Technology Research and Innovation

Internet & Fragmentation: Moving Towards Integration

Digital fragmentation, characterized by disjointed systems, duplicate data, and incompatible interfaces, is a growing problem that undermines the effectiveness of …

Online learning – Right Words

Attendance is different online, in fact, it’s called participation.  Attendance is not a part of online learning.  I think it’s …

Strategic Planning – Technology Evaluation

A set of two words summarizing a planned effort to identify and pursue opportunities for technological change. Innovation is the …

Technology – Qualitative Research

When trying to adhere to program requirements of another discipline (or educational department), not only must the new method be …

Medical/Dental X-Ray Technologies

Problems: The technician states they need to take a picture of the inside of the mouth or body to proceed …

Technology Controls

Limiting or ‘manipulating’ the interests of viewers, readers, listeners, and skewing thoughts and ideals using bad business mentality, where there …

An Integrated Architecture

An Integrated Architecture What is integrated architecture?  In brick-and-mortar terms, or simply building architecture, of which I’m not sure integrated …

Law and Compliance Review

Background To establish methods for reviewing and testing compliance, one must understand the structure of the law, its application, its …

Policy and Regulation

Listen to associated Podcast: Law, Policy, and Compliance: RDT&E and Standardization What is it, where do I find information on …

Identity and Security Design of the Internet

Security Interoperability:  A More Efficient Internet Design Research Problem:The Internet does not have a shared data architecture that allows for …

Google’s Sign In With Feature

Why are we okay with massive duplication of our personal information? A mini thesis on risks, benefits, and challenges for …

Software Development Methodologies

Agile, Scrum, DevOps, Lean Development, Waterfall Resources: Software Development Lifecycle Guide – Software Development Life Cycle (SDLC) is a process …

About

This is just a short excerpt for the about page.

Strategic Planning – Technology Evaluation

A set of two words summarizing a planned effort to identify and pursue opportunities for technological change. Innovation is the …

Law and Compliance Review

Background To establish methods for reviewing and testing compliance, one must understand the structure of the law, its application, its …

Identity and Security Design of the Internet

Security Interoperability:  A More Efficient Internet Design Research Problem:The Internet does not have a shared data architecture that allows for …

Google’s Sign In With Feature

Why are we okay with massive duplication of our personal information? A mini thesis on risks, benefits, and challenges for …

Etymology & Evolution of Computer Science – Strategic Planning

Step 1:Brainstorming Innovations List (10-15 Needs) Career Planning Assessment (Educator, Business CTO, CIO, Writer, Researcher, Advisor)Supplemental Learning and Licensure of …

Neurolinguistic Programming (NLP)

Attitudes that Count – Mindsets for Business Successfrom: NLP: The Essential Handbook for Business: Communication Techniques to Build Relationships, Influence …

Social Media Investigation

CASE STUDY:  FALSE PROFILES or BAD COMMUNICATION SKILLS?Bridgette McCoy (claims social justice) was morbidly Obese when we started at V-Wise.  …

Internet & Fragmentation: Moving Towards Integration

Digital fragmentation, characterized by disjointed systems, duplicate data, and incompatible interfaces, is a growing problem that undermines the effectiveness of …

Online learning – Right Words

Attendance is different online, in fact, it’s called participation.  Attendance is not a part of online learning.  I think it’s …

About

This is just a short excerpt for the about page.

Internet & Fragmentation: Moving Towards Integration

Digital fragmentation, characterized by disjointed systems, duplicate data, and incompatible interfaces, is a growing problem that undermines the effectiveness of …

Read More

Internet & Fragmentation: Moving Towards Integration

Digital fragmentation, characterized by disjointed systems, duplicate data, and incompatible interfaces, is a growing problem that undermines the effectiveness of …

Read More

Internet & Fragmentation: Moving Towards Integration

Digital fragmentation, characterized by disjointed systems, duplicate data, and incompatible interfaces, is a growing problem that undermines the effectiveness of …

Read More

Internet & Fragmentation: Moving Towards Integration

Digital fragmentation, characterized by disjointed systems, duplicate data, and incompatible interfaces, is a growing problem that undermines the effectiveness of …

Read More

Internet & Fragmentation: Moving Towards Integration

Digital fragmentation, characterized by disjointed systems, duplicate data, and incompatible interfaces, is a growing problem that undermines the effectiveness of …

Read More

Internet & Fragmentation: Moving Towards Integration

Digital fragmentation, characterized by disjointed systems, duplicate data, and incompatible interfaces, is a growing problem that undermines the effectiveness of …

Read More

About

This is site for technological ideas covering multiple realms, created to spark, document, and share ideas, perspectives, and knowledge of advances in computers, psychology, business systems, personal home computing, and communications.

I am by no means a master in the field of writing, inventing, or conducting formal testing in these areas, and sometimes even consider myself a subject of such tests that may or may not exist, but I am a human with both field and personal experience in the areas of business computing, military, and in one word – Intelligence.  I’ve never really considered myself an Engineer or Programmer, although I have written and designed systems and have a visionary and intellectual ability to see opportunities for automation and improvement using Technology.

This site might appear disorganized, random, or without direction, but it is my brain dumping ground and a place to ponder and capture advancements in world technology, personal development, and other wonderful thoughts and ideas of whats possible, what is real, and what is happening in the world of cyber awareness, security, and the merging of multiple and varied realms or dimensions.

I wasn’t a major science fiction fan or lover of Star Wars and other Hollywood films where aliens take over the world, in fact, I’m not certain they exist, but I am a fan of CYBER and the advancement of robots, computers, as well the boring topic of Risk Management in Technology and Human Development.  I write and speak on topics that seem to scare people or cause them to assume Delusion, Hallucination, or a Mental Health Disorder, and have in fact been diagnosed with several, but I can’t help it, I have a beautiful mind and have worked in the field of beautiful, yet chaotic possibilities of Information Warfare, Intelligence, and Dominance where Humans and Computers Interact Telepathically, along with Human Telepathic Communications and Physics.

About

This is just a short excerpt for the about page.

Strategic Planning – Technology Evaluation

A set of two words summarizing a planned effort to identify and pursue opportunities for technological change. Innovation is the change that initiates strategic planning; either as a matter of adapting to conditions outside the sphere of influence and locus of control or cultivated by new thinking and a need for change. A new approach, solution, system change, or design is often considered innovative ways to modernize or change the environment and improve performance, but when everything is going well, there is no obvious need, which is actually when innovation should start. A ‘need-based’ system of work is not the highest level of performance. Companies that innovate focus on far more than just meeting the needs and demands of their customers and employees. Technology companies that build determine what is logical and best, giving much-desired features that their customers aren’t not even aware are possible. This is why technology innovation has the greatest impact – it can open up possibilities many experienced business strategic planners had no idea was possible or affordable.

This sparks the need to seek professional help outside the company, like a consultancy, or to develop talent permanently devoted to innovation. An innovative company understands that for technology to work its best for the company, it must innovate beyond the company. This is why it’s so beneficial for companies and their partners to invest in technology together, because technology performs its best working across an entire industry, rather than a ‘target market’ approach.

If a company can think strategically beyond itself, its partners, and customers – no longer limited to the only product it provides or area it serves, and step outside of the ‘market share’ or ‘regional leader’ approach, or ideals of price leader or preferred vendor ideals, it can then free itself from the boundaries and restrictions it has placed on itself because of its targeted focus. If it could consider how its products and people work with technology, inside the walls of its operation or in the lives of its customers, it can begin innovation and integrate technology in its offerings.

It would require a shift – from single profit line addition and subtraction goal setting and evaluation to high, ethically. and morally driven plans to revolutionize far beyond a single product or service through the use of technology. Sometimes information is more valuable than the product being sold.

Businesses must understand and seek to leverage not only data, but technology and ideas from other sources; using risk evaluation to help guide it through its decision making, or trying a new approach of non-predictive non-numerical or data-driven intent to profit, but with specific goals in mind. Like making a product change, move to clear the way for the advancement of another product, or introduce another more profitable part of the business in the exchange of information or engineering of systems, standards, and processes.

It might seem unfathomable to partner in investments with external companies beyond simple outsourcing terms of tasking, but to share in the investment and profit share that the technology brings. When a company leader innovates with technology at every point, it paves the way for the entire market to revolutionize and benefit. If the leading company does not focus on investments and profits in terms of its system design being profitable for the entire industry, and only focuses on its small company or single company profit margin – then much is lost.

When things are functioning well is the best time to begin strategic planning for innovation. It’s also the best time to evaluate systems and technology because well-functioning and high performing organizations know their jobs and systems well and achieve consistent results – this means it is time to innovate.

Responding to market conditions by taking immediate action using human resource adjustment, organization, or buying a new product, is not the best approach, and can cause long-term damage. Although some things require urgency, major technology changes and sometimes even small ones require careful planning and tests. Resistance to change is the opposite, where leaders fear making any change so the status quo remains and the expected result is always achieved. This leads to stagnation and eventual employee retention problems. Innovative companies know and understand how creative technology changes affect an industry, possibly large populations in high numbers, beyond a single organization, and can effectively and efficiently manage areas of impact, with clear intent and outcomes. When external change out of the locus of control occurs, companies are forced to adapt.

Long-term industrial planning and market leadership is key to innovation, beyond evaluating technology for a simple internal process for automation or to make the ‘sales process easier.’ Innovators have developed technology that has changed the way things are ordered, bought, sold, managed, needed, or no longer needed and wanted. It’s the ‘individualized’ and ‘separate’ approach that prevents a nation or world from functioning as one unit and while it’s good for companies to be profitable, focused, and business minded; they need to take it a step further and function in the best interest of the industry, market, or population for best results.

A specific technology change implemented by one small company can revolutionize the entire world if companies could adjust their understanding of innovation and strategic planning for technology.

In insurance: A company sought to create multiple store fronts to meet the needs of many regions; it took a regional approach. Technology began to soar and online ordering systems became popular and now a necessity, changing the way business is done. Rather than stopping at how it’s ordered so the salesperson can get excited about his commission, or worry that he no longer will receive one; the company should focus on how it can lead innovation of the technology by offering more to its customer, such as REAL data that assists in decision making; helps consumers feel more informed, secure, and provides a means to share valuable information necessary to get a job done better and faster, more trusted, which in the end results in lower cost and happier humans. If it can expand its influence and focus on regulatory systems and other systems reliant or dependent upon its products or services, beyond the consumer, such as agencies, competitors, and the objects or humans it insures, it could then get one step closer to expanding its customer base — by seeing opportunity for new kinds of customers, and new services, that simple technology investments opened the door for.

A innovative insurance company invests in finding ways to eliminate the need for its service, by transforming the overall system that requires it, which is done through data, evidence, partnerships, reasonable and consistent pricing models, greed management, and ideals of ‘work functions’ being that of a salesperson, regional manager, or CEO of people working in a regulated industry.

Insurance companies that partner with auto-makers for accident avoidance investments in the design, with proof of prevention, are now able to invest in the right area; making the world a safer place, but if they have no insight into real data, the systems continue to operate as if ‘accidents will always happen’ and will cost a lot of money and that cost will only go up – when perhaps, that cost can be eliminated, or paid by another system of a new innovative design. If statistics are not updated and correct, and well understood by regulators, citizens, insurance brokers, and sellers, then we are paying for old data, unaware of change. The cycle continues, even though new technology proves roads are safer and accidents are less, because of several reasons, perhaps done many years ago, and not known because of the lack of ability to adjust legislation and regulation, or suggest the transformation of some companies to seek to eliminate the need for their service. There’s much doubt in this ideal, because it seems like a grand endeavor; counterproductive, loss of profit, but innovation ensures flow of money and greater value when a greater need can be met with a product that goes far beyond.

Be not profit minded; be change minded; and once the change has settled, be of high value and high impact ready to change yourself and become consumers and developers of high cost data with good reason or without reason and evidence as to where the money goes.

They must be innovative and smart in their designs, or acquisitions and sales; with minds to innovate and engineer and partner with technology companies, rather than to simply buy and use.

Law and Compliance Review

Background

To establish methods for reviewing and testing compliance, one must understand the structure of the law, its application, its limitations, and how technology is related to the law’s implementation.  If no system of compliance exists, then is it even necessary to create rules and compliance if law, regulation, and policy are not a part of the business or system?  Even though one or more of those things might not be directly applicable, it is necessary to have an efficient tracking process, not just for compliance but also for what parts of the system carry risk.  Because all are subject to the law, all must be able to implement the law or new policies quickly and effectively, but the important fact is that proof of the law’s effectiveness using technology must be available, otherwise companies are forced to blindly follow, and lawmakers are forced to blindly create.

Few laws attempt to govern technology, such as the Sarbanes Oxley Act, the Privacy Act of 1976, the California Consumer Protections Act, The Healthcare Information and Portability Act, and the Anti-Can Spam Act and the outrageous number of articles in the Constitution and case law that set precedent or regulations (Savvy Smart Solutions, 2024).  The Constitution aims to create laws around justice, peace, defense, welfare, liberty, and prosperity for a “more perfect” country for Americans (The Preamble, FindLaw, 2023).  The reviewer must understand that the computer is an assistive device, created many years ago by an unknown, non-famous team with an industry that works to carry out the contents of the constitution.  The goal is to understand the compliance process, dynamics, and purpose and responsibility for both humans and computers and not to adhere to laws without a common process of sound judgment and authority with good purpose, knowing the boundaries and limitations of multi-disciplinary approaches to psychology, law, and technology.  Compliance is not as simple as changing or updating technology because an order has been put forth or a law passed that specifically says to do something, although many companies operate this way, in a non-technologically automatic way.   Some companies might use compliance to ensure certain technology is used in a certain way.  The question for technology professionals as it relates to compliance is how systems are affected, as well as how they must be changed and if such changes or non-changes violate what law is in effect or must be created.  Risk assessments are performed with cost estimates to determine how business is affected by following the law or not following the law, whether it is in the company’s best interest, and at what cost.

Law is not Written for Technology

Since compliance is a dependent and sequential process, with the law or rule being first, and then compliance, it is important to study such sequences and the order of authority and knowledge, not by our priorities, or hypothesis’ but by what has been made publicly available and is known.  When a new law or policy is passed, the best approach is to conduct a law review, which is not done the same way a lawyer conducts a law review.  Lawmakers who create laws have a different process for creating laws requiring compliance and do not set forth actions necessary to meet compliance in all areas.  House Committee on Science Space & Tech has authority over almost all matters related to Science, Technology, Engineering, and Mathematics in multiple disciplines extending well beyond education, into business and research (House, 2024).  Such oversight is a vast responsibility managed by the House of Representative’s subcommittees, without the requirement of significant and specific laws as it relates to areas of responsibility, thus meaning, there is an authoritative, political system and associated committees, but few published works of categorical technology-specific measures, bills, and laws because of their efforts.  This is mainly because Technology is considered a broad category, not limited to software, and computer hardware, but also its infrastructure, and other systems that use technology concepts, such as imaging systems and more.

Methodology

The paper will review three laws, the implementation, and the feedback loop, including outcomes, costs, and other things considered important in business technology.  It is assumed there is no feedback loop or process that the congress, senate, and its interest groups follow that ensures lawmakers and other communities understand the purpose and benefits, as well as the process and cost of following and breaking the law through non-action, or incorrect action, as well as the importance of their involvement.  It is believed that people do as they are ordered and risk penalties, with the freedom to choose what they will comply with and participate in, adding to additional setbacks created by limitation and disorder, thus the reason for law enforcement, which only minimally works with Cyber-crimes, and only after the crime has occurred.  Few preventative measures are used.

