The verification game
-
Upload
edgevalue -
Category
Data & Analytics
-
view
73 -
download
0
Transcript of The verification game
The verification game
Everyone is gambling. Speculating. Hoping for the best. Izzat, karma, in’sh’allah, God willing …. PRAY’ing that things won’t go wrong and everything will be ok and as it has been so far and is today. So far so good.
Defining the problem
No one can forecast the future. Human behaviour – and especially anticipatory behaviour – is impossible. Take the example of onetime crimes, firsttime crimes, suicide bombers, young male muslims traveling to Syria, Hollywood movie “Minority Report” like situations … this requires reverse logic, lateral thinking and outofthebox solutions that provide 10x benefits without 10x costs.
Given a population of 1 billion or even a 100,000 the problem of 1 is to find where the haystack is before you even think of finding the needle.
The problem
Keeping track of each of the population will create a police state in the name of softer goals, communism, socialism, gulag, stasi, CIA torture we can make an endless list that violates human rights and the UN charter. The “balance” between constitutions, law, privacy, security, safety, identity, integrity, validity are all 21 st century challenges.
Also “static” does not work. People change their mobile numbers and emailids. Tenants move homes. Landlords sell houses. Employees move to other states. New vehicles are bought.
Central or Federal systems and State systems may differ from Metro, Community or Business enterprise needs. Statutory is different from Policies and Guidelines, what really matters is based on behaviour and culture.
You need to find only the bad apples OR worry about the lonewolf attack OR the one needle (or a few needles) in a hay atack.
Which is the bad apple? What if it is bad on the inside? Which haystack? Where are all the haystacks? Who is the wolf masquerading as? Is he on our radar? We can’t act on the information we have so far. Which haystack should I search first? Do all haystacks look the same? What is the past, present and future of this haystack?
Any solution must also be inevitably “integrated” and not silos as today. The physical world and virtual worlds. Individuals, their online identities and avatars. Automation and manual. Internet of PCs, mobiles & things. Homes, Households, Residential towers & Commercial complexes. A smartcity or intelligent building is only as good as the “persons” who live in it. Each is a person with variable and changeable behavioural pasts, presents and future.
Verification is starting to become a painpoint. Bad publicity, “one idiot.”. New mandates are making you look at the problem of verification an immediacy for you. CSR, Workplace gender issues, whistle blower policy implementation, anarchists & jihadists in your server rooms. Definitely 80%+ of most problems worldwide are the threat from inside – the bad apples and the needles in the haystack. How do you find the 20% of the 20% of the 20% of the 20% of the 20% who may have already done this, are doing it right now OR will do so in the future?
What is your (or your Business) position?
o I / we do NOT care, firm does NOT care if …. q Whether he or she has a criminal record, it does not affect us. q Women have clear roles OR should stay at home. q Is a pedophile. q provoked is prone to anger and violence. q Clinically mentally challenged and sometimes a threat. q Has ADHD, OCD and related symptoms.
q Is always sick and does not attend office reliably. q Plays online games or browses porn in the office q Is an alcoholic or a drugabuser and misbehaves sometimes. q Is a gambler or has a lot of debt from it. q Is deeply religious and willing to die for it. q The person does not care whether and if he gets caught. q He is taking kickbacks from suppliers. q Has stocks in competing firms. q Is secretive and we do not know much about his or her private life.
o … as long as he or she does what they are being paid for, workoutput is good AND the paperwork is all perfect & verified, its ok!
We may Appear scaremongering and be talking about the 20% of the 20% of the 20% of the 20% of 20% under your control … but that’ enough – the one bad apple, the lonewolf or needle in the haystack to upset the applecart, bring business to a halt or make all haystacks un usable.
The real conundrum
The law perhaps arguably – but the facts remains – maybe based on Christian, secular, constitution, Western tradition but is one giving a chance to redeem, change, be forgiven, let go, forgiveness, if they are sorry, or plead guilty, lesser charge for cooperation or being an informant. Rehabilitation & correction facilities, won’t happen again. A first offender must be allowed redemption and given a second chance. Systems already allow this.
However we still must track onetime offenders to catch them if there is a second transgression or a repeatoffender. If we don’t do the first, the second will fall through the cracks of the system. This is where technology, automation and goodsystems can make a difference.
Solution options
Current solutions of hoping it will go away, passing the buck, throwing resources or money at it, allowing agencies to go rogue are not working.
Use our adaptive, evolutionary, community, multiple haystack grouping methodology, design, architecture, taxonomy, system, process, workflow, checklists, cloud, platform, software, hardware, hosting, tool, enabler as an endtoend comprehensive integrated solution to your “needles in haystacks” problem.
Look for an integrated solution, don’t acquire it in silos and hope to integrate it at some future date just because you don’t have the resources or you want to save your backside by
buying from a Big5 because of a Big5 analytics reports and a Big5 has paid up somewhere to get the business.
Think strategic, global citizenship, community benefit, individual rights, seamless technology not just IT/ICT leverage, user experience and of course TCO (Total Cost of Ownership) and ROI (Return On Investment) matters whether its yours, stakeholder or public money.
Our solution
Defining haystacks to start with. Some haystacks are more volatile and susceptible than others. Tools available for this are Geographic & demographic but more important is the Psychographic dimension.
Each of these haystacks may or may not have a needle or needless that concern us. In this case we leverage the haystack. Call it community policing, social media, virtual groups, fencing, gossip, selfpreservation or jsst a 21 st century way of doing this.
Talk to us from Design, Advisory, Riskprioritization & Architecting to Training, Deployment, Communications, collaboration & networking TO analytics, reporting, alerts, tracking, monitoring … endtoend per capita or peralert “cost”, “pricing” solutions whatever your size. 1 billion, 1 million, 1 thousand to a few 100.
