Define Privacy for NIST Big Data stakeholders

Technical stakeholders consistently spend a great deal of time redefining terms in ways that lose the intent of the business.

Example 1 - Seizing opportunity and preserving values - Whitehouse Report

Page 15 begins to define privacy for any audience

Example 2 - Privacy Materials from Michelle Drgons work on cloud standards for NIST

Example 3 - Big Data and Privacy a Technological Perspective

Example 4 - Tuesday meeting logs a conversation with Marco Fioretti and Lisa Martinez

The use case where a native american community Rosebud and Pine Ridge stakeholders were developing a per cloud solution for the rights of the people who intended to be sovereign and in control of their privacy.  

Sovereignty infers the person has the right to choose and we also know the position taken by technology providers always leaves the accountability to the user for any undesired outcomes.  

If a person has no authority to protect, if all technology solutions take their own opinions into the market?  We are hardly going to recognize the wickedness of the problem. The ongoing issue for the Lakota stems from the failure to enable the population with their rights to sovereignty. 

Privacy is within a persons rights to control and a human right to economic, social and cultural life. 

 

A bully in the school yard or a domestic partner who may become violent as time goes on, would be defined as the person who takes control from another persons decisions in the home and beyond these boundaries. 


Means of Implementation - mobility use case

Means of Implementation - Intimacy Gradient with user personal cloud

RELATED ARTICLESExplain
International EA and BA for Pattern Identification
Transforming the World - A strategy
3 Innovate and Transform Category 30
Transformation for International Strategy
Strategy Approaches
A way to manage the implicit order while accelerating explicit order
Plan and Execute the use of tools for Implicit in the Explicit Order
Sustainable Development Practical Theory
Cross Cutting Service Roles - Service Offers
ICT
Technical Stakeholders
Define Privacy for NIST Big Data stakeholders
Graph of this discussion
Enter the title of your article


Enter a short (max 500 characters) summation of your article
Enter the main body of your article
Lock
+Comments (0)
+Citations (0)
+About
Enter comment

Select article text to quote
welcome text

First name   Last name 

Email

Skip