Technology’s Role in Law

Without an understanding of how to perform legal research, and an understanding of premise, precedent, and the system of order, compliance is a matter of doing what one is ordered to do, without comment or response.  The question remains if companies and lobbyists are involved in the creation and passage of laws, or if the law is created based upon consumer or citizen complaints, and orders are given to the technology industry to force change.  Such limited knowledge and collaboration often cause limited change, worsen the outcome, or provide an incomplete solution, especially if preventative measures are not considered and design changes implemented.

The hierarchy of order and justice is that the Technology Industry is designed to follow the law, is not a regulated industry, and is minimally involved in the legislative process.  This is a problem when intelligent technology professionals see flaws where the two disciplines attempt to assert governance and control.  Remedy through the courts for faulty technology is not often feasible. 

Examples of Law Where the Courts Cannot Provide Adequate Remedy

  • Anti-Can Spam Act orders force companies to implement technology change by forcing them to provide a means to “opt out;” where the technology solution was a simple button to remove contact (FTC, 2024).
  • The Sarbanes Oxley Act forces companies to provide a signature line on financial documents by a specific person or persons; courts can provide a remedy in suits only after IRS audit and a formal complaint filed by companies.  Technology offers limited solutions and does not review the financial process to create compliance within the financial software (SOX-CPA, 2002).
  • The Privacy Act of 1974:  First, it requires government agencies to show an individual any records kept on him or her. Second, it requires agencies to follow certain principles, called “fair information practices,” when gathering and handling personal data. Third, it places restrictions on how agencies can share an individual’s data with other people and agencies. Fourth and finally, it lets individuals sue the government for violating its provisions (Epic, 1994).  There is no written body of proof or civil remedy within software or technology; citizens have limited means of proof, and matters are case by case:  another problem of potential violation is access to fair judgment and due process of the law with no prevention or data insight mechanisms built in to notify, prove or disprove violations (DOJ, 2022).

It seems that laws are written, and companies are free to come up with their means of compliance but are not standardized, citizens rarely can obtain remedies, and courts cannot direct the technology efforts of companies.  Compliance with the law does not seem to be built into the software process to prevent violation or change of the law.  Ideally, laws would be written before, during, or after technology development and testing and they would work concurrently with the intent to prevent or deter legal action using ethics, compliance, and measurement.  It depends on whether an unlawful event has occurred and then compliance is instituted for punishment purposes or if compliance measures are put in place to deter criminal acts or for conformity purposes for a specific goal, being lawful, ethical, and necessary.  Freedom and variance are certain to cause problems when implementing or evaluating compliance, making standards a necessity, along with a tested and certified system aligned with the law using technology in an automated and tiered way of management.  Responsibilities and oversight must be reviewed, created, and corrected if imbalanced, found to be ineffective, or too diverse that standards scalable across the nation or world cannot be accomplished.  Lawlessness and simple word changes are proven to be damaging and more harmful than corrective action and deterrence.  Relying solely on the system of law is insufficient since it would be a constant battle of what one can and can’t do and arguing through it with proof for remedy or consequence, therefore, technology must be seen as necessary to create change or serve as higher authority with intent to improve or change things for the better.  Technology should not blindly follow lawmakers or other authoritative rulings without applicable tests and data to prove its case, but it should work with the Law and its makers to achieve and improve both purposes with proof of effectiveness.

Some laws seem simple but have lengthy cases where technology innovators are not involved, so there is little to no opportunity to evaluate technology and law conflicts, shortfalls, or problems, therefore included in the evaluation, must be a review of where and how technology is involved and necessary to answer the question of power, rulings, and where technology stands in the hierarchy of cause and effect, following, compliance, and request or demand for exemption for research and development. Since no technology exists that shows law and compliance effectiveness and results or costs to business and society, it’s already accepted that the two disciplines were not created together and that dually qualified professions have not engineered a law evaluation and implementation system.  You simply cannot test something that does not exist, so the question is does it exist and how is it currently done?  Justly and similarly, multiple, and varied approaches to reviews in technology and law, as well as different ‘approaches’ to implementation that span nationally are dangerous without leadership and standardization.  Even more dangerous is assuming directives such as the “ISO” cover all fundamental legal and compliance areas of consideration or that it can be adapted to do so.  If 60 million companies do things differently, with different audit processes, or are only audited on one measure, being finance, then much is lost.  Clearly, because of the standard design of the internet, there is some form of automation or order, but it is unknown if it is accomplished by traditional compliance methods of collaboration with select humans of specific professions.

Strengths and Weaknesses of Compliance Programs

            How can you evaluate the strengths and weaknesses of a program or system that does not yet exist and is varied across the world? What is known or conceptualized is what can be evaluated.  There are strengths and weaknesses of a compliance program, but whose program is being evaluated?  Law Enforcement, Mental Health, Education, and Computerization of Tasks, Non-Existent, but conceptual integration programs?  The RDT&E process can be evaluated, but there is no singular compliance or overarching program to govern its requirements and consequences.  When this occurs, the environment (called society) remains in a development and test phase, or ‘research’ phase of learning and finding works by others to improve upon or compare its efforts and outcomes.  With such a vast array of applicability, compliance can only be instituted when something as proven testable and effective in smaller, medium-sized, larger, and gigantic areas, but systematic compliance evaluation of all subjects, expecting integration, requires a long-term study because of its vastness; therefore compliance only relates to what rules, policies, and laws that are in effect or created, which must be done following some regulation or other, with proof of effective outcomes.

Research and Presentation

The standard capstone project or dissertation format does not directly fit this type of problem-solving, explanation, background, history, and approach that is necessary to communicate and solve the problem fully but is necessary to meet the requirements of academic standards.  Because compliance with standards of writing, using the American Psychological Association (APA), and university requirements for capstone projects is necessary, the challenge resides in being able to use a general qualitative study approach with a customized technique that can present the problem, use other academic resources to prove the problem has not been addressed, or to what extent it appears unknown, and to use it as an opportunity to explain the theory of compliance, or another complicated technology acceptance model of society’s acceptance and adaptation to what is provided in the marketplace, or workplace, in that, we use and adapt to what we are given, with few leaders in the field able to innovate and engineer a more effective product that meets the requirements of many, while protecting the prosperous endeavors of all, and the problem being that prosperity is the priority and not social or technological evolution for a more healthy nation, or community with the ability to span the system nation-wide and then globally.  The current system is forceful, financially motivated, and punitive.

Organization of Problem, Research, and Findings

            There is greater difficulty communicating the problem using APA standards, and because compliance is necessary, it is a perfect example to show how technology has progressed, while another discipline or industry profession of psychology remains the same, with one forcing its way into another.  It’s one example of how non-progression or possibly regression or non-growth in one discipline (psychology) affects or stifles another (technology) and operates through education systems forcing compliance with old standards, without allowing innovation.  Qualitative and quantitative analysis, tests, proof, connections, and research are possible, but it’s another round of general reviews of nothing specifically useful, to see how one process affects or integrates with another.  A legal review format might be more suitable than a collective review of recent works that present generalized research summaries of compliance that cannot be applied in a standardized way.  The theory is that there is no standard model for law, policy, and compliance, or that the responsibility belongs to legal professionals who can benefit from working with technology innovators to update and integrate systems.  Cyber-security seems to be a field of information protection but relates primarily to securing access control mechanisms, with no specific legal process, other than refund through banks, proving security is only effective in finance and some identity theft matters.

Current Legal Process

The Federal Register provides information on how a law is passed, with no obvious or simple way to understand its process in steps and how and when companies can get involved or what mix of companies are selected to evaluate the law and provide proof of its effectiveness.  There is no information publicly available about who the governing bodies use for their Technology to track their processes and work products, or to show that they have a well-functioning implementation system.  Lobbyists for certain things or causes bring forward a bill for the passage of a law, like a request of Congress, and are passed by a vote.  A law is passed and legal or compliance departments are officially notified of the change in law or creation of law.  Companies are expected to comply within a certain timeframe or face audit and legal ramifications.  It may or may not be solely driven by what a company is interested in, but a lack of interest could result in changes that they could’ve prepared for or prevented, much like many problems.  Law and compliance are not a sales item on a shelf, but the way software services are structured, they might become or are seen as a service item for a long-term contract price, depending upon how it is structured, but companies and legal professionals don’t often know they have access to something or need something unless they can see it and there is proof.  Some companies have astute law departments well qualified to evaluate the law and assist in implementation, but a standardized formal business review process, before its passage, along with its impact does not exist; therefore, companies are not offered fair opportunity to be part of the legal process; they are seen as those forced to follow, an evaluate their systems, unknown outcomes, results, and changes.  This is dangerous and costly.  Law software is not the solution; it requires more study of integration, to determine if it’s even designed correctly or if society has outgrown or changed its old ways of greed, instability, excessive disciplinary needs, and obsessive need for proof, accusations, truth-finding, and testing the well-established boundaries of what is considered healthy.  The fact is, many people in America do not bathe and are not forced to comply with hygiene standards, and many businesspeople are not forced to comply with business rules and ethics and the sickness continues to grow, as does corruption, crime, and bad environments.  There are crime statistics, but that is not enough if how it was accomplished cannot be shared or changed to promote prevention or start/stop forcing, scanning, patrolling, recruiting, working, and advertising.  This gives reason for a different type of community control and allowance for the removal of citizenship, the right to privacy, and prosperity, and the requirement to force change.

Power, Authority, Responsibility

Who’s in charge of technology?  There is not a legally qualified board of professionals in multiple areas that publicly convene and begin the passage process because it is considered proprietary trade secrets because investment and profit are necessary.  Technology, unlike the legal profession, does not require Pro-Bono work and the system of law does not require integrated reports and systems for its effectiveness.  Bribery is often visible or called special interest groups, or those who are impacted and can benefit, by establishing new order and justice for new areas that have no legal process.  Research, development, test, and evaluation programs might not undergo a law review and are not managed by the performance systems that show the cause, effects, and shortcomings of its creations, so how can anyone know whose governance to follow, if little can be proven, or even made aware of such need? 

“Follow this order and do this” works only for a little while, and eventually, corruption, problems, and other dysfunction become visible in immediate actions where results are seen. Long-term actions and empirical studies of greater impact take longer because they are wider in scope.  A checkbox and signature from an official are not as simple as adding a checkbox to an internet page; it requires a full understanding of what you are signing, like contract law and all of its associated responsibilities and rules of management or use.

Just a quick review using the search terms “law review and compliance software” produced a curated list of software, that appears to have been evaluated, but no compliance or authoritative directive showing that software is approved and recommended for use.  Capterra’s software center offers free-to-use downloads of over 100,000 solutions and says, “We get paid by software vendors because we help connect them to people whose challenges their software is built to solve.” (Capterra, 2024).  Just hearing that challenges are “solvable” is a deterrent because it is an incorrect use of the word and seeks to promote another database of what looks like duplicated downloads larger than a gigantic city.  People cannot test and evaluate them all, use different ones, and expect an integrated legal system to work effectively.  The “do what you want to do” approach is dangerous and delays or prevents the creation of a more insightful solution.

One must have a law to implement or a law to check if its systems are by the law to begin, but should the intelligent and innovative be required to follow laws established by unqualified and unskilled lawmakers?  What happens is that lawmakers begin to set laws and force technology companies to do things that make it more visible who functions innovatively vs. who quickly does what they are told.  While it is wise to research to find out what exists and is offered or available to the public, if the law is not correctly written, then it becomes an evaluation problem that must determine who should follow whom or set the orders for what is considered “must haves or must do, how, and, or else consequence.”

Computers and software systems can be tested for compliance with and for what was requested in the discovery or requirements phase, but it must be clearly stated in the beginning, after the sale or presentation of the sale process.  Defining when is challenging and companies are allowed to make their own decisions as to when and how they want to pay for their systems.  This is one main problem in the way that technology is created and sold today, thus making compliance a challenge for where and when it should be utilized or created and adapted if it even exists at all.  Companies are not expected or allowed to force compliance or to even make demands, yet some do, which is what is categorized as requirements and specification management, ransomware, or a faulty understanding of process, authority, and dysfunctional management of expectations.  Boxed technology makes it easier to manage compliance before the boxing and manufacturing of a large number, but processes cannot solely be worked internally, and companies should look for ways to standardize processes in both environments.  If direct experience with a manufacturing belt is required, then no one further is ever capable of creating or testing.  A new understanding or explanation of old reference is that technologists and more are expected to “adhere” to rules and regulations, laws, and policy, but someone came along with word games and transformation, to create compliance, which might not be the best fit for all areas of technology, business, and congressional necessity.  The thought that “adherence” changed to compliance, leads one to believe that old theories of subliminal messaging, mind control, and other psychological tests might be true, advertising-based, and therefore is now in a compliance phase of test to prove human control using technology.  These are very useful theories and tests when proven, but can also be very damaging to humanity, thus the need for protection, independent review, management, and oversight is required, beyond simple IRB approvals or individualized psychiatric evaluations.

Understanding both internal processes and customers is required, as well as how changes affect other systems; known as integration testing.  Since the technology product lines have grown, the challenge has become greater, if not impossible, creating another problem.  Virality is a matter of modern influence, contact, and the means to produce a mass result and it extends beyond socialism or political structuring.  The problem cycle begins to be seen as connected, replicating, or being manufactured nearly equal to the number of products on or at the belt (the multi-use term for geo-political legal battles of wrongly focused time or improper placement of the right judicial with an intended outcome for a fixed system to eliminate inexperienced human generated disaster).  

Managing compliance problems in a single-scope study is beneficial, but we don’t manage compliance, and the research question is not related to management, so the scope is limited to one when there should already be a standardized compliance strategy in place.   Compliance research cannot begin with a problem if compliance processes are unknown or so varied, and only available in one or two departments where there is no direct or indirect experience.  Compliance is reviewed from two sides:  the developer (or manufacturer) and the user of the product and its directives for compliance with the product use policies.  The question remains:  compliance with who, where, and based on what authority; written, verbal, and for prosecution by what level of jurisdictional power, based upon what extent and boundary or branch if it can only be generally stated?  Compliance with an external body of law, or regulatory organization is external to businesses and organizations, where specific processes, or policies are created for employees and people to follow them to ensure compliance with governance.  Objectives, purpose, benefits, costs, system or process changes, and outcomes must also be measured to not only comply but also understand the impact on multiple areas, even if not directly seen or written in the law.

The methodology or technique for such a test can only be beneficial and created when the specific question of compliance is well defined, scoped, and test systems are available to show valid proof, otherwise, the test, its associated systems, and outcomes remain theoretical, never proven, mysterious, and terms such as “results may vary” must be used.  Since there is a standard test product test process that uses these caveats or outcomes, it’s likely to assume that the creator, manufacturer, or seller does not know the outcome, and cannot make promises because of the vast array of possibilities and variations in systems and odd connections not fully researched, or that the limited scope test cannot be scaled to other systems as a standard “approach” to achieving specific results per system test.  As you see, the words, like “methodology” and approach can be standardized and categorized, with a proven process to show specific results, but nothing yet exists. 

