Blog 8

Brainstorming possibilities for a design response

During the week 6 class exercise each member of our privacy group discovered the specific direction that they wanted to pursue in regards to their design proposal, each member of the group had a similar motivation behind their chosen research problem, these motivations are all either related to or heavily linked, the purpose of developing Technologies or educational infrastructures that allow the security of personal data to become synonymous with the digital age. This is the most useful when trying to refine the demographic each member was going to focus on, even though digital privacy effects everyone device to connect to the Internet, each Target group has very specific and quite segregated privacy issues.

IMG_0221.JPG

Using the IDEO methodology my issue can be analysed by the following measures.

Who does the problem affect?

  • Internet Users
  • Multi National Corporations
  • Tele Communication Giants
  • Governments
  • Intelligence Agencies
  • Educational Institutions
  • Private and Public Users

What are the causes of this issue?

  • Media
  • Security Fears
  • Prejudice
  • Technology
  • Advertising and Marketing
  • Private Interests
  • National Security

When does it occur?

Online privacy has been a continuous and ubiquitous practise that has slowly been transformed by the information technology age, with the internet and wireless communications, the issue is occurring on every phone,PC and smart  device that has access to the internet.

Where does the problem occur?

The problem takes place on your personal devices, any place where data can be stored, whether it is online or in a digital cold storage locker, the issue is present.

Why is this issue important?

The issue is directly linked to our personal freedoms and choice of anonymity, as law abiding citizens, we should be allowed to exist without persecution from the public, using someones private data accessed online is just as serious as personal material theft. Whilst there is no focued age demographic for these proposals, the emphasis of these security measures is likley to effect the 16-40 age groups, these groups spend the most time using social media and staying connected online, making them the most succeptable to data theft or exposure.

Some insights that were found due to this exercise was that there is a heavy amount of emphasis placed on the affect that privacy has on the individual user as opposed to a large-scale corporation or political entity, most people when they hear about digital privacy and data security assume that anyone outside of a business or government environment is someone that should be concerned about the welfare of their personal information. Whilst there is a large amount of concern for the individual user in regards to keeping their personal information secure, we have to consider the implications of government intervention when it comes to surveillance and security for there are certain businesses that can be minor or major that still deserve the same levels of personal privacy and anonymity if they so choose.

My chosen problem statement that was developed during the class was dealing with copyright and creative claims, this is a very singular nuance of privacy, due to the fact that most designers, creatives, business men and women at some point have published or placed into the digital sphere large amounts of their own creations. Personal artwork design projects are uploaded onto the Internet using any social media, you are vulnerable to the creative theft of these ideas or images, this practice of manipulating fabricating work from others is very difficult to prove from a legal stand point, especially when a small time freelance artist is going up against a large scale industry that has deliberately extracted components of their work to use at the corporate level. Creative theft is something that occurs often in the design world, and whilst there are measures to ensure your work cannot get directly stolen, that does not stop people manipulating their own version of your work to look nearly exactly the same.

The following is a part of 5 possibilities for my chosen problem statement:

1. Developing a online creative data locker to upload projects, ideas, or for anything that requires copyright or patent claims, and have them be digitally time-stamped, watermarked and encrypted so if someone ever tried stole work, their would be evidence to prove who was the original owner.

2. Another system that could be developed would be a creative surveillance application businesses would be required to use so that them and their employees search history could be monitored, and then any creative output or collateral produced by that company could be cross checked with the sources that they had visited to make sure that they had not stolen, or fabricated any product they’re trying to sell.

3. 1 generative data way I could help identify when plagiarism of copyright infringement has taken place, would be a system that is similar to the “turnitin” app, however this system would go through a process of peer review and then administrative review, this could take place on large-scale portfolio websites for design blogs where users can post images either that they have created or taken from others and then subjected to a rigorous process of scrutiny to see whether the artwork was original or not.

4. Another system that could be implemented that could help control the fabrication of original art works would be, adobe Creative like app that can use mathematical algorithms to see if the user has imported elements or color pallets from local or online sources and cross check them with others found online, like when a font is illegally used an algorithm based on that particular fonts curves and weight can be calculated by a Optical Character Recognition, would allow the creative app to not allow the user to export any content due to the percentage of originality.

5. My final countermeasure for online content theft and creative copyright, is to have each file be embedded with an invisible and traceable code or data that has the ability to leave a digital fingerprint to all those who have touched it, like someone leaves a fingerprint on a glass at a crime scene a similar print left by a computer on a file that has been downloaded or copied or even viewed.

6. One other visualisation practise proposal that i had was to have photograph placed in a space, for example an image of a Michelangelos David, and in this space each person can interact with the photograph by taking a piece of the photo and moving it to another canvas. In principle the exercise places intellectual property into the hands of a stranger and then makes their task to re build the photograph without communicating with each other, this puzzle like photograph will then look completly different in the second canvas, illustrating the point that if dozens of people have access to your information, there is no telling what kind of online profile you will end up with.

 

IMG_0219.JPG

My Chosen proposal based on the findings of the class exercises and the development of my online privacy research throughout the semester, has brought me to a point that I would like to pursue and develop potential strategies into approaching the creative theft and digital manipulation of personal ideas in the online and offline communities. Considering the nature of the students that are studying this course most, at some point in their life, if not already will deal with a business, or a client that will unfairly represent their work on their ideas in a fashion that is not attributing them as original owner with the proper credit.

My response to the problem statement was too explore the possibilities of a digital recognition system that can collate large amounts of visual data that can compare when images have been replicated, manipulated or derived heavily from another source. This app would be a complicated piece of software that could extract data from files created by businesses and designers and then cross referenced to other images of videos on the web. One part of this system would be better user tries to create a piece of artwork does heavily derived from resources found online the system would simply not allow the user to export data file into a usable document, this would all be measured by a percentage system that allows the user to know that their artwork or idea or visual creation, has not met the standard of original publications.

Copyright theft and creative theft can be very difficult to prove, considering the vague legality’s that surround this particular component of intellectual property, the more