Architecture 6 (AR-6) Card
DBD Cornucopia > Deck > Architecture > 6
Card Details - Six of Architecture
Abbreviation
AR-6
Card's focus
The focus of this card is messaging overuse
Threat to claimants
Louis forms the system with a reliance on internal or external messaging (e.g. chat, email) to accomplish some or many claimant-related activities, instead of providing dedicated features, leading to more unstructured data
Threat to claimants
Louis forms the system with a reliance on internal or external messaging (e.g. chat, email) to accomplish some or many claimant-related activities, instead of providing dedicated features, leading to more unstructured data.
Some examples of how this threat could lead to harms (negative effects on claimants)
The design recommendations and implications relevant to the card are listed below in the next section, but even those can be somewhat abstract and difficult to think about during practical day-to-day implementation. Therefore, some example harms are provided to complement the more formal research outputs. These examples are unique per card, and are only published on these web pages (i.e. in no other project outputs).
- Claimants may have to undertake certain activities only once or very infrequently, and thus do not know (or do not remember) if or where there is a feature implementing the activity, so regularly fall back to use messaging instead which adds steps and delays
- The only way to complete some activities necessary to maintain a claim are by using messaging, because no digital functions have been built to cater for it
- Without separate functionality, it is difficult to track all the actions undertaken in the unstructured chat data, undermining claimant engagement
The examples are to help understand the threat on the card, not to suppress thinking and innovation. Incorporating these examples exactly, or closely matching ones, should be scored down when playing DBD Cornucopia as a game.
Applicable design recommendations and implications
These are reproduced here from Research Briefing N
Support claimants’ own ecosystems
- Generate structured data for visibility and re-use by claimants and other actors
Provide, signpost and explain functionalities to span the fullest range of claimant activities, so as to reduce the need for and use of messaging/chat interactions (like the UC Journal) which result in unstructured data. Ensure the structured data enables re-use to increase wider ecosystem efficiencies: provide for recording and keeping full records of every interaction by every channel (including files, form submissions, all communications), and provide methods to ensure information can be found and referred to, and easily exported or shared with others as required.
Reduce claimants’ interaction burdens with digital welfare
- Provide full social protection services across wider interoperable channels
Ensure all service provision and modes of assistance (e.g., provision of advice, practical support and self-help guidance) are available through multiple interaction channels (e.g., telephone, web, mobile app) which are accessible to varying resources and capabilities (e.g., communication skills, equipment, language, physical and mental abilities). Permit the use and intermixing of channels without restriction. Consider providing on-demand synchronous interactions through digital as well as other channels.
Design systems which support the division of labour with claimants' ecosystems
- Expand claimant autonomy, control and choice, backed up by transparency of actions and activities
Enable claimants to better engage with digital welfare and empower them to make their own choices and decisions. Attribute information sources, other advice and decisions; build in logging and audit trail generation; provide access to records of what information was used to make choices/decisions and by whom; provide mechanisms for claimants to question, discuss and challenge actions, provide feedback, and make complaints.
General Notes
Card values (i.e. '6' for this card) are for game play and are not correlated with the severity of harm. This is because threats cannot be ranked directly since they can affect individuals in different ways due to situations and circumstances, or affect fewer or more claimants, or the harms can arise in claimants' support networks and wider society.
The threat description uses a person's name as the "attacker" (i.e. 'Louis' for this card), which can be thought of someone involved with implementation. They could have any role which influence digitisation. So they could be a database administrator, or a copy writer, or a quality assurance specialist, etc, or all of these. Everyone could have some influence on the claimant threat described. The names were randomly selected from those currently most popular as given names for boys and girls (UK Office for National Statistics).
The example harms provided are drawn from the research data (which explored not only parts of existing services but also the effects of possible changes to those), from the author's own knowledge of web application development and testing, the author's own experience of helping citizens to claim Universal Credit (UC) and Personal Independence Payment (PIP), and from suggestions submitted by other people (make a suggestion). The threats and example harms do not necessarily exist in the current UC or PIP deployments or in ecosystems around those services, but they might well do.
All the cards in this Architecture suit are: 2 3 4 5 6 7 8 9 10 J Q K A
The other suits in the deck are: Scope, Agency, Trust, Porosity and Cornucopia (plus Jokers).