When the IT Doctorate program teaches compliance, but nothing standardized exists to follow or begin to consider reviewing, evaluating, and automating, it can be assumed that someone has “put the cart before the horse” meaning that something is improperly positioned, or that it is too soon, that something must be either created, tested, proven, with results, before it can be guaranteed or managed by the law, or under the law.   If technology operates above the law, or conflicts with the law, it is not often seen because there are no technology audits and for technology to be a part of the legal process and be more effective, it must integrate with the law in ways in which it can be more useful, other than software for lawyers and the law system itself.  It must be incorporated for outcomes to be seen to show proof that the law itself is beneficial and not harmful to the health and prosperity of people, places, things, and more.

A short law review shows that one inadequately directs another, or attempts to, but does not address all sides of the legal issues, and if that is the standard law process, then it can be expected that all laws created after will also inadequately address all sides of the legal issues of the system of technology.  There is an assumption based on brand recognition that a user’s sense of security correlates with their knowledge of the popularity and success of technology business names (Morgan, 2023), showing less of a necessity for compliance because of their familiarity and popularity.   Since the law shows that it makes attempts to be part of the technology process if the two systems cannot effectively be standardized or process specifically known and tested, then there remains either a conflict, which can be explained in many terms, or that it remains ineffective or defective or must evolve concurrently, or sequentially, understanding that adaptation is of old survival approaches also seen in technology.  

Creators attempt to create within the law, considering the law and ethics, but if nothing directly applies and is not specific, then leeway offers a new system that must be developed and tested.   While it is often said that there is a cost to freedom, there is also a cost to law and order.   Rather than follow ideals of restricted areas (or fences and walls using frameworks) it might be best to give technology the freedom it needs to test the law for its effectiveness to show proof that the system works and then consider how technology can prevent the use of the legal system through compliance measures.  Because Risk Management is a part of technology’s development cycle and acquisition decision-making (Sherman, 2022), such evaluations enable products to be certified as evaluated, rated, and trusted, yet no well-documented standard system of evaluation exists.  Those who work in RDT&E and compliance must understand something is missing in the entire process and see that its outcomes are devasting when companies mix compliance with acquisitions of untested products.

 This is the current situation with technology:  no visible system of certification exists.  How can the law be effective if there are no governing laws applicable to the RDT&E or acquisitions process in both government and commercial systems?  If the law proves to be inadequate, then compliance efforts will also be inadequate for existing systems and one cannot effectively direct the other and serve the people.  If the world or industry has a global or national strategy and plans to implement cloud computing or a new design, then it is suggested, based upon the use and explanation that “results may vary” that they should know and listen that compliance improvements can and should be made or shouldn’t be made concurrently, or not at all because sequencing is a necessity.  There is no existing methodology, thus a new one is created for this area by using three law reviews.  It must be known that the law serves the purpose of disciplining and creating order.  Technology has the same purpose, without punitive or disciplinary structures addressing all parts of its design.  One cannot rely on old laws, and ways that once worked when it has new technology; both must evolve or adaptation is required; and to implement without measurements that span beyond the stock market, or financial outcomes is dangerous and of no added value to society’s improvement.

The System of Law and Technology

            They are incompatible because if the law is going to pass laws for the people and the technology companies do not follow it, and know more than the legal profession, then the lower authoritative power creates more problems and operates uselessly, potentially setting itself up for its own disaster.  Class action lawsuits against companies are also not the answer because Technical Investment and Direction is a better place to direct for prevention, but the law cannot technically direct something it does not know or is presented with high-risk warnings and constant threats and violence, such as guarded facilities, corporate foreign entities, and low-quality innovators that sell street violent-tendencies, cops and robber games, while working to better society or understand how gaming affects real life in virtual physics.  Keeping it unprovable, profitable, and exempt from the law is their strategy and money is their tool.

Rather than developing constant contact (an email advertising and newsletter business software suite), it appears society, law, and technology, are now in constant conflict, after review of the Anit-Can Spam Act.

Compliance Originates from Discipline (Parental, Military, Law, Corporate)

Currently, what looks like military protections, directions, and executive oversight and investment might exist, it is still unknown if the creators are in the US Military, which looks like a prison, and plan to create more prison-like systems, locking businesses and people into faulty systems or more abusive and failed approaches to improving what exists or creating a necessity; if compliance proves to be a necessity, then we continue to function in a cycle of war and peace, where order is maintained by what many report as a corrupt system.  If it is a cycle, and technology, along with the military can create improvements or social change, then civil war must be a consideration.  Just as we are unsure if the US Military is a prison itself, acting by itself, and knows nothing other than barbed wire fences, handcuffs, and punishment in law, then technology does not know if it can create safety measures using an existing system of recall, or if the result in theatrics, because of the political system depicted in “Total Recall.”  While military prisons exist, it is a separate and different judicial system that has one law that prevents another disciplinary action called “Double Jeopardy” which should never even be considered since its counterpart is a game.  Jeopardy is a perfect example of a design that goes against English and common standards of question and answer:  The answer is provided, and the correct response is in the question.  Technology or code is different than the English language.  Since the process is not created using single subject or sentence structures, technology cannot be subject to the Jeopardy or Double Jeopardy legal processes, unless it can systematically result in the same number of questions and answers, with a random selection process and it is clear, in your eyes that questions and answers are not contained in boxes, yet we have process systems that are used to place process information in boxes.  If ignorance comes along using animals in boxes to test its theory, then it could result in no response at all if animals do not have a process for how they do things or are undocumented because it is assumed that humans create processes for their animals in training phases; and animals have proven themselves to be non-domesticated, untrained, superior, reliant, and inferior to humans.  The same type of relationship exists between the Law and Technology. 

One or More Complying with Bad Leadership, Creates a Bad Population or System

Duplication of bad behavior, crime, and intent were reviewed, but technology tests proved incapable and irresponsible people were creating systems, provided, and created by others, following other bad leadership, accepting low-quality technical products, or only what could be created with what was provided in training.  Results may vary still, as do threats, without deterrence programs, creating an environment and inability to comply or operate in specific environments because of such improper treatment.  The results or findings and perceptions might be summarized as a “bad idea” “bad business” or “faulty system” or as impossible because of the past, or present conditions, in which we live our lives in goods and services contained in contracts.  If all people are legally bound to contracts, and those are bound by the law, then does a bad contract result in a bad product or service?  The answer seems to be only “slightly” available for honest proof, without specific standards of test in law, ethics, and documented results.  Some go insane for their need of documented proof, while others go without their essentials just for working in technology; an odd sense of power imbalance or difference in ability – leads us to a system of order and question, if the whole thing is “just out of order” – another standardized term used for coke machines, of which the law seems to think we are the creators of and can and will do similarly to feed their sensational appetites for risky and unlawful behavior or false assumption that change is required in both silver and dramatic gigantic worldwide systems that uses change management and multiple forms of currency.  Understanding that all senses are working, available, and functioning, many who make/made decisions weren’t, with the law operating only on “alcohol and controlled substances” being its only concern or understanding of “impaired” results.  Merging, pairing, and integrating are different acts or considerations, not done concurrently with box checkers and low-quality incompetent evaluators.  We are box checkers; providers of data to companies who are not forced or bound by the law to share, therefore we remain protective, guarded, and unnecessarily questioned.  We live and work in square and rectangular spaces, have various standards of living, expectations, and behavior, and our inputs and outputs are also in boxes, of metals.  We drive cars of different shapes and materials, and our clothing, religious beliefs, income, family dynamics, and education levels define our life’s functioning, confined to spaces and places for a specific purpose, not always of choice or pleasure.  Strength in numbers overwhelms and vast differences cause disfunction, proving world disorder, and disaster areas, where mere functioning has become a life of questionable conformity to expectation and the system of professional work.

Some do not know the difference between their motorcycle and humans and the order of importance in investment, yet continue to be funded, awarded, and individually allow their hands, feet, and mouths to accelerate, claiming technological backgrounds, and parts reaping only rewards while causing failure to the lawful, correct, and valuable ones who were and are disciplined, corrected, trusted, evaluated, and given power and authority to create.  Financial and mental imbalances showed severe monetary and incorrect affectionate outcomes in humans, blaming it on the computer; that the computer could not feel; resulting in thousands of dollars more towards human insult and dysfunction to support and “portray” themselves non-theoretically and theatrically on laws of manifestations and air disasters, as well as severe “bugging” of nature’s insects, animal and other predatorial and territorial attacks occurred, still not knowing the purpose, source, other than that “she, they, or them” had no compliance department and misused and mistreated the right professional that could’ve prevented them from hurting many others.  Are we still paying for the Vietnam War?  No, but we are still suffering from problems with Asian American citizens and workers allowing, restricting, or not restricting internationalism or human cloning and blindly forcing or demanding human kindness and diversity.  Human forgiveness and debt cancellation, or bankruptcy takes a long time, and some things simply cannot be forgiven, especially if the law fails to do its job.

Does Everything Require Law, Policy, and Compliance?

Humans began to collect and display animal parts in jars inside and outside their homes, theoretically, because there is no law on the Food Pyramid or dietary pleasures, it is only suggested by the US Government.  There’s no specific law for the morgue in catering to odd orally pleasing pleasures, resulting in another legal problem extending to those scrutinizing the law and actions of another, attempting to utilize name calling, declarations of sexual use, policy, and law; separating the two, resulting in vehicle crashes without consideration of ethical responsibilities or traditional behavioral expectations and differences between men and women, and the potential computerization can bring and because of incompetent leaders, failed to so do.  If one is being told, trained on a process, and follows a standard of order and discipline, using statistics and becomes one of the statistics and the other is not subjected to the same outcome, then it is unfair, unequal, damaging with no legal remedy, but this just proves more deficiency in the system of man, woman; either discriminatory or non-discriminatory based on expectations and teachings of someone else’s findings necessary to show proof, despite safety.

The laws cannot be followed if basic human ethics are missing, yet, the ethics could be followed if the lawmakers were ethical, and this is just a short review of the “transference” with and without interference, considering the loss and movements of others, without regard to the unnatural and dysfunctional conditions under which one or more was forced to work.

Information security standards were developed by NIST to further its statutory responsibilities under the FISMA Act. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems. While it works for financial transactions, such standardization is missing, and no one seems to see the necessity for improvement.  This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets, individuals, other organizations, and the Nation from a diverse set of threats and risks, including hostile attacks, human errors, natural disasters, structural failures, foreign intelligence entities, and privacy risks.  Banks operate in a highly regulated environment, and accurate knowledge of dependencies is vital for ensuring compliance with regulatory requirements, such as data protection and business continuity planning (neo4j.com, 2024).  Developers published a dependency mapping system, for developers, which seems it would be better and safer to publish something non-technical to show which regulations govern what requirements for data security and transacting, showing requirements, rather than technical code that won’t ever be directly used because of the way financial products are now designed for e-commerce.  Such publishing requires scrutiny because it is honestly not reusable code or valuable understanding in how compliance standards are correlated to regulation and offers no real benefit if the final answers to all are:  it depends. 

Comply or Defy?  Do it or Else.

            Why even bother if there is no system, standard, or effective outcome or there is but it is so farfetched that dogs are now the priority and humans?  There are only a few differences between a Mental health facility and Doggy Daycare Kennel, showing the treatment of humans and dogs being closely and wrongly functional, acceptable for some to span across the United States with profitable and high-cost healthcare and pharmaceuticals.  Unfortunately, inhumane treatment has already been proven to have been inflicted and still lingers as a future home or result of efforts.  Not only are animals mistreated, with no obvious activism or change, but humans continue to be also; while America’s healthcare only mildly cares for the sick and injured, closely mirroring law enforcement’s correctional system with no effectiveness measurements; only statistics to prove healthcare decline and financial troubles.  Technology enabled this to occur, and technology can shift it from being an ongoing money maker through business management and law changes, not done by vote or, poor governance, or civil choice.

Compliance is reviewed with caution, Post objection because of Threats and Damages

One governing body passes a law for some reason, a need to protect, deter, or prevent because there is a risk in some area.  The Individualized Privacy Policies and Privacy Act of 1974 is the best example of this as it explains problems with the implementation of the law using a one-to-many regulatory structure.  To simplify the problem, the Internet contains many businesses, or legal entities, some registered with the government, some not, and some using the federal banking system, or gathering and using personal information. 

Compliance and Conformity:  Creators of Limitation

Originally, people were cautioned and threatened, forced to do business with whom they “think” they could trust, or those that appeared to be trustworthy, often marked with some seal or protection visual, such as a lock on the HTTPS:// address block, much like the human housing system, but with a visual and proof of good business.  People were also forced to forgive, without judicial intervention, damaging a large population.  People were expected to learn this and use discretion, and naturally, with such a large population, feelings on use, as well as activity, varied, but the business procedure for collecting, storing, and using information was somewhat standardized, non-visually, but in data specifics of what was or is used to transact.  The same is true for the ways humans develop personal relationships and trust; in some cases, it is automatic, until something diminishes it, either through education, learning, or experience.  If technology is different than humans, then the system should be designed differently, with the correct validation and compliance methods built in.

The same problems exist in incorporating other cites/sites within the methodology, or the search for other understanding and proven results on something that does not yet exist or was removed because of damage.

There are federal laws protecting the information, and a standardized process for using banking and credit cards online, and the same approach is or was taken to protect personal information, even if no money is used.  These were technical standards with an accompanying law to ensure businesses followed and to instill a sense of protection for citizens or internet technology users.  It is unknown whether the law was created first, or the system was created per the law, who set forth such regulation, or its review and technology change system.  It is justly known that when a law is passed, internet businesses are required to conduct systems checks and ensure compliance.  Few laws have been passed that direct the internet conduct of citizens.

What technology companies and businesses have yet to realize is that standardization and modern technologies can create systems that are compliant upon installation and that customization to their business name, and process can be created for their unique products and services.  If technology companies were to take on greater responsibility in building in legal requirements, such as information sharing and use protections, reports, standards, and federal compliance processes by programming it into the technology before release, then businesses would be relieved of the legal responsibility, making it easier to manage, using technology and rapidly changeable from upgrades at a regulated price on a regulated and manageable schedule.  A simple example is the Privacy Policy where each company on the Internet must have a privacy policy published on their site if collecting personal information.  Internet site designers and application programmers create one for the business they are working with, which produces variation in policy since sites are not automatically created.  There Are Between 12 and 24 million Online Stores (The Social Shepard, 2024).

Such variation now passes on risk to the consumers and forces acknowledgment and legal understanding of the use, and such standardization creates manageable automation.   E-Commerce was accepted by its users because it only mildly differed from the physical credit card process, which is a contract with specific terms, policies, and agreements.  By making it similar, technology lost an opportunity to standardize its contracting process and how it manages, delivers, and receives information, giving way to fraud and mismanagement on both sides of the business coin.  Insight into data with special features changes this practice, while some argue compliance and law, or law enforcement change it.  Non-standardization of the law, policy, and various ways of explaining creates disorganization and leads to mismanagement, which leads to breach, potentially to the point where people ignore the policy or click through it without reading and trust is automatic because the need or want is greater than the perceived risk.  The problem is that now that the Internet is accepted as a trusted source, cybercrime still exists, and trust changes, affecting economics and more.  Awareness and training change, as do buying habits, and naturally trust and pleasure increases or diminishes.  The understanding of the availability of pre-programmed legally compliant and protective systems must be accepted as real, possible, and not currently offered, are managed individually, and only recently have companies begun to work together sharing authentication data to make personal account management more efficient.  If a governing, regulating body, or consumer has less to manage, the more effective they would be, but because each company and person is free to create their own and do business on the Internet, or pay another company or person, the law is managed and policies created using a one-to-many ratio, without automation and no compliance tracking.  If there is no compliance tracking using automated technologies, then there is no way to forecast, prevent, deter, or ensure the Internet is working as a safe information exchange.  Freedom has cost each company, forcing them to be held responsible for their operations, legal compliance, and protections, and the burdens are passed down to each user, sadly, when technology can program into its standardized designs necessary items, or better organize them for consumer protection and awareness. 