It is an ongoing process of preevent, inevent and postevent for each and all of your haystacks and known or unknown needles in your haystack.
The process we follow already has a design and architecture and scalable tool to allow all this to happen incrementally and quickly.
Put in place a culture, values, traits, habits, encouraging specific behavioural characteristics while discouraging other behavioural characteristics. The challenge is not
Republican versus Democrat or Secularism vs Religion … it is “extremes” against the moderates …. The “tails” of the “bellcurve”. Change or else this will change you.
The following shows a “information gathering” blackbook buildup of information as it happens on a clextra platform.
You do not know anything about anything till you quantify it. We have a very simple individual risk rating system. A riskrating number between 1 and 9. Everyone starts on a 5 which is default and unknown. With every positive it lowers going to the BEST possible which is a 1. With every proven and witness, evidence support, negative, FIR, warning, alert, civil or criminal the rating drops to a maximum of 9. (Definite risk). In a more mature form this can be a 3dimensional rating as below …
We start with whatever we have or is available but our design architecture allows addon of bits and pieces of information over a period of time – manually & automated. The system – with your involvement gets more intelligent and useful over time – very little of budgets or pastinvestments will be wasted, going forward.
Features
Some of the features from the “integrated” solution …
1. Mainkey can be the India UID aadhaar (or Social Security Number or Welfare ID). 2. Using MDM (Master Data Management) any other key can be mapped to this main
key allowing crossindustry, crossutility and crosspurpose integration. 3. Geography mapping. 7level whole globe system can be integrated to GPS, Google
Maps, and layering of multiple databases on top of this. 4. Userbases : Individuals, homes, groups, clusters, communities, customers or vendor
groups. Selfservice. Informationbases and accesscontrol. Personalisation. 5. Evidence upload and download as any document. EDMS system any OS, filetype,
mimetypes, formats. 6. Checklists. Multiple points each as simple, dated, 3level approval or escalation
options, evidencebacked, decisionquality and more. 7. Base information such as Aadhaar or EMV databases, extendedAadhaar, to black
book customadd on of individuals information as you get it. Individual and Team profiling on Geography, Demography & Pscyhography.
8. Pyschographic profiling. Supporting the Geographic & Demographic. Self assessment, over 30+ behavioural assessments, peer assessments, thirdparty validation, 360 degree and more.
9. Cloud based accessible anywhere, anytime, anydevice, anyone (with or without login). Currently limited to English but any Unicode language addon is technically feasible.
10. InfoTollGate automated query system. SOAP, XML, EDIX25 integration etc. 11. eWallet payment system with subscriber subscriptions management and automated
billing and eCash management.
Possible usergroup(s) or Target audience(s)
In our design and system these could be the haystacks that we define in our solution space. The list is unlimited with different implications for different user groups under different circumstances.
1. Government – Central & State, Local authoritative. a. Foreign visitors (Immigration control) b. Criminal databases Records (Escaped, wanted, supposed to be in custody) c. Pastcriminalrecord database (Public to be able to query this) d. Travel restrictions database (Homeland security) e. Not allowed to drive (RTO/Police traffic accident, drunkdriving etc.) f. Extremist organization members. g. Homeland Security. Antiterrorist cells.
2. Private Enterprise a. KYC (Known Your Customer) for banks b. CAF (Customer Application Form) for Telecom firms. c. Do not employ register. (Reasons, background, evidence) d. Do not deal with. (AML/Corruption/Black money policerecord). e. Deal with care (Known whistleblowers) f. Defunct firms list (MCA, SEBI, BSE, NSE other government authorities) g. Profiling agencies. LPO. BPO. KPO. h. Data governance, data management, analytics firms.
3. Individuals a. Selfservice. Public access. Free. Paidfor. Subscribedto. Shift the onus. b. Prove that you are clear and are employable, can be trusted. c. Allow authorities to verify, doublecheck, confirm, audit your data.
Access would again be based on open to public as a citizen good, against to firms, subscriptions to individuals, payperuser, who can WRITE or READONLY from the systems, FREE or PAIDFOR automated transactionquerybased access, selfservice, trust & antitrust based system, records and fields in the database.
Why game?
Why is verification a game? Verification is based on the art of games and the science of game theory. You have to “know” and “anticipate” your opponent. You have to know your “board territory”, “options”, “rules” & “strategies”. There is a high degree of intuitive, pattern recognition. There is a clear “premove”, “inmove / currentmove”, “futuremove” element. When these are not defined as the problem statement to start with – the game has changed. Bad apples, needleinhaystacks and lonewolves play a different game with different rules. You have to revisit your assumptions in the first place – which is where Riskpro, clextra & our PRAY model scores wins.
Commercial & Business model options
Primarily a b2b – but your customers are our customers b2c – there are onetime, upfront costs. Oneoff purchases or monthly subscriptions Pertransaction, READONLY, payperuse, payperquery, WRITE to records and a variety of pricing options suitable to any pocket. Rs. 1/ to Rs. 5000/ per transaction; OR monthly fixed Rs. 10,000/ to Rs. 600,000/, variable as neededproject charges in the range of Rs. 3 to Rs. 30 lakhs, USD, Euro, GBP or other currency OR hosting on request.
Document …
PRAY thoughtpaper.doc Dec 17, 2014
Casper Abraham [email protected] +91 98450 61870 Founder Director Riskpro India Ventures (P) Ltd. BangaloreMumbaiDelhiChennai INDIA Website … http://riskpro.in Platform website … http://edgevalue.com/clextra Access … http://clextra.edgevalue.com (When we give you this option)