Please enable JavaScript.
Coggle requires JavaScript to display documents.
Evaluating Data-Driven Applications and Solutions - Coggle Diagram
Evaluating Data-Driven Applications and Solutions
The explosion in data
We consume data in epic proportions
Personal and commercial use of data
To use these solutions, we need to look at the computing power needed and cost of this
Big companies use data as a commodity
Many companies use this data to advertise to customers
Evolving data security impacts
Data about individuals no longer comes from manual input
devices collect data such as tracking global positioning system (GPS)
Interactive digital solutions such as location services, richer social media experiences are essential tools for many users
Downside is organisations can access and use personal location information
Information as a commodity
Databases provide significant advantages when managing data
Collected and maintaned data can be shared with government agencies, financial institutions and health services.
Australian privacy principles were developed to promote eithical use of personal data
Information can be 'mined' from the Internet
Consumer profiles can be traded or sold
Companies use data sets to find consumers wants and needs.
Organisations actively seek out out new information that will go through a process and (hopefully) be disposed over time.
Consumer loyalty cards are a way in which Australian Supermarket giants Coles and Woolworths draw information from consumers
Member is asked to provide personal information like email, phone #, DOB, gender and name
Information social evolution
Australia Card, 1980s
Bob Hawke tried to introduce the 'Australia Card'
Card was a solution to tax evasion and illegal immigration.
The planned process would compare data from more than 20 databases across 10 government departments agains the main Medicare register
Medicare was thought as the best identity system for Australian citezens
Medicare had been oversubscribed by more than 500 000 people
No-one was exempt from new card
Once cards were allocated, a person was required by law to present that card when seeking employment, completing bank or financial arrangements or any transaction involving taxation.
The card was met with harsh criticisms
the need for strong privacy controls and data protections before implementation of a large-scale identification and data system such as the Australia Card.
People in the community worried if it was a ploy to spy on citizens
The australia card was abandoned in the end.
MyGov website, 2010s
MyGov is a centrilsed authentication protal connecting Australian government online services and is managed by the Department of Human Services.
Once an account is created, users link their existing services by supplying critical personal information
Challenged-based approach is seen as a safe way to authenticate users' identities and used existing data to verify their access
This is combined with two step verification through messages
The system is design to ease the complication of accessomg services online and to amalgamate access in a central system
MyGov is setup in a way that personal data can be shared between departments
The verdict
After 30 years, a big question remainsL has Australian society matured and evolved to legitimise governmental data identification and suiveillance systems, or has the Australia Card program been implemented by stealth over a generation?
Retention and disposal of data
Organisations need to have processes in place that deal with the retention and disposal of data.
This is required by the Australian Privacy and the Australian Privacy Principles, which specifically state that sensitive personal information that is no longer required to be disposed of from recording systems in a secure, timely and reasonable manner.
Specifically, Australian Privacy Principle 11, 'Security of personal information', provides guidelines that organisations must follow in destroying or de-identifying personal information.
Meta data refers to all the information surrounding the content of communication via voice
retention laws, criminal law enforcement and intelligent agencies and Australian Federal Police are able to access this information
Government Departments were making requests to the Federal police to investigate metadata information of individuals
De-identification of organisational data
With rapid growth of data, people are looking for ways to give external bodies ways to use valuable aspects of datasets without compromising privacy or security.
The open movement encourages institutions around the world to give access to their data for the good of all
the concept is to give data that is non-sensitive or is made non-sensitive with no copyright laws or licensing restrictions
In australia, state and federal governments have declered their support for open data
Australian Privacy Principles deems that de-identifying personal information is complete when the information cannot be traced back to one individual
Evaluating data-driven solutions
Evaluating while exploring data-driven problems and solutions
Evaluation is critical throughout exploration and investigation.
it enables us to gather ideas and information from a range of sources and make judgments about their effectivness in solving a problem
It is important to mind-map and articulate concepts, ideas, issues, requirements and investigations that need to occur.
We use our mind maps to develop the functional and non-functional requirements for our solution.
We then form theses requirements into criteria to be used as a tool of evaluation that will occur at intervals throughout the solution process
Evaluating while developing solutions
During development phases, evaluation takes place when we are presented with different options and justify options
Evaluating while generating solutions
During the generating phase, solution components are created and assembled
At this phase unit testing is helpful when evaluating the inner working of components to ensure their effectiveness in solving the problem
You can evaluate the generate phase against the criteria
Iterative testing of SQL statements may involve initially testing functionality with test data
Evaluating solutions
To evaluate a digital solution, we refer back to our refined prescribed and self-prescribed criteria.
The aim is to determine whether key objectives have been met and to highlight specific issues
Criteria checklists help us explore the remifications of meeting. or or not meeting, the criteria
Digital solutions course of study will be prototypes and will leave room to provide advice on further improvements, needs and innovations