For example, the Consumer Protection Program could be formed to contain one privacy policy that all businesses agree or are forced to follow or comply with, to protect its customers, and applied to business-to-business models to protect both sides and ensure fair competition to reduce deceptive and unethical practices, but no such agency exists.  There are potentially 12 million or more internet pages covering company Privacy Policies.  A consolidated standardized policy could reduce it to one or two, or a single regulatory agency with manageable terms, specific to its parties.  Discipline and money cannot be the top necessity or quest in life, nor can they or social collectives, gatherings, and individualization govern everything, yet it does, for a set time.  Poverty penalization has already occurred because of the earnings system we are forced to comply with and without opportunity, we have social dysfunction and more.  With bad business and non-technologically correct leadership with time and money, we end up as housekeepers of a multi-disciplinary problem that could take just a few days to change but are forcibly disabled and reach a point of complete disinterest, ultimately leading to withdrawal, non-completion, or another unachieved goal.

Failure to follow one direct order or failure to state it was a direct order resulted in the loss of millions of lives; all seemingly necessary for American and International Prosperity and Peace, but resulted in severe economic and human physical and emotional disaster, unrecognized in many areas because decision-maker and leadership failed to empower a single individual to make decisions in the best interest of the entire world:  An international government structured disaster that went from learning and earning in the non-traditional family system, while forced to comply with irrational demands or faulty commands.  Compliance and force must have limitations and immediate removals to prevent continued ongoing life and information disasters, beyond technology.  This paper presents a larger view of human psychology combined with technological endeavors based on five or six senses, with the chance we might need to venture into the development of more without trying to find the secrets and solutions behind power imbalance and misuse.  Much has been established and published that cannot be lost and requires careful consideration before changes can take place and sometimes prioritization of needs, wants, and outcomes cause problems.

Integrated Governance with a Decentralized Technology System 

Who or what entity or agency?  What politician, lawyer, or lawmaker?  What citizen, leader, or person?  What paid spokesperson, professional paid and qualified or unqualified and paid or volunteer professional?  No centralized site for regulation, policy, remedies, or personal management exists in all lives and professions and it likely results in courtroom overflow, lengthy or no trials, and loss.  One could argue that the Internet provides all that and more, but using a single-site approach, a one-by-one implementation model, and not an automated legal compliance system that defines and outlines its scope, purpose, and benefits, enabling technology creation to prevent and eliminate unnecessary requirements.  Redundancy in data use and storage is also an issue using that approach, as is the management of variations of law by geography, state, industry, monetary value, or even demographic.

To view compliance on a task-based level as to what laws and regulations apply to specific work fields, such as finance, information protections, and consumer protections is well intended, and useful for companies and organizations that operate effectively, but causes a great deal of dysfunction if left solely for human compliance and internal verification, leading to the only visible result being a financial document or efficient internal business process; operating on goods, services, and information exchange similar to physical commerce.   Compliance is related to behavioral management, but is different when it relates to computerized systems, where a different approach must be taken.  Compliance programs can check and ensure security is compliant with regulations; but each area differs; making no real standard, as NIST says, beyond a password authentication system, or physical security measures of computer systems.  Complete consumer protection and business security can never be fully reached if each must manage its own and be accountable for every standard, compliance process, and single or multiple governing bodies, as well as any civil liability that arises from doing business, forcing the necessity of a legal professional or paid advisor just to do business.  This leads to limited opportunity, yet the freedom of the Internet enables anyone to learn, create, and sell, with little to no oversight, audit, or advanced training, which leads to lower-quality and varied e-commerce systems, especially if one party decides to automate protections and compliance using built-in technologies, then industry faces the same challenges that the socio-economic stratification presented; access to opportunity at varying degrees of cost, price, quality, responsibility, and risk.

We have the technology able to provide users or businesspersons and consumer insights of value, yet no one company has come along that can consolidate, monitor, protect, and validate information, or make its management more centrally efficient.  The current design brings freedom, but much knowledge is required, and more responsibility and risk, duplicating the design of American business, far beyond finance with no knowledge management system and engineering leadership committed to its improvement.

In conducting a literature review in hopes of finding other written discoveries that dissect the problem, it is found that a wealth of studies exist on cyber-security, current approaches to security, risk management, user feelings, and more, but no research exists that explains how the architecture of a one to many design and standardization of internet protocols and automated pre-programmed requirements for the protection of national security information exists.  The research that is referenced is used to show with greater strength the opportunity that technology presents in lowering risk, by showing where and how it is transferred, and placed, and what strategies companies, perhaps are forced to use to gain and retain internet customers or participation, as well as undocumented, or non-technologically specific directives that govern E-Commerce standardization.  Technology has the power to eliminate cyber-crime, or at least provide a rapid means of resolution and change, and presents a great business opportunity for security companies, but society, its regulators, policymakers, leaders, and businesspersons can benefit more from a pre-programmed system that meets legal standards before its sale or approval for use, but it requires business process innovation and law reviews to make the best of use of such investment in technology.

            The result could be the exemption of the United States Constitution and its legal system as it pertains to the law because the law operates using a different type of system, which is incompatible with technology, or that technology can reduce the need for heavily documented law and policy governance, by having served its great purpose in establishing and setting forth social and economic order, now capable of commanding or directing technology to produce protective systems that are pre-programmed for compliance, specific to the set of changeable laws for each region.  It can be proven that legal requirements can be programmed into a system, along with standardized policies and procedures, yet it is unknown as to why we continue to operate with the current design.  By being limited to only two methodologies or approaches to present the problem, much is lost, so the technique will change to using qualitative methods of interviewing a sample population to grow in understanding technology professional’s knowledge of responsibility in adherence to law, regulations, and policy as it relates to the delivering technology as a secondary item to a recommended technical approach for making technology more efficient, reducing risk and burden.

            The purpose is to prove that there is a more effective and efficient design available, as well as the ability to build compliance mechanisms while solving other major problems technology presents and faces.  But first, it’s important to understand that forcing compliance or adherence to laws using a deficient, or minimally satisfying system, knowing that we have greater capability and that there is a better solution is equivalent to a potentially successful endeavor of controlling attitudes, beliefs, behaviors, and the functionality of a population while enabling and limiting growth and progress.  A punitive approach to innovation depends on who the leader is, and proof is not necessary to see flaws and damages.  Rather than consider how the necessity for law changes because of technology capability or redesign, knowing that one affects another, and could be better positioned to produce better results.  Since Internet Systems design, programming, acquisition, and use are limited to only a few perspectives using a task-based approach, it would benefit the learning experience to collect data in support of a new type of programming model that is not keyworded, based upon words like “assurance, trust, policy, compliance, law, commerce” but encompasses all critical areas of information management for global strategic purpose, prioritizing national and personal security, while understanding the responsibility and challenges faced by users, businesses and organizations across the world.  The goal is not solely to explain the understanding, but to provide a solution.

Interview Questions

            The purpose of the interview is to collect data on technical professionals’ knowledge and experience implementing or changing technology in response to a law or act, to find out how they receive the law or policy, who or what creates local or organizational policy, how compliance is measured and to whom and how it is reported.  It will also attempt to identify benefits or challenges in technology and implementing the law.  Since it is not a survey questionnaire, the discussion could lead to other important areas of consideration that add proof that there is a standard model for the implementation of law and policy and that the technology process is not automated.  Methods of policy creation, based upon the enactment of law, and process change procedures will be discussed and measured for variance.  The interview will also inquire about and acquire professional knowledge and experience on individual site-by-site change and implementation, perspectives, and perceptions or opposition to a centralized information policy and compliance system to gauge current use and readiness for the use and validation of automated information.  Questions regarding cloud computing and its comparisons will also be lightly discussed as they relate to compliance with specific laws and what professional technologists in businesses believe they are bound by or must comply with.  The overall purpose is to assess if businesses are or were damaged or are flourishing from technology and if they are even aware of the design flaws.

Population

            Professionals in technology will be sought after for interview, for those who are employed as buyers, e-commerce managers, business officers, corporate counsel, and compliance department staff.  The population must somehow drive technology change and set policy or receive technical direction and utilize technical skills because of the legal requirement, to understand the communication dynamic and challenge of the two disciplines being separate or together and to identify common levels of responsibility, process, and challenges.  Some data sampling will occur if commonalities exist, and information can be quantified using statistics.  Interviews from at least 20 qualified government agencies and companies of varied sizes that utilize e-commerce as part of their main source of information processing are required.  Simple random sampling will be used.

Conclusion

            The necessity for qualitative and quantitative data has become an institutional matter of compliance with psychological standards or formats.  This proves, that although technology offers more advanced organizational ways of managing information, sources, and stylings of presentation, institutions rely on old requirements; and the system of law does the same thing.  Until the disciplines can effectively work together, loosening requirements, licensure, and test measurements, the world or the ‘technologically skilled and innovative” with capability is forced to conform, even though there are better ways of doing things.  This is compliance and the effects are creative limitations for uniformity purposes.  We do not work in uniforms.  Because of the necessity (by some) for proof, official records, documentation, reports, numbers, and more, life becomes interconnected, and reliant on others, even though it has been observed and determined to be an inhumane punitively damaging system based upon punishment and reward or ‘award,’ rather than healthy living, innovation, evolution, change, and betterment efforts for many.  The simple solution is for the law to stand down and learn its place or find a new one, along with others, and to function with a more open mindset, unless they too are forced into systems of compliance; a compounded problem of old tradition that no longer serves a real purpose.  When such compliance efforts are seen as restrictive and new technology is available to improve things, but compliance stands in the way, the purpose must be known, and it must extend well past “because I or they said so.”  Reason also must be known, otherwise reasoning becomes skewed; based on assumption, not proof, or no ability to find proof for new measures because the old non-proven ways linger without efforts or potential for distinguishing marks of societal change.  High marks are not temporary, but are expected to be applied throughout and continued, not solely in recognition, or singular achievement for self and outward praise, but because of the potential and necessity it brings in advancing society by the discovery of power and authoritative imbalances or wrongly structured, and disordered designs.

References

Preamble to the Constitution, Findlaw (2024), accessed from the Internet at
https://constitution.findlaw.com/preamble.html#:~:text=The%20preamble%20is%20not%20actually,more%20perfect%22%20country%20for%20Americans on March 12, 2024

IT Policy and Regulation, Savvy Smart Solutions, LLC, (Wilson, S.L.), Jan 2024, accessed from
     the Internet at https://savvysmartsolutions.com/policy-and-regulation on Jan 24, 2024

Morgan, J. M. (2023). The Role of Big Tech in Providing Cybersecurity to End Users: A
    Qualitative Case Study 
(Order No. 30317840). Available from ProQuest Dissertations &
    Theses Global. (2817936793). 
    http://library.capella.edu/login?qurl=https%3A%2F%2Fwww.proquest.com%2Fdissertations-
    theses%2Frole-big-tech-providing-cybersecurity-end-
    users%2Fdocview%2F2817936793%2Fse-2%3Faccountid%3D27965

Committee on Science, Space, and Technology, House, accessed from the Internet at
    https://science.house.gov/hearings on March 13, 2024

Capterra, Compliance Programs Software (2024), accessed via the Internet at
    https://www.capterra.com/sem-compare/compliance-software/?utm_source=ps-  
google&utm_medium=ppc&utm_campaign=:1:CAP:2:COM:3:All:4:US:5:BAU:6:SOF:7:Desktop:8:BR:9:Compliance&network=g&gclid=Cj0KCQjw-r-vBhC-ARIsAGgUO2BEBDcHZvQGHnM8kIDqawPO22VgT8CyyIGNKHbPqj9DN_rSNlC3h4MaAp2fEALw_wcB on March 12, 2024

Risk Management for Acquisitions, Department of Defense (DOD), (Sherman, J.B), 4/19/22, accessed from the Internet at   
    https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/851001p.pdf

    on January 10, 2024

Anti-CanSpam Act, Federal Trade Commission, accessed from the Internet
    at https://www.ftc.gov/business-guidance/resources/can-spam-act-compliance-guide- on
    January 30, 2024

Sarbanes Oxley Act, SOXCPA, 2002, accessed from the Internet at https://www.sarbanes-
    oxley-association.com on February 10, 2024

The Electronic Privacy Information Center (EPIC), The Privacy Act of 1974, accessed from the
    Internet at https://epic.org/the-privacy-act-of-
    1974/#:~:text=Access%20to%20Records,and%20make%20copies%20of%20it. On March 12,
    2024

Department of Justice, Privacy Act of 1974, as amended, 5 U.S.C. § 552a, DOJ, 2022,
     accessed via the Internet at https://www.justice.gov/opcl/privacy-act-1974 on March 12, 2024

NIST Special Publication 800-53, Revision 5, Security and Privacy Controls for Information

    Systems and Organizations, National Institute of Standards and Technology, (), 12/20/20,

    Assurance, Privacy, Confidentiality, Control, Personally Identifiable Information, System
    Security

Federal Information Security Modernization Act (FISMA), 44 U.S.C. § 3551 et seq., Public Law
    (P.L.) 113-283

IT Security Diagnostic Program, InfoTech, (Info Tech Research Group), 2024, accessed from

    the Internet at https://www.infotech.com/benchmarking/it-security on 1/29/2024

Dependency Mapping System, Neo4j Developer, accessed via the Internet at neo4j.com on
     March 12, 2024

21 Essential eCommerce Statistics You Need to Know in 2024, The Social Shepard, accessed
     from the Internet at https://thesocialshepherd.com/blog/ecommerce-statistics on March 12,
     2024

Gerard, Joseph A., and Curt M. Weber. 2015. “Compliance and Corporate Governance:
    Theoretical Analysis of the Effectiveness of Compliance Based on Locus of Functional
    Responsibility.” International Journal of Global Business 8 (1): 15–26. https://search-
    ebscohost-
    com.library.capella.edu/login.aspx?direct=true&db=bth&AN=101746102&site=ehost-
    live&scope=site accessed via the Internet on January 24, 2024

The Cybersecurity Framework as an Effective Information Security Baseline: Qualitative

    Exploration, Capella University, (Troia, Vincenzo), 2018, accessed from the Internet at
http://library.capella.edu/login?qurl=https%3A%2F%2Fwww.proquest.com%2Fdissertationsthes
    es%Fcybersecurity-framework-as-effective-information%2Fdocview%2f2126637538%2Fse-

    2%3Faccountid%3D27965 on January 24, 2024

Corporate governance and the information system: How a framework for IT governance
    supports ERM, Bradford Vol. 14, Iss. 3,, Rubino, Michele; Vitolla, Filippo.

