Porosity 9 (PO-9) Card

DBD Cornucopia > Deck > Porosity > 9

Card Details - Nine of Porosity

Abbreviation

PO-9

Card's focus

The focus of this card is transferability

Threat to claimants

Muhammad conceives no way for claimants to selectively transfer, export, send or otherwise move data already in the system to someone or somewhere else, and/or the data is only made available in unstructured formats

Image of Porosity 9 card

Threat to claimants

Muhammad conceives no way for claimants to selectively transfer, export, send or otherwise move data already in the system to someone or somewhere else, and/or the data is only made available in unstructured formats.

Some examples of how this threat could lead to harms (negative effects on claimants)

The design recommendations and implications relevant to the card are listed below in the next section, but even those can be somewhat abstract and difficult to think about during practical day-to-day implementation. Therefore, some example harms are provided to complement the more formal research outputs. These examples are unique per card, and are only published on these web pages (i.e. in no other project outputs).

  • Claimants cannot copy Journal messages to someone else, making it difficult to get help from a third party
  • Claimants cannot export their complete JobSearch history, needed to help prepare for their next employment interview

The examples are to help understand the threat on the card, not to suppress thinking and innovation. Incorporating these examples exactly, or closely matching ones, should be scored down when playing DBD Cornucopia as a game.

Applicable design recommendations and implications

These are reproduced here from Research Briefing NO2. Multiple cards reference each design implication.

Support claimants’ own ecosystems

  1. Generate structured data for visibility and re-use by claimants and other actors
    Provide, signpost and explain functionalities to span the fullest range of claimant activities, so as to reduce the need for and use of messaging/chat interactions (like the UC Journal) which result in unstructured data. Ensure the structured data enables re-use to increase wider ecosystem efficiencies: provide for recording and keeping full records of every interaction by every channel (including files, form submissions, all communications), and provide methods to ensure information can be found and referred to, and easily exported or shared with others as required.

Acknowledge claimants as people in digital design

  1. Ensure system and state accountability to claimants
    Equalise accountability between claimants and the state. Promote a sense of fairness by enforcing an expectation that service level standards for actions and response times should be similar to those expected of claimants, with related penalties not disproportionately, or only, affecting claimants. Provide tools/methods for claimants to easily check, query and challenge actions and decisions.

Embrace a wider ecosystem and fuller claimant activity viewpoint for digitised public services

  1. Legitimise extensibility and customisation of digital infrastructure
    Deploy technology in ways that will permit, support and advocate integration with digital welfare by other actors. Provide timely, free and open access to system information, supporting content, and details of upcoming changes and updates to support these efforts.

Design systems which support the division of labour with claimants' ecosystems

  1. Integrate accurate specific and contextual primary guidance about making claims within systems and promote secondary professional assistance
    None
  2. Expand claimant autonomy, control and choice, backed up by transparency of actions and activities
    Enable claimants to better engage with digital welfare and empower them to make their own choices and decisions. Attribute information sources, other advice and decisions; build in logging and audit trail generation; provide access to records of what information was used to make choices/decisions and by whom; provide mechanisms for claimants to question, discuss and challenge actions, provide feedback, and make complaints.

Design to assist claimants across the full span of their own activities

  1. Recognise and promote the synergistic effects wider ecosystems can offer claimants
    Networks of actors and instruments contribute gains to claimants unrelated to the social protection payment public service, yet can contribute to improving people's lives. Ensure the integration of other actors is not purely transactional, but also provides opportunities to explore other beneficial aspects.

Signpost when additional assistance should be sought and recognise the time and effort needed to complete these activities

  1. Indicate to claimants when professional advice is crucial
    Some activities undertaken to receive a social protection payment award require much more specialist knowledge and experience than most citizens have; such involvement can counter complexity to avoid becoming overwhelmed; increase visibility of when claimants should check whether advice can help by highlighting higher-risk parts of the process; avoid overly simplifying processes which can hide the underlying and necessary complexity of making and maintaining a claim and thus discourage seeking knowledge and experience in the wider ecosystem.
  2. Reduce barriers for claimants to seek assistance and allow time for this to occur
    Provide pointers to claimants where they can obtain independent professional help ensuring there is always a choice of communication channels and sources, whether by self-service or from elsewhere in ecosystems. Avoid deadlines which limit claimants' opportunities to access assistance, providing sufficiently long periods for activities to include these actions if required.

General Notes

Card values (i.e. '9' for this card) are for game play and are not correlated with the severity of harm. This is because threats cannot be ranked directly since they can affect individuals in different ways due to situations and circumstances, or affect fewer or more claimants, or the harms can arise in claimants' support networks and wider society.

The threat description uses a person's name as the "attacker" (i.e. 'Muhammad' for this card), which can be thought of someone involved with implementation. They could have any role which influence digitisation. So they could be a database administrator, or a copy writer, or a quality assurance specialist, etc, or all of these. Everyone could have some influence on the claimant threat described. The names were randomly selected from those currently most popular as given names for boys and girls (UK Office for National Statistics).

The example harms provided are drawn from the research data (which explored not only parts of existing services but also the effects of possible changes to those), from the author's own knowledge of web application development and testing, the author's own experience of helping citizens to claim Universal Credit (UC) and Personal Independence Payment (PIP), and from suggestions submitted by other people (make a suggestion). The threats and example harms do not necessarily exist in the current UC or PIP deployments or in ecosystems around those services, but they might well do.

All the cards in this Porosity suit are:  2  3  4  5  6  7  8  9  10  J  Q  K  A 

The other suits in the deck are: Scope, Architecture, Agency, Trust and Cornucopia (plus Jokers).

'