessment of the organization as it today and what we measure as a standard. The standard is the basis for Real World when applied to your organization.
A common measurement which would be true for any population. A group of people in a GIS code infers a true measure for people all over the world. A vector would be set and true for all variables when applied in a model. The population volume remains x when a modeler applies “A Variable” to the population. A modeler doesn’t not want to add the population as a variable otherwise the model simulation will work as effectively.
A model which can be used by any vertical market. Notice the segmentation of a population grouping children by milestones. Different variables apply to each of these populations. The child populations are shown with a parent authorization true for each person in the segment. The concept applies a filter type concept which requires a parent to have visibility and apply an authorization to use any online service.
“A Healthcare” model
A model which would be applicable to the healthcare industry variables.
“An Education” model
A set of variables “true” in the education vertical.
“A Media and Entertainment” model
A media and entertainment model applied to the education model.
Online Protection Framework
The above definition must be assumed for any online protection framework. Online protection for children or victims of violence have a reasonable expectation of privacy and advertising in no way justifies any reasonable expectation other than these populations have additional safeguards and greater risk of harm to physical safety.
A per cloud
An open standard solution currently being developed as a viable option for parental authorization and a reasonable expectation of privacy.
“a 3rd Party and Platform Provider”
The following diagram infers the way information would ideally remain unique to 3rd party applications and Platform Providers when a per cloud user acquires an application from the Play Store or iTunes.
The change required for 3rd party applications and Service Providers would be to refrain from all restricted data types and only acquire “Selected Visible”. The change supports the many laws in place which protect people from others collecting or reselling for any reason.
Mobility services need to be revisited and controls put in place at the release of applications into the mainstream through these two stores primarily. An assumption is made that Google and Apple are managing their stores with integrity. Therefore, understanding and changing the way these applications can damage an asset or use up the data minutes inadvertantly for users. Well this is a responsibility for these two providers who host the stores where people acquire these applications.
Understanding the general systems theory and application of the generic process framework which is a sub-system and constraint for all systems.
Step 1 Business Process 1 – Design the Strategy and Vision for an offer.
The management decision making process which must occur and iterates each year or in investment firms in the financial market would be the only example where this process may occur more often. This is true for the fact that all planning follows one of three paths.
Portfolio sub account 30
Program sub account 20
Project sub account 10
In today’s world we believe we are running with these basic concepts in our tools and process. In our process and our people practice or seek the ability to either run the business in operations of the enterprise. Change the business in continous improvement of the business operations of the enterprise. When we innovate we are transforming a market and therefore need to remain in the Portfolio layer of the enterprise.
We must assume the fact that a project manager is not going to qualify as a program manager, to manage the program with more than 1 project a person must invest in thier professional development through the enterprise employee development process or as a personal investment. In order to move into the portfolio part of a business we must invest in program level or advanced certification and then work towards an expert certification as a portfolio manager. In any enterprise the rule can apply to all resource in the Enterprise.
A portfolio must be managed by the Expert in a market offer lets apply the concept of education as the portfolio and we can assume this has a relationship with children who receive education, parents who make decisions and are the primary customer in the education industry, teachers who provide a service and the federal government supplies the majority of the funds to a delivery system which includes the state departments, county offices, local districts and schools.
The point of interest being the students are not the primary decision maker the parent is the customer in education. We learn from the moment we can feel and hear in our mothers womb, but we start the social system at birth. We know we have Federal Sponsors of the majority of our education dollars What if our deficit problem was a direct result of not educating people and not understanding the relationships in a system.
We learn in both public and private life, our economic life determines the quality and whether we can apply the learning more broadly to improve our social and family life or protect our health and physical safety by increasing our economic life opportunities.
acquire approval for operational, continuous improvement or change cost for all branchesin government and all organizations or agencies.
Step 2 – begin cost estimates
Benefits framework for all cost intended to benefit citizens
Step 1 – Identify the benefits audience for operational cost for all branchesto the citizen or consumer
Step 2 – identify the benefits audience and method of delivery for all future branch cost