Critical success factors (CSFs) for information technology governance (ITG), International

    Journal of Information Management, (Alreemy, Z., Chang, V., Walters, R., & Wills, G.),
    2016

No Relevant or Formal IT Regulations, Google Inc., (), 1/15/24, accessed from the Internet.

    at https://www.google.com/search?q=IT+Law+and+Policy#Capella University 2023\U2A1 on
    January 24, 2024

2022 Consumer Privacy Legislation, National Conference of State Legislature, (Greenburg, P.),

    6/10/22, accessed from the Internet at https://www.ncsl.org/about-state-legislatures/2022-
    consumer-privacy-legislation

Identity and Security Design of the Internet

[tta_listen_btn]

Security Interoperability:  A More Efficient Internet Design

Research Problem:
The Internet does not have a shared data architecture that allows for centralized management of personal information. Each Internet Site that is protected by encryption utilizing a profile and account management system is individualized and users create accounts manually, without an automatic profile copy option. Leveraging account management code or functionality from other major applications, tested and proven, such as Facebook and Google, or Id.me has somewhat streamlined the login process, centralized account management and credential use insights are limited and still presented in highly technical terms for users. These complexities and inconveniences present unnecessary security complications which most likely increase the risk of breach. Not only is it a highly duplicative manual process, but each site varies in its information requirements, yet promises the same level of security. The problems are in the architecture, lack of shared and centralized design, and individualized security protocols within each application without a security account management suite. Password management vaults and ‘remember me’ login features are available, but they do not solve the architecture problem; they are quick answers to complex and critical systems that require a shared data solution. Password managers are effective tools that provide convenience along with security, but they are not a cure-all against hackers (Security,org, 2021). Multiple user profiles exist, and the number grows each time a new application with security features is introduced or a new account is established, reaching an unmanageable number which leads to inconsistency, dysfunction, and conflicting information. There is no automatic fast way to update all accounts, or to perform emergency shutdowns, or to cross check information for validity. Each user is left to their own practices of managing information, and for some odd reason, the security industry thinks the everyday human is capable of understanding complex security management. Risk is transferred to the businesses and users, without a set of good common standards and practices. The major problem is that security breaches are made public, as are suggestions for protection of data, yet each individual has the freedom to manage however they want to. Instructions are often present, but lengthy and complex.

Background:
The security design is non-standardized with many recommended standards published by the National Institute of Standards and Technology. Some of the concepts, such as encryption, multi-factor authentication, and other security methods are complex, with no technical guidance for developers to refer to when deciding on how to best implement security for their applications. Authentication is one of the major security functions of online systems. It is believed that when an organization uses DevOps or DevSecOps, it utilizes a standard test model incorporating security throughout its process, but it is only presented in broad terms. Many laws govern the protection of personal data, as outlined in the Privacy Act, the Freedom of Information Act, and other Electronic Systems laws. The law is broadly written and does not govern or regulate security practices, other than to say information must be protected. Security is standardized across the Internet, with account creation and the use of Secure Socket Layers (SSL) Encryption for Internet Sites. Each is built individually, most likely with a common code for account creation and the protection of information while stored and in use. Security has advanced to offer multiple options for securing Internet data, but a problem has risen showing massive redundancy that is believed to increase risk.

Researchers from Stanford University and a top cybersecurity organization found that approximately 88 percent of all data breaches are caused by an employee mistake (Tessian, 2023). Interoperability enables the seamless sharing of information and the integration of security systems from different vendors. It is the key to achieving this integration, as interoperability allows organizations to create a holistic cybersecurity approach that adapts to their unique security architecture (CISOMag, 2023). Professionals continue to promote cyber-security awareness and training programs, and no one has brought up that it might be too much to expect an everyday user to manage a high number of accounts with different security requirements. The expectation that people are capable of managing their own, if given instructions only works to a certain extent and it might be proven that human error is the main cause of breaches and is higher than the number of hacked accounts.

Research Questions
Is the current system of individualized profile and personal account management the most efficient and secure solution available and has it reached a point of unmanageability leading to higher risk of breach or unprotected and mismanaged personal data? Will a shared leveraged account management system prove to be more effective in centralized information management? Why is this a matter of choice and not a matter of regulation if it affects the national economy?

The problem must be understood from four perspectives: The Security Product Provider, the Developer, Implementer, and the User. All involved parties must also understand the legal responsibility, rules, and ramifications. Technical challenges exist in separating the technology test cases of data to the analytical review and legal application. The use case is designed to prove data and privacy management efficiency using Leveraged Account Information (LIA). It is unknown if the use of Google’s Sign in With code feature is reliant or affected by low-quality security of the information site it is used on, or if security functionality and risk are transferred. “All of our products are guided by three important principles: With one of the world’s most advanced security infrastructures, our products are secure by default. We strictly uphold responsible data practices so every product we build is private by design. And we create easy-to-use privacy and security settings so you’re in control.” (Pichai, Google I/O 2021).

Project Management
Project Management processes and knowledge areas can be used in Security, for implementation and to provide a framework for the study of security products. Since Security is often a separate function performed by security experts, in addition to software development or coding, the tasks are managed under one project, perhaps with multiple project managers and dependencies. Security tasks can be managed using the project management system of initiating, scoping, scheduling, budgeting, monitoring, controlling, and executing. When studying security products, such as LIA or IUA, a project management approach can be taken. Current methods project management methods for executing or monitoring and controlling processes for a selected knowledge area (scope, time, cost, quality, human resources, communications, risk, stakeholder management, integration, or procurement) are possible when conducting a study on security products but is more suited for the implementation of security products, wherein the scope varies depending upon selection. The LIA security method in comparison to the IUA method can be effectively managed as part of a project but with a much smaller scope, timeframe, budget, and risk. This fact alone is a reason to recommend LIA over the IAU approach for improved management. Evaluating ethical, diverse demographic, and cultural perspectives appropriate for leading projects and programs to a successful outcome within the framework of the five process groups of initiation, planning, executing, monitoring, and controlling, and closing would require the study to include demographics of surveyed participants and or consideration of studying the use of a specific security product’s project management activities of the 5 process groups for comparison. This means the study would need to be done with data from a large population to compare cultural differences in the outcomes of one security product.

Security testing and risk management are important tasks that are managed using PM principles. A risk assessment explores how a component could be exploited by the identified threats (i.e., what could go wrong) and analyzes the possible responses to such attacks. The response options for a risk are to (a) mitigate (reduce probability of event, reduce impact, improve recovery), (b) transfer (insurance, contracted agreements), (c) ignore (for low impact and highly unlikely threats), or (d) avoid, which may require changes in requirements (Ellison, 2006). The differences in scope, security, and risk between LIA and IUA are tremendous, affecting all process groups and the project plan. Although still important to test, with a much shorter implementation timeframe, and limited responsibility for code creation and testing, the LIA method greatly reduces risk and the project scope. Seeing the power of automation, managing API has also been handed over to API management platforms or software. Using such platforms, businesses can trim down the efforts, time, and money invested in maintaining the product as well as its API (Wallarm, 2023).

A specific project management methodology such as Traditional, Agile, or other method might be used to manage the implementation of API products. It doesn’t matter which method is used, but it must be understood that LIA-API product implementation varies significantly from IUA development and implementation. It can be hypothesized and proven that one method works best for a specific security product, but the research study must stay in scope and only evaluate the use statistics and not development comparisons of LIA and IUA. The significance of API management for developers ensures robust security through authentication, authorization, and encryption measures (Hafeez, 2023), among other benefits. The implementation of an API is part of a software development project, managed using some project management method, but becomes are regular operational security management task that is ongoing. Management of security data takes place on the developer’s side and the user’s side. This study is mainly focused on user management of security data when using API products; specifically LIAs.

Strengths and Weaknesses of Project Management Research
Earlier research conducted regarding Project Management studies is of limited value but do provide some guidance on how to effectively organize the research study. Although no specific research studies regarding project management can be used to support the research questions or prove the hypothesis, they are useful in selecting a specific PM method to use for the research study. There are no specific Project Management studies that are correlated to security products or specific to DevSecOps that could be applied to the two security products selected for evaluation. According to Nidecki, “no matter what name you choose for your secure DevOps, the important thing is to realize that security should not be an isolated island in your development and deployment processes but an integral part of every activity in the software development lifecycle” (Acunetix, 2023).

Limitations of the Study
Testing to prove the hypothesis can only be done on a user level or a developer with a user account to test Leveraged Identity Authentication. The test can compare LIA and IUA methods and determine efficiency levels, as well as measurements for information management, but it cannot predict frequencies of forgotten passwords, breaches, or changes in risk using the existing framework because it is a new and different design. Since not all e-commerce or internet sites with a profile and account management system uses LIA, and the Internet is so vast, its only possible to create a test for one user. Once one users experience can be tested and evaluated, the test can be scaled across the internet to see how vast the problem is and how impossible it is to manage Internet Security from a global security perspective.
Choosing the right project management method for implementing a security product is essential. While the complexity of security is greatly reduced using LIA products, implementation and testing are still required, meaning it must be managed as part of the project. The DevOps and DevSecOps incorporates not only agile methods but also parts of the process groups defined in the PMBOK (Kramer & Wagner, 2019).

Problem Simplification
A security architecture of interconnectedness that leverages secure account management is vital, which requires a change to more than just a security policy, awareness, press releases or media, technical code, database management, threat-based monitoring, and developer choice. It is unknown if using Google’s security functionality by adding code or connecting through an API is dependent upon the internet site that the code runs on and to what extent. Re-clarification of the scope of security must also be explained and correctly applied to the correct management system. Rather than teaching users how to create secure accounts for each merchant or internet site, and using awareness as a user responsibility, a change to security processes from one side is required, with implementation across the Internet to change how Internet Sites (and possibly more) are created and managed. The fruit of the poisonous tree and virality must be considered, as well as a theory of Complexity. The result guarantees a benefit that can be seen as a change to the improper transfer and balance of risk and responsibility. Currently, security risks are spread out and by bringing them together, they can then begin to be understood and effectively managed, but first risk must be separated from trust, and roles and responsibilities must be well understood, standardized, and proof of improvement to even begin a system security evaluation from a two-part perspective.

Risk Management
Security awareness is an educational endeavor, and by doing this, security risk has been transferred to the users, with developers and site owners assuming people can and should manage device and application security on multiple levels, in multiple places, and with many different companies, processes, and details of promise or service. This has created a security problem that raises the question of whether there is a better architecture or some solution that could centralize and standardize security. Everyday users are not educated in the Risk Management Framework and efforts to train or educate small businesses on such practices is a nation-wide endeavor. The transfer of risk occurs, without effectively explaining the problem and protection measures to users and the metrics for ‘security’ and information management is not consolidated and reported, so there is no way to truly understand America’s Internet Security standings, risks, and problems.

There are two problems to solve: the data architecture and user management, which both have direct causal relations to economics, crime, and longevity. Because of the long list of benefits of a centralized system, it must be carefully examined before investment. If developers continue to create varied security solutions, then they cannot solve existing problems, so a stop-work process must be created and placed on all development resources across the world since it poses the greatest risk. If people and management don’t view it as a problem, then work continues as usual until the problem is formally presented and proven to cause or increase risk or reduce complexity and meet efficiency criteria for improved use.

Significance of the Study
The study is important to prove that while the Internet enables people to connect across the world and do business, socialize, and complete information tasks, it is not a shared architecture. Because it is not a shared architecture, information is duplicated, varied, and difficult to manage. Users do not have a technical solution for tracking their own activity, data storage, personal information and have a duplicative system for tracking accounts. This study not only shows problems in the architecture, but also shows much efforts towards training and education versus the creation of a centralized automated system for users. Users are expected to be responsible for the sharing of the data, and commerce responsible for the protection of data, yet the management process has become so duplicative and daunting, its obvious that the more data there is to manage in multiple places, the greater the odds are of breach or false information that goes unmanaged.

The Risk Management Framework (RMF) provides a process that integrates security, privacy, and cyber supply chain risk management activities into the system development life cycle. The risk-based approach to control selection and specification considers effectiveness, efficiency, and constraints due to applicable laws, directives, Executive Orders, policies, standards, or regulations (NIST, RMF, 2023).
There is a greater focus now on user experience, with much effort and attention on security. With an enterprise identity management system, rather than having separate credentials for each system, a user can employ a single digital identity to access all resources to which the user is entitled (Barton, et. al, 2019). Even though organizations implement and follow strong security standards and the ISO 27000 Series has 60 standards covering a broad spectrum of information security issues (Kirvan & Granamann, 2023), few engineers have concluded that the security architecture is not the best fit for advanced cyber-evolution and have only slowly taken on an integrated and centralized approach to security.

Research Method: Quantitative Research using data collection and statistical analysis to compare the average number of online accounts per user, number of leveraged accounts, and management time. It must also review a small sample of password reset frequency, along with a comparison of two security products. It will evaluate two variables comparatively and statistically: leveraged security and individual security profile management. More variables may be added.

Research Questions
Does the individual user account security system suffice for a single user and how does it compare to LIA methods in terms of security, time, management, use, and risk? What is more efficient and simplified: LIA or IUA? Is it of lower risk and benefit for a centralized account management system with a more organized and integrated authentication system? It is believed and can be proven that the more security options a user’s has and the more variation in process, the greater the chance of mismanagement. Forgetting information is not the only problem, but also the inability to centrally manage and effectively share or entrust data to others for management.

Data Collection
Data will be collected and analyzed to show differences between leveraged individual accounts (LIA) and individual user accounts (UIA); compared numerically, along with time statistics to measure efficiency. Process must be compared, as well as adherence to the Risk Management Framework, if risk assessed. Confidentiality is important and ensuring safe handling of information and protection of personal data. Specific informed consent will be explained in detail as to the extent of the survey and voluntary participation. Anonymity will be an option for survey participants and published results will not include personal information.

Definitions
Individual User Account: An individual user account is a single profile completed on an internet site or internet site application where a username and password are required, along with personal profile details. These are managed site by site. It is a similar, but not exactly the same standard login process for each site and requires users to ‘retype’ the same profile information, and allows variation in username, passwords, and personal information.
Leveraged User Account: A leveraged user account uses an existing account, such as Google, Facebook, or AppleId to manage its personal account information. It uses a management console that enables users to control access to other merchants or providers of Internet goods and services. It is a three or four-step login process with no typing required.

Risk Management Terms: Acceptance, Avoidance, Transfer, Mitigation. These are terms used in the Risk Management Framework for Security of Applications. Risk is considered accepted by the users when setting up a profile, and risk is considered transferred by the Technology community, along with information management responsibility. Risk increases when data mismanagement opportunities and inconsistency exist. Perceived risk is a non-proven risk of trusting only one company or application with personal privacy data management. Risk is considered mitigated by users who utilize a centralized password vault, paper process, or third-party application to manage multiple security profiles used in many places. Risk terms from a developer perspective is also transferred to the provider of security application code implementation using LIA and risk responsibility are uncommunicated mitigation actions completed by security product providers, and data users which encompasses more than a single person, including those who require, use, share, sell, and store the personal data. Risk responsibility is critical to clarify roles and actions required to change media alerts, and viral scare tactics, and to manage security efforts properly for more than just the consumer/user.

Quantitative Research
The number of personal online accounts, as well as a recording of time to access and change data, compared using two solutions: the LIA and IUA. Data management procedures must also be evaluated and compared. The comparisons are not just for the number of accounts and the time it takes to access and manage it, but also a scenario for a data change in comparison of both, along with important questions, such as how to best manage everything in one place, whether there is a technical solution or a paper process, or reliance on memory.

Rules, Policy, Regulations, Law
The Privacy Act of 1974 establishes a code of fair information practices that govern the collection, maintenance, use, and dissemination of information about individuals that is maintained in systems of records by federal agencies (Privacy Act of 1974, 5 U.S.C. § 552a, 1974). The Freedom of Information Act applies only to federal agencies and not to records held by Congress, the courts, or state or local government agencies. Each state has its own public access laws (The Freedom of Information Act, 5 U.S.C. § 552). The Digital Millennium Copyright Act is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization, criminalizing the production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works (Digital Millennium Copyright Act, Pub. L. No. 105-304,1998).
The availability of information, from personal information to public information, is made all the easier today due to technological changes in computers, digitized networks, internet access, and the creation of new information products. The E-Government Act of 2002 recognized that these advances also have important ramifications for the protection of personal information contained in government records and systems (DOJ, 2019). Privacy Impact Assessments (PIAs) are required for Federal Agencies that develop or procure new information technology involving collection, maintenance, and dissemination of information in identifiable form or that makes substantial changes to an existing system (E-Government Act of 2002, Pub. L. No. 107-347, 2002). Local and state laws vary regarding rules of use of personal information; the state of Virginia prohibits the processing of sensitive data without obtaining consumer consent (Va. Code § 59.1-578). The processing of sensitive data also triggers the obligation to conduct and document a data protection assessment (Va. Code § 59.1-580). The state of California’s Consumer Protection law is much more specific in delineating consumer rights of personal information protection (CA DOJ, CCPA, 2023). The Virginia Consumer Data Protection Act (VCDPA) clearly defines whose personal data is covered, describing consumers as Virginia residents “acting only in an individual or household context.” It further clarifies that consumers are not those acting in a “commercial or employment context.” Unlike California, where the now-expired B2B and employee exclusions have been the subject of several statutory amendments, Virginia has chosen not to leave those potential compliance hurdles up in the air (Bloomberg Law, 2023).

If specific laws that govern the protection of personal information are state by state, then another problem exists in security protections, as are the procedures for remedy when the laws are violated. Therefore, the responsibility for the security of personal information must be clarified and added to the argument that a single provider of security products for consumer use is beneficial for more than just efficiency, but legal purposes.

Google’s Sign In With Feature

Why are we okay with massive duplication of our personal information? A mini thesis on risks, benefits, and challenges for users, developers, and companies. There is even some interesting information for investors and security professionals to consider.

Profile Security Problems

Etymology & Evolution of Computer Science – Strategic Planning

[responsivevoice_button]

Step 1:
Brainstorming Innovations List (10-15 Needs)

Career Planning Assessment (Educator, Business CTO, CIO, Writer, Researcher, Advisor)
Supplemental Learning and Licensure of Product Technology

  • Microsoft Certifications
  • Google Certificates
  • Project Management Certificate (SCRUM/AGILE, PMBOK)

Alignment of Learning with Specialized Technologies
Implementation Practices & Evaluations
Integrated Learning of Formal Education with Product Learning Systems
Acquire, Implement, Design, Develop, and Evaluate Software (Proof of Skill/Knowledge Development)

Step 2:
Innovation of Existing Internal Technology
New External Technology Acquisition

Step 3:  Strategic Plan

Need.  Technology planning, acquisition, development, research, and testing uses specific processes and regulations which are different for government, commercial, public, or private use.  The specific processes must be known, along with regulating authority, law, or policy for best practices.  Structure and alignment must be well understood and outlined for each area of responsibility.  Technology is a vast subject, covering many areas.  Computer Science is the field of research and focus, therefore strategic goals must be aligned with subjects related to Computer Science.  While software development and implementation have its own process that differs but involves other processes, that might differ from Government and Private regulations and practices, there is a need to fully understand and document both.  A Gap Analysis is a phase of program and project management – what is missing and needed to fully examine the field of Computer Science beyond the basic computing device and its applications.  Many parts of the study areas are out of reach; unable to change the architecture, but Critical Analysis and Design Reviews are necessary for its advancement in many areas.

Span of Control and Influence
What can be produced, acquired, developed, tested, and evaluated requires investment in both money, time, and development resources.  There is greater motivation to review and advise on matters related to the Internet in the Development of Cloud Systems, therefore investment in product knowledge, as well as documented processes, such as the Software Development Lifecycle, Acquisition Process, Research and Development Process is critical to maintain consistency and standardization in product review and common understanding.  The Internet or top products, such as Microsoft or Google cannot be directly changed without being assigned specifically to a product evaluator or system position.  Learning the products adds value to understanding to utilize the systems post-graduation, but goals are not specific because employment opportunities are limited to a specific set of titles and responsibilities.  When the overall goal is to be a Doctor of Computer Science, the focus and study cannot solely focus on software and corporate or government responsibility, policy, process, and oversight.  Deciding what level of knowledge while considering future applicability is what is important.  Why invest in software or testing of technology if it cannot be used to profit in the short term, or available for sell and use in the long-term future.  The goals are not to develop a software application, but to fully understand the field of computer science, its function, history, and progression to be a leader in the field.

Developing the Strategic Plan
It is not a simple plan of business change management or the acquisition of technology, or the development of knowledge and demonstration of skill.  It is creating a high-level plan to attain the goal while working towards a larger goal of developing a sellable product while learning.  Profitability potential, as well as educational investment and future opportunity remains the focus.  A book based on years of research, field experience, and intuitively obtained knowledge is a consideration, but requires several years of study and practice before results can be seen.  A Doctor of Technology cannot exactly expect to open up a Doctor’s office for electronic devices and can’t exactly diagnose computer professionals as patients without a specific focus on psychology or behavioral science.  A Doctor of Computer Science can develop a standard process for the diagnosis of programs, projects, along with specific terminology beyond ‘viruses and other terms used by the medical field.  While standard book writing and research practices can be followed, it is in addition to following the standard educational format of responding to assignments, with limited leeway on topic, forcing additional requirements for compilation, and organization for study that results in valuable and usable findings in Government and Industry.  Remaining focused on conceptual learning and not investing in Technology that has already been used, tested, and demonstrated saves money and time, yet investment provides opportunity to prove development skill, which is not aligned with high level “Doctoral Study” and practice. 

Strengths, Weaknesses, Opportunities, Threats (SWOT)
The technology skill and managerial experience already exists, therefore there is no need to personally invest in software or special hardware to experiment.  There is a natural need to experiment, explore, and attempt to make money by utilizing software and advertising systems, without a return on investment, simply to create a group of listeners or readers, this is viewed as a weakness.  A strategic long-term goal is to write and sell a book with scientific research in the field, therefore short-term business goals of profiting from advisements or technology recordings and discussions is not a sound investment and conflicts with the long-term goal.  Maintaining a public Internet site is an area where podcasts can be shared, along with articles but costs money and the greater the information storage or compilations of writings, the greater the want and need to invest in advertising the efforts in building a readership.  It’s an obvious practice of following a trend, which might be considered a ‘fad’ or attempt to become a public speaker or influencer in the field, when more time and research is required.  The recordings prove value in subject specific knowledge and shows weakness.  This can be viewed as a threat to future success or a method to measure professional and personal growth.  Although immediate money-making opportunities exist, it is better to compile research for a more formal and professional presentation of works using the scientific method of research and study after more knowledge and education is gained.  A policy must be established to avoid social media, Advertising Campaigns, Business Planning, and sharing of premature evaluations, works, or opinions.

Focus on Long-Term Success
Immediate fame, interaction, advertising, and hands on knowledge can be gained and reproved using new tools, but has already been demonstrated, so there is no need to re-invest to build a small technology information center.  It is better to focus on long term plans of research and book writing, the organization of material, and not on its application in the business industry, although in depth research opportunities exist and are needed.  The ability to recognize future trends while contributing to the design for ‘their firm’ (Bruton & White, 2017) is a goal, but there is no promised future with a firm and no evidence of direct immediate contribution.

Time and Cost to Complete the Project
Development of a Strategic Plan is the project, not the acquisition of Technology to create or implement the strategic plan.  The plan can be simplistically developed, with specific milestones or goals set to create research processes and compilation procedures to identify the area in most need of research, or the area that presents the least amount of understanding.  If problem management or improvement is to be the focus and the system is out of the span of control and influence, then researching and discussing the issues independently is the only option, with expectation that the concepts or areas of study can be used to influence industry and the systems later.  The time span is five years, therefore the current strategy is to maintain momentum to complete the credential requirements, while working to align efforts with a preservation or use method in how to apply the concepts and discoveries, whether as information for a future study, general knowledge for the book, or new problems uncovered or very serious directional evidence beyond just general societal, psychological, and financial dependence.

Innovation of Internal Technology & External Acquisition
Reassessing processes, policies, needs, and plans assist with cost control and effort management.  It would be considered a weakness to respond to old methods of ‘advertising’ and ‘marketing’ or social media sharing of information when no population of IT professionals exist or should be marketed, or findings shared with because the research and studies are still being conducted.  The acquisition of software or technology to engage in collaboration, commentary, viewership, or readership, along with the purchase of tools to prove knowledge in certain areas is beneficial for short term, immediate results where the goal is to be a public speaker, therefore a review of Goals and reconsideration or refocus took place, deciding to wait to publish any incomplete or non-professionally examined educational works in the field.

If set on a path of constant word-breakdown, when the government task of organizing and scheduling work orders is considered a ‘work-breakdown structure’ then we are in fact in a technological phase of defining processes of work for the purposes of automation, using combinations of upward and downward spirals of mixed medical and directional terminology – gaining momentum in describing the purpose and use of the figure 8 symbol and its infinite use or possibility where time, labor, and profit is of the greatest importance, as well as the application of findings and knowledge.  The etymology of the root ‘comp’ adds significant value to the field of understanding or ‘comprehension’ but only if it serves a greater purpose than insight because our goal is to see and predict or create the non-existent and unseen or improve upon what is available and known.  Adding to this a biblical reference from “Genesis to Revelation” – Genetics versus what can and is revealed to us in the time span, whether individually motivated to find or discover or religiously inclined to devote research to ‘inter-twined’ understanding of even just a cellular structure and universal knowledge or language and its vast use.  Reviewing Microsoft’s Sequel vs. the DNA Sequence in Genetic Code, brings us closer to working together, but more scientifically separated from basic understanding of how we view human physical traits into the scientific description, collection, and changing of biological matter.

The greatest need it to bridge the gap between the field of Medicine or Physics and Computer Science, as well as to clarify and further define dimensions beyond shapes, but into the manipulation or change in matter in geographical systems, beyond words and topics, but into energy and the systems that can accomplish such major events with and without devices and systems.

Executive Summary

Comparisons of the Human Design versus Technology in use and its naming conventions, along with ecological and economical progression requires more than a simple strategic plan on what software to buy and how to fully study and present the findings.  It’s also not captured in a five-to-ten-page summary.  The importance of the research or its value is to predict future developments, course correct, guide, as well as improve integrations to change society and how it understands or uses it.  Technology is supposed to relieve stress and make our lives easier, yet it seems to complicate things, creating more illness and stress, therefore it requires complete review to avoid a serious catastrophe like many new addictions, creation of viruses, or worse, the complete removal of personal love for it and its ability to completely change, restrict, or remove human interaction.  Computer Science’s role in roots of ‘complexities’ of communication systems as well as ‘tele’ systems – things from a distance are its main functions, as are matters of ‘influence’ and sickness in our span of control and change to improve or make life more easily computationally understood and ‘automatic’ or atomic.  Just the study of alpha, beta, and gamma rays is just a small facet of technology that has both awesome and damaging effects.  This area of study includes a wide range of segmented disciplines, and the focus is on bringing all those disciplines in working order to understand how humanity works as one interconnected and interstellar device beyond a galaxy of stars, energy fields, appliances, and applications across the globe and throughout the universe.  The very research question is: can all things be permitted to work together, or must they be forced into separate operating devices and are we even on the right track, using technology terminology or are we disassembling excellent advancements while in simultaneous development?  At what point is Computer Science fully developed and no longer considered harmful and dangerous?  Systems evaluation is possible with a standard review process, but not effective if the reviewer cannot influence and create valuable and sustainable change and noteworthy assignments, therefore strategy must remain generalized, yet focused to gain personal sense of accomplishment in its technology investment.  What is science with evidence and proof and valuable systems that capture the rate of change and recurrence on a global internal and external level?

Food for Thought:  Cyber  — a few letters short of cyclical cycles of ber – eavment.  be·reavement:  /bəˈrēvmənt,bēˈrēvmənt/ noun:the action or condition of being bereaved.

“there is no right way to experience bereavement” Similar: loss, deprivation, dispossession, privation, grief, sorrow, sadness, suffering, hurt, trauma, death in the family, passing, passing away, passing on, demise, decease, end, expiry, expiration

Quietus

Justly considering the attachment theory in both human relations and computer science adds to the field of understanding in loss and its great detriments of destroying or losing value and great potential that the addition or loss of an attachment can bring.  This, added with the scientific theory of ‘combining’ or ‘integrating’ in considering how all pieces and parts are ‘integral’ in numerical and alphabetic function is more than just the programming of what was once described as a compilation of ones and zeros to create form-fields, which scientifically have evolved into energy fields where computer science plays its greatest role in both virtual and physical management.  Access to functionality, capability, and ability to create and utilize something of great value is when the greatest effect of ‘cyber’ theories is most felt; with many often unable to understand or relate because they are only able to see or comprehend simple components or things, they are able and privileged to see and work with.  An understanding or theory of ‘integration’ or integral connectedness cannot begin to be understood without alpha-numerically dissecting terminology and review progression or ‘advancement’ and a thorough understanding of reality vs. virtualization or what is considered ‘virtual’ parts of reality; all of which is real and individually personified and defined.   Since computer science started with the “Terminal” and is imminent death is referred to as a ‘terminal illness’ and if cloud systems are the final phase of development, then we have yet to break the sound barrier or even closely tap into the field of aerodynamics in both the physical and virtual world, or the possibility that more than two exist.  The words begin to mix – from human senses of hearing, using our ears, to systems of earo-dynamics, to include the mind and nodes of synaptic synchronistic function that manages collective human understanding.  Perception and conception are critical, as is terminology and end states or stages of universal thought and theory in natural selection and evolution or simply stated, technological advancement and superhuman development.  This requires a review of etymological origin of the computer from machine à terminal à computer à system à device.

vir·tu·al·ly

/ˈvərCH(o͞o)əlē/

adverb

  1. 1.

nearly; almost.

“the college became virtually bankrupt”

We ‘almost’ understand it completely, but almost is not good enough and ‘almost’ can be an extremely damaging, fearful, and life changing experience.  Personal understanding is only individually valuable and worth nothing if it can’t be shared, explained and only seen as a natural or unnatural non-scientific or scientific phenomena; then it is still considered unknown or unexplainable, where cause and purpose remains in question.  It’s easy and simple to describe what we see, conceptualize, visualize, and know to be true, but complicated to explain and consider how time plays a significant role in the development and change in how we discover and advance going from a simple mathematical device to electromagnetic telecommunication airwave devices governed by the laws of physics where virtual law or cyberlaw only recently emerged (Upcounsel, 2020) and is barely qualified to set policy, rule, or argue Internet law.

References

The Management of Technology and Innovation, A Strategic Approach, Third Edition, M. White
     & G. Bruton, Cengage Learning, Inc. 2017, 2011

Oxford Languages Dictionary:  Cyber, Bereavement, Virutally, accessed via the Internet at
     Google.com, search term on November 17, 2021

Upcounsel, CyberLaw: Everything You Need to Know, accessed via the Internet at
      https://www.upcounsel.com/cyber-law on November 17, 2021

Neurolinguistic Programming (NLP)

Attitudes that Count – Mindsets for Business Success
from:

NLP: The Essential Handbook for Business: Communication Techniques to Build Relationships, Influence Others, and Achieve Your Goals
by Jeremy Lazarus

Nine Presuppositions that are most relevant to the workplace. For your convenience, these have been divided into three groups (please note that these groupings are for guideline purposes and that some could fall into more than one category).

  • Externally focused, i.e. based on or impacting on the outside world.
  • Internally focused and internal attitudes.
  • Results/activity focused.

Externally focused

The meaning and outcome of communication are in the response you get.

Our interpretation of a situation is not the situation itself.

Have respect for other people’s point of view.

Seek first to understand, then be understood.
—Stephen Covey, author of The 7 Habits of Highly Successful People

You will appreciate from the Communication Model that each person is unique, with different values, beliefs, meta-program profiles, and experiences. Though you might not agree with your colleague, supplier, or customer, if you can demonstrate that you respect their point of view, you will be more likely to influence them (see Covey’s quote), and even if they do not come around to your way of thinking on this particular issue, you can agree to disagree and still maintain a healthy working relationship. Conversely, if you do not demonstrate respect, the relationship may be damaged.

The meaning and outcome of communication are in the response you get.

The Communication Model shows that everyone filters information differently. Though your words and actions might seem clear to you, people you interact with at work might interpret them differently from how you intended, and therefore might respond differently from how you expected; that is, their response is based on the meaning they interpret instead of the one you meant.

Therefore, if certain people at work are not responding in the way you expect, instead of expecting them to change, it is easier if you change the way you communicate. Much of this book is focused on how you can be more flexible when communicating.

Our interpretation of a situation is not the situation itself.
The map is not the territory.
—Alfred Korzybski, philosopher and scientist, who developed the theory of general semantics

It is rare for any meeting to take place where everyone agrees with each other, and then all take the actions exactly as everyone at the meeting expects. This is because we all have our own unique interpretation of events, and this interpretation is not the event. Therefore, you will interpret a situation, such as a negotiation, in a different way from someone else, and you might describe it, for example, as a “battle,” whereas for someone else it is just a conversation or an exploration. We all respond to our own map of the event, not to the actual territory. NLP can help you to appreciate other perspectives and ask questions to gain deeper understanding.

Internally focused and internal attitudes

There are three key NLP Presuppositions in this category:
There is no failure, just feedback.
Flexibility goes a long way.

We are, or can learn to be, in charge of our mind and therefore our results.

There is no failure, just feedback.

Failure is only the opportunity to begin again, only this time more wisely.
—Henry Ford, founder of the Ford Motor Company

There are so many examples of successful business people who “failed” before becoming successful that this book could be devoted to just this topic.

Examples include:
Rowland Hussey Macy Sr., the founder of Macy’s department-store chain, who had at least four retail failures.

Thomas Edison, the holder of over 1,000 patents in the U.S. alone, who allegedly made 10,000 attempts before successfully creating the light bulb.

Bill Gates (the founder of Microsoft), who co-ran a business called Traf-O-Data in the 1970s which lost money.

Walt Disney, whose Laugh-O-Gram Films business went bankrupt after around one year’s trading.

The moral is simple. There is no failure, merely feedback that what you have done did not work. Learn from it, retain (or even intensify) your motivation, and move forward. NLP can help you set goals and maintain the motivation to achieve them (see Chapters 4, 8, and 14).

Flexibility goes a long way.

Insanity: doing the same thing over and over again and expecting different results.
—Albert Einstein

Results/activity focused

  • People have all the potential that they need to make the changes they want.
  • People are making the best choices they believe they have available and are doing the best they can.
  • Modeling excellence leads to improved performance.

People have all the potential that they need to make the changes they want.

The past does not equal the future.
—Tony Robbins, motivational speaker, author, and performance coach

Following on from the previous Presupposition, it is useful to consider that each of us has untapped potential. So whether you are thinking about yourself and your own aspirations, or managing staff and their aspirations, recognizing that everyone has abilities to learn, adapt, be motivated, and excel in certain circumstances will help you (and your colleagues) to progress further than if you believe that everyone is limited to their previous results. The key point here is that though not everyone can be the
most successful business person in the world, the past does not equal the future, and NLP has many techniques to help people fulfil their potential and progress further than they otherwise would.

NLP: The Essential Handbook for Business: Communication Techniques to Build Relationships, Influence Others, and Achieve Your Goals
Reprinted for ZU7S5/5831597, American Public University System Red Wheel/Weiser, Jeremy Lazarus (c) 2015, Copying Prohibited
Page 3 of 6

See the source image

Social Media Investigation

CASE STUDY:  FALSE PROFILES or BAD COMMUNICATION SKILLS?
Bridgette McCoy (claims social justice) was morbidly Obese when we started at V-Wise.  She attended the 3 day conference with Marketing & Advertising organized and led by a Pretty Black Woman who continued to Advertise the Program.  V-WISE was paid for by the US Military for Women Vets to take a 6 week course on Entrepreneurship.  I was so “ignited” to see that many women Veterans in all one place, learning how to become businesswomen.  Back to Bridgette.  When I met her, I thought she was nice, well groomed, but became obese (sorry, I observe these things).  How a Vet becomes obese is beyond me, but I was more interested in what she had to say.  She was interested in “Social Media” and sought to ‘monetize her writings for a cause’.  Since meeting, she claims to have a Masters Degree, but has no evidence or ‘social connection and contact during the journey prove such a life achievement.’   When people, over a 7 year period are engaged in formal education, they share their milestones, ideas, and progress; at least this would be best for the Social Community for students to share what they’re learning or what they’ve accomplished.  It’s called Life Milestones.  Imagine looking back on your papers and topics 7 years from now and saying, wow, how I’ve grown and not refer to your waist line.  While a nice image is helpful and improving your image is also helpful, it’s not everything, especially if you’re claiming to crawl to a Master’s level in Educational Technology, then we expect to see some evidence of that education filter into your social profile and commentary.

Maybe Bridgette just shares her “Racial Feat of Social Justice” every now and then and doesn’t post about her personal or educational activities.   I refused to waste my time on “social justice” because although it sounds nice, the way I see it from my feed is another Black Crusade, in which I personally don’t have time for more racially charged media or movement from someone who fails to share what’s really going on, or perhaps tries to deflect the matter.  #yesgotoschool; #yesstopbeingracist; #womenmatter; #militarymatters; #educationmatters; #socialinfluencematters;  

She posted a video in response to my article.  I congratulated her on her weight loss, but she again, referenced “the Black Women’s Community” stating, you don’t know who you’re messing with; again, showing a violent disposition to public comment and scrutiny.  She failed to address her Educational Claims, showing another inability and emotional/social immaturity we can’t afford to weep over and only to follow to learn what not to do.

She and others in the conference seemed to have become (or morphed into) Black Warfare Marketing Agents to promote Black Media without a Demand for Change; I guess she/they wanted to become reporters?  If you want my true opinion, it seems they provide the fuel for segregation and continue begging to be seen as an equal.  Her career objective is not my investigation, but her self presentation is, why?  Because I can’t stand Fake Media and backing for Racially Charged garbage.  She claims to have education in Mental Health, but so does not/did not and will not write about Mental Health Matters.  Remember, a Counselor has to resolve their own battles & problems before they can effectively help another.  A vet who became obese, needs to get in touch with reality and focus on thy self before seeking to help others.  There is a whole track on this in Psychology and all medical doctors and the majority of humanity knows, once you’ve became over 350 pounds, you can’t simply diet to get to a beautiful body; you need surgery and if you got that surgery, great, but you also need Psychiatrics.  From 2014 to 2018; going from a “wanna be obese entrepreneur” and “social justice media artist” is impossible to get a Masters degree when trying to work on the Human Psyche and Physical Appearance and is not real if the social commentary doesn’t match what’s really going on.  STOP BEING FAKE.

I’ll clarify “Fake” for the record:  Today’s news often reports to be aware of Cyber Criminals, Fake Profiles, and other online attacks.  If you work in Journalism or Social Media and you’re out there in the profession, you will be subject to other’s opinions.  When someone writes an article about you, you can respond in a matter of ‘refuting the truth,’ with respect to the writer’s opinion, and a response to the statements made where the truth is in question.  Instead, Ms. McCoy responded with a threat to the writers career, stating, she will never have a successful career.  🙂  And she wants to be a coach!!!  haha!

She often posted media for #socialjustice and #blacklivesmatter.  I can’t help when they’re grouped all VIOLENT, UGLY, and UNINTELLIGENT, even if they looked handsome, I still can’t help; please stop being racist and become something else.  Although it looks like intelligence and beauty is increasing in her world (where she has a beautiful body now) it’s not REAL.   Who was she in 2014?  She was said to be an Entrepreneur looking for a Job and wanting her own business.  She complained of poverty and wanted to work together.  We chatted a few times, but she was unclear in her direction (again, just like me, but so not like me).

What’s the Problem?  The problem is we have Blacks running around claiming Master’s Level Education (with Fake Profile Pictures) without smart sense or evidence in social media/communication proof or improvements to back it up.  They turn violent in wrong situations and are injuring others, in the physical environment.  One in my current environment claims to have a Masters Degree and is seeking workman’s comp as a Bus Driver.  What Bus Driver has a Master’s Degree?  She was injured immediately following.  #notsocialjustice;  What’s going on here?  The writer is certainly capable enough to know the difference between a physical and online environment and isn’t crazy to hope that there could be a positive influence online that could change matters in a physical environment without those people being actual followers of the doctrine or causes.

What else is the Problem?  Bridgette, Marilyn, and Tara (ALL BLACK WOMEN) were aware of the Vet in need of resources, but failed to assist.  They sought their own agenda’s all of which were Negative Marketing Campaigns.  When asked to support a Vet to attend a 2nd conference when they all gathered as a “Black Women’s” campaign, they denied the support of a white woman.  ALL OF THESE WOMEN claimed to be in the US Military.  They should’ve learned colorlessness by then, yet still chose to Promote Black Women Improvement.  Not one of those women in my current environment can show proof that their efforts has spanned nation-wide beyond themselves.  Tara wanted to write for US Women Veterans and promote Black Women Models with a site about her Rape Story to work on Rape in the US Military.  Some stuff is sensitive, obviously.  Wow.  Writing is good and wanting to change the world is great, but see a Doctor first and learn about Closed Groups for the Protection of the Healthy and those who’ve already gotten over it.  Survivors don’t need a “rape group” they just need to know they weren’t the only one and if they feel the need to tell their story, then they should do it, in a closed group — So I’m now suggesting.

Should I not bring light to Fake Profiles and Artificial Intelligence and its implications? All I can say is one of “Obama’s Agenda’s was the Obesity Epidemic.”  It doesn’t matter what you look like?  Contrary to popular belief, it does in hollywood, which is what the Internet has become.

Marilyn Harris (the Promoter) began Politically Racially Charged Social Media Marketing, sparking more hate and discontent in OLD Matters, using her student population and connections to forward her personal past (racist) agenda.  It showed their own form of Racism still exists, never once considering Educational Opportunity for Veteran Women or others hurt by Current Wars.  Although Marilyn was responsive with administrative matters, but she improperly used her position for SELF and POLITICAL PROMOTION during the OBAMA Administration.

Being connected to her on Social Media was not an Educational Experience nor was it helpful.  I thought she could be a source of inspiration for the Black community and I tried to allow her to be one of mine, but I couldn’t because I was in a heavy black high crime area and still am today.  Also, because they don’t know how to do follow up relevant campaigns.

Looking at this on the whole over several years; I don’t like them, but I didn’t stay daily engaged in online social interaction due to their content and without waiting to see if their efforts made an actual difference; which they didn’t. 

When I went back to school and used Obama’s V-WRAP Program as a Disabled person, I could not complete the program and was forced to pay back all of that money.  I was also charged by the school.  Does Ms. Bridgette’s Educational Technology Span across this?  NO, because she sits at home and doesn’t work for a company and she doesn’t work in Educational Technology as she claims.  If she did, she’d understand Applicability and Improvements in Process Areas affecting the Tech Writer and Investigator.  

Many stated OBAMA didn’t help his people, but someone was placing them and funding back end operations, promising Talent and Physical Increase for better representation. 

One of the Blacks (also abnormally obese) Veterans named Tara Jones was being sponsored by a Basketball Player to publish an Online Magazine for only Black Women and then wanted to write a Veterans’ Site about Rape for her “story.” This is sick and self promoting of a Negative Experience.  There are more healthier ways of Writing about Problems.  Contact a Mental Health Professional and Invest in Self Care or buy a book and do the work.  Find a Support Group in Your Area and Invest in Creating a CLOSED Group for Sensitive Matters.

Unfortunately, more school shootings and black targets took place, so they were not effective with their agenda.  They continued to argue OLD matters with new faces, continuing on in a Racist Feat.  On the streets, they’re worsening, more abusive and uglier.  So while some faces and careers online got prettier, the REAL world worsened.    

Bridgette’s latest posting showed her as a Pretty Black Woman.  In 2014, she was obese and not very smart, by stating the obvious – monetizing social media.  She presents as an Intellectual in a position of power in Technology.  She would have seriously had to get plastic surgery to match this profile picture.  Don’t be afraid of opinion; Oprah deals with it all the time and she doesn’t respond with threats.  She’s a solutions oriented business, much like Tara Jones claimed to be, but was not.  The article is not written out of Jealousy or black targets; it’s written out of a 7 years Social Media study of intermittent contact to review agendas by those claiming to have certain hopes, desires, and plans for Entrepreneurship or Professional/Personal Development.

Part of the response Bridgette had to this article was that she “went out into the wilderness for 7 days and lost 100 lbs.”  Wow, Bridgette, what a story!  Let’s blast you worldwide, but first tell us more about the Educational Technology you think you’ve learned about!

Life changing events are important, as well as the journey, inspiration, and outcome.  It’s not just the start, the middle, and the end, but everything it touches, influences, and affects.

She was interested in Monetizing Social Media for Businesses, but didn’t know how. ?? err. She doesn’t do direct marketing with colleagues. Is this what happens with one conversation with me? I guess 🙂 Probably got a brain transplant as well. Now she’s into podcasting and mentoring others on what, Weight Loss? She claims to develop instructional content in Ed_Technology?

I know the world is not about me, but these are my areas of interest and I don’t mind that we have things in common, but if you don’t handle it the right way, I have to speak up and that is called Freedom of Expression, Speech, Opinion, and whatever else you are opposed to and wrong in your thinking that I’m out to destroy this person.  I study Social Media; made that clear from the beginning.

All we’ve seen in Media Advertising in Educational Technology is an influx of Black Warfare.  There are better ways to Market.  THIS IS HOW HATE CONTINUES TO LIVE AND GROW.  Historically, it was used to create Change, but why force something we hate, which is helping a lower class population.  I am not your Teacher, but if my teacher has a problem teaching me, they must understand, I can’t stand racism and I get tired of Black Media and Dark Arts.  They sicken me because I’ve seen too much.  I was just attacked the other day.  So while everyone is still an individual, the opportunity to create World Change is gone.  He failed to do anything right.

The Conference / Physical Meeting and Online Educational Technology was brought to you buy Syracuse University which at one time was a 6 week program in Entrepreneurship and considered a good experience for Vets, but is now a 2 week program offering no college credit.  Syracuse doesn’t even offer Online Transcript Sharing, so this is not a good educational system, obviously.  I don’t think Obama knew what he was talking about when he said we needed to improve the Educational System.  With the advent of AI and Brain Technology Sharing, many are left bewildered and don’t realize the resources are being IMPROPERLY ALLOCATED.

Go

No evidence of such Tech Background or Ed Degree Career Focus prior to whatever went into affect with ..What is that exactly? If you have your hands in Florida or cross state lines, you will be considered a viral follower, so please stay back and get out of my career path. Whatever you’re doing works for Obesity and Professional Career Progression, but for me its a slap in the face. You might think she’s capable on her own, but someone’s investing in her and Black Marketing. hashtagblacklivesmatter, but not before my own. Thanks. Therefore it’s considered Theft. I’m not a music file or a program. I’m a human and somehow you continue to harm me with this and her friend TARA Jones who loves to write about Rape and Social Media. I’ve seen enough.

 

Internet & Fragmentation: Moving Towards Integration

Digital fragmentation, characterized by disjointed systems, duplicate data, and incompatible interfaces, is a growing problem that undermines the effectiveness of technology in managing information and delivering services. This fragmentation leads to cybersecurity vulnerabilities, redundant identity verification, increased operational costs, and a diminished capacity for coordinated decision-making.

Users of the Internet deserve streamlined, efficient, connected systems with real Information Management quality.

Organizations struggle to get a complete view of user behavior, institutional performance, and regulatory compliance, while individuals are burdened with managing multiple digital identities and disconnected profiles. The issue is caused by technical factors like the absence of integrated APIs and standardized data models, as well as organizational and regulatory factors. The project aims to explore these causes and propose integration frameworks to promote secure, interoperable, and data-centric digital ecosystems.

The Perils of Digital Fragmentation: Why Our Systems Need to Connect

We live in a digital age. From managing our finances to staying in touch with loved ones, technology is woven into the fabric of our daily lives. Organizations, too, rely heavily on digital systems to operate, make decisions, and provide services. But there’s a hidden problem undermining our digital world: digital fragmentation.  

What is Digital Fragmentation?

Imagine having pieces of a puzzle scattered everywhere, and none of them quite fit together. That’s essentially what digital fragmentation is. It’s characterized by:

  • Disjointed systems: Different software and platforms that can’t communicate effectively.
  • Duplicate data: The same information stored in multiple places, often inconsistently.
  • Incompatible interfaces: Difficulty in moving between different applications and accessing information seamlessly.  

Why Should You Care? The Far-Reaching Consequences

This isn’t just a tech issue; it affects everyone. Digital fragmentation leads to:

  • Cybersecurity vulnerabilities: Weaknesses in one system can be exploited to access others.
  • Redundant identity verification: Wasting time logging into multiple accounts and proving who you are repeatedly.
  • Increased operational costs: Businesses spend more time and money trying to patch together their systems.
  • Poor decision-making: When data is scattered, it’s hard to get a clear picture and make informed choices.  
  • Difficulty in getting a complete view: Organizations struggle to understand their customers, their own performance, and whether they’re meeting regulations.  
  • User frustration: Individuals are stuck managing a mess of online accounts and profiles.  

The Root of the Problem: A Lack of Integrated Output Due to Individual Non-Connected Design

Why is this happening? Several factors contribute to digital fragmentation:

  • Decentralized systems: Many systems are built independently, without a plan for how they’ll interact with others.  
  • Missing APIs and standards: A lack of standardized ways for systems to talk to each other (APIs) and for data to be structured consistently.  
  • Isolated development: Systems are often created in silos, using different technologies and methods.  

Looking Ahead: The Need for Integration

We need to move away from this fragmented landscape. This requires:

  • Holistic integration strategies: Plans that consider the bigger picture and how all the pieces fit together.  
  • Interoperability: The ability of different systems to work together seamlessly.  
  • A focus on data: Putting data at the center of our systems, so it can be used effectively and securely.  

By addressing digital fragmentation, we can create a more secure, efficient, and user-friendly digital world.

Online learning – Right Words

Attendance is different online, in fact, it’s called participation.  Attendance is not a part of online learning.  I think it’s important to use the right words and definitions that differentiate online learning from traditional in-person, classrooms of physical spaces.  I say this simply because of much explanation necessary to evaluate and explain differences and use in words, especially during a time of computerized learning, teaching, automation, and robotic use.

Use the Write Words.

It’s not strictly monitored; we are expected to be adult professionals, of high value and knowledge, professional skill, maturity, and ability.  Monitoring is for younger generations that require supervision, an intervention, or facilitation.  The difference for us, is that there are a greater number of monitors in use; being completely different than surveillance, or classroom monitoring.  

Student interaction and monitoring is best suited for psychologists and sociologists.  Students who ‘monitor’ social or interactive behavior naturally, most likely do so naturally because of their interest in the differences between in-person and online behavior.  If there were a psychologist onboard, they would diagnose us with anti-social personalities because we are solely focused on writing, researching, and posting academics, where no in-person social or professional interaction takes place.  It is the nature of the design, but we’re hoping each person can socially interact with others and compare their levels of knowledge and how IT works in areas where there are no employed doctors of IT or visible evidence of advanced technology (such as quantum physics, or AI) seen.

Some are sensitive word evaluators, in the context of the law, education, technology, and interaction, for the purpose of clarity and proof; variation of ‘speech’ and ‘type’ or use because of previous landmark legal cases that truly disrupted a nation that had and continue to have devastating effects, resulting in injuries, loss of money, economic downturn, and long term dysfunction.

The word “engagement” is questionable, as it has a marital element; and traditions have changed since President Clinton and Hilary were in college; it’s not about getting married or crafting legal defenses because a value was missing or moral code violated.  This is why terminology is so important, when ‘values’ and ‘codes’ are used and AI emerges to bring emotional(ess) and heartless decision makers into the process — the world and tech leaders fear devastation and heartbreak because we are human and regardless if “we here” understand the difference or not, it does not mean that everyone and everything does, so consideration must be made in careful selection, just as we carefully create selection, we too should also carefully select our words. 

Technology – Qualitative Research

When trying to adhere to program requirements of another discipline (or educational department), not only must the new method be learned and understood how the method is useful to prove theories or test hypothesis’ in advanced topics, but also whether or not it can be applied to the specific field of study. Some methods were created before the creation of the Internet, and aren’t always the best way to present data being collected, compiled, and used. Even the question as to whether or not the Technology discipline is connected to the American Psychological Association (APA) standards, or some other institutional board that has determined the methods are to be used in all disciplines pursuing philosophical study or dissertation, it must be designed using those methods, yet few studies of similar nature are available for peer review or use in developing new research. Not only does the application and use of the method have to be learned and evaluated for application to the scientific study area of computer science, but at what level, degree, or angle.

In a well designed and organized research study, the specific variables or data elements would be determined and a database designed to track the data; or to manage the structure of the study to organize and categorize to effectively present correlation and other related studies beyond using just keywords. Students are left to design their own.

For survey data, electronic forms are available that improve the presentation of data, but minimal solutions have been given that offer form field data compilation and data analysis features and there are no standard survey data that can identified as useful studies of value for re-occurring collection and long term evaluation. This is why we are unable to truly solve critical problems using longitudinal standardized studies. Once the student has completed its study and presented it, the research is over; not selected as an ongoing necessity where money is invested in technology to create long term studies and impact reports; proving the research was so important and should continue and grow beyond simple data points to truly solve the problems.

Podcast: Account Management and Research Methods of an Obvious Problem

Medical/Dental X-Ray Technologies

Problems:

  1. The process is painful for the patient and no anesthetic is offered. The myth: Beauty or Cosmetic Health is painful; or requires pain.
  2. The Technology is in black and white; as in, old, outdated, and does not provide a full color picture, using 360 degree images of what is really going on inside the body and the mouth.
  3. The images are produced similar to photographic negatives, which should be some indication that there is a problem with photography, or an advance needed to modernize with digital imaging.
  4. There have been warnings of radiation associated with cancer, causing additional equipment requirements and unnecessary or additional concerns for the patient, leading to a greater need for healthcare, showing its industrial commercialized intent to profit using threats/warnings. This can be viewed as near criminal with greater understanding.

The technician states they need to take a picture of the inside of the mouth or body to proceed with any medical or dental procedure (all dental procedures), meaning they need to look inside, just as they use their eyes to look inside for oral inspection or use their hands to feel the area and the patient’s response to human touch to assess painful areas. Humans need their own ability to look and photograph inside and decide for themselves, not to be the sole responsibility of the healthcare practice. This is unfair treatment of humans, in fact, the withholding of technology and information for a price, of which society has declined greatly and improved in some areas, but not enough to enable self awareness, learning, and care, with a specific level that makes professional healthcare intervention or use necessary.

Dental still uses metal objects; as does women’s healthcare for pelvic examinations. These are painful processes, where thin plastics provide more comfort or no entrance necessary at all to conduct procedures, such as checking bodily fluids.

There are other means of collection, where internal human contact or contact with metal objects is not required. It seems there is a standard use for medical tools that requires an update, as well as an update to human health understanding of the necessity and their ability to assess, communicate, and receive the prescriptions necessary to treat symptoms or diagnosis. This requires humans to learn more about their health and rely on their abilities to assess, monitor, and treat, using over the counter options, and seek professional healthcare options when over the counter products do not work. This seems to be the large money maker in healthcare; prescriptions, of which few companies have perfected their products and continue to make large amounts of money, gripping more than half of the population. Statistics will not be provided to prove this point.

Human Awareness:
Pain Relief comes at a price, held hostage by Consumerism and the Healthcare Profession; Self Learning, Care, and Management have been delayed for years because it is commercialized and industrialized. Heavy manufacturing of the decline in human health because of the glamorization of the healthcare field, leading people to believe they are not capable of taking care of themselves without a Doctor, or limiting their abilities, isolating problems for resolution at a licensed practice at a high cost, now a regular function of human society.

When dental problems become visible and too painful to be resolved by over-the-counter products, such as basic pain relievers, patients seek dental treatment, while others visit regularly for cleanings, where very invasive and painful objects are used, similar to sanding down a piece of furniture. More over-the-counter products are becoming popular, such as teeth cleaning, gum tools, dental floss, and more, advertising does not market the products together in a system of adequate dental problem prevention. Products are sold individually, at the patient’s or buyer’s discretion for use. Dental procedures can be costly, and healthcare premiums high, as well as very painful, even traumatizing, with most reporting what seems to be a near-death experience just to feel well. Parents are guided by marketing, advertising, and their personal visits and discussions with Doctors. The internet is available but has not been put through an organized test of adequate system management tools for human use; only there as an informational, still with much human hesitation and reliance on professional opinion; forced at a high cost in many places.

Freedom, human choice and economic status seem to be the determinate.

Something must change. Not only must dental and medical imaging procedures advance, but patients must be provided a self imaging, self assessment ability, along with appropriate or adequate over the counter prevention and relief. Black and white photos are no longer impressive, nor are metal objects of scraping to remove plaque and tarter buildup or to check the internal fluids of women and men.

While scraping procedures are optional for people to do themselves, many rely on the dentist because of what has been presented as a professionally licensed skilled office, even though patients can perform most of the same tasks themselves, if not all. Advances have been made to provide materials to patients to create their own partial teeth and relieve their pain, as well as prevention tools for things such as gingivitis, or periodontal disease, all of which are either preventable or delayable without long term professional dental treatment, as it is currently being sold.

Some angles (like personal hair cutting) are just not possible with just one person; requiring professional services, often because of skill, competence, willingness, and the way it has been sold or presented. Getting your hair done professionally is popular, as is/was plastic surgery. Cosmetic approaches differ from procedures necessary for healthy human functioning, of which, no human is empowered with an organized monitoring system to know what they need, what they need to change, or what they can do to prevent, delay, or at what point professional licensed intervention is necessary.

Are patients being mistreated and overcharged for painful processes that use low quality tools, procedures, and technology? The answer is yes.

Technology Solution: 360 Mouth Photo with Dental Care Application
They can use it from home with a smartphone application that can effectively scan a mouth and provide a view inside their mouth. Show them regular images of growth and change, as well as any areas early on that are not being well taken care of, or are decaying. With an application, people would be able to monitor the progress of their mouths and receive better training on specific techniques for brushing, flossing, monitoring, and managing growth and change, as well as discoloration, and even possibly pain.

Such a technology application should provide associated products available over the counter for specific reasons to improve patient or human understanding of dental care and product use, as well as specific metrics or statistics for product management, by both the buyer and the product developers (all parts of the product, including the technology systems itself). It should also help to monitor all records to be kept in human’s possession, not as the sole responsibility of the dental office. Patients (humans) should have anytime access to their records and be able to conduct their own annual, semi-annual comparison, not by ‘connecting’ the app to a dental office (the record holders) but by truly enabling humans to create and keep their own records.

Students in elementary school should be able to use it and trained to keep it, thus giving back the power to the people to manage their own dental care, records, and learn better with lower cost options.

In more complex or difficult cases, where surgical procedures are required, human’s should have the tools that enable them to know and understand that such procedure is required without a licensed professional examination, in that, they should know when they’ve reached the point of need for extraction, or a procedure they cannot do themselves.

Dental as a ‘service’ can still be an option for those who cannot manage their own, or believe that they are better cared for by a dentist, but they need to understand the level of care is greatly lacking for the price, as is technology, chosen types of tools used (metal), and the painfulness of the processes without availability of pain relief, or even the suggestion of pain relief preparedness before arrival at the dentists office.

Medical Technologies:

Liquids, fluids using metal collection or needle collection for lab analysis, again is painful and often unnecessary, or could use a kinder, gentler means, but greater human understanding must become top priority, for self-awareness, monitoring, and symptom management using what is available, along with professionally written advice with associated products in an application, not on the vast array of options that the Internet (WebMd and others provide). Again, patients need their own record-keeping ability to learn and understand how they manage themselves, using prevention, and awareness, without seeking symptom and diagnosis from a professional. They should understand at what point they need to seek professional care and those should be clearly understood and available in a standard human health system.

When women learn that they go to the doctor to be ‘raped’ by a nurse practitioner or doctor to ‘see if their vagina’ is okay, then humans become more empowered and aware of what is happening to them. With better information systems and monitoring applications, they can self-assess and seek their own treatment for basic health. Anything advanced that they cannot handle from over-the-counter means should be tracked, monitored, and self-managed with their own ability to keep records, not at the mercy and power of the licensed professional. This is what causes a heavy reliance on professional services where clearly tools, procedures, and technology do not even come close to matching the price and level of pain associated by just being examined, questioned, warned, and often mistreated, and misdiagnosed.

Education and the Social Security/Retirement System are dependent upon healthcare, when one does not adequately inform and prepare another.

The use of metal objects, security devices, and more shows very similar processes to criminally based systems, which should give some indication that things must change; or humans must advance in their understanding.

Unfortunately, freedom has allowed human sickness to reside behind closed doors, without bathing, without rules, and without a means to instill human health consciousness and cleanliness. Those are the humans that cause sickness across the nation, as does their freedom to have children, work in public and private office buildings, and live in their own sickness, prowling around online and using their offspring to continue their cycle of neglect, making the healthy sick.

Technology Controls

Limiting or ‘manipulating’ the interests of viewers, readers, listeners, and skewing thoughts and ideals using bad business mentality, where there is a price for attention, pretty pictures, and likeability. Why should you or I be paid to read my book or listen to me speak? Education is not free; we are not in elementary school or highschool anymore.

My podcasts are always free.

About

This is just a short excerpt for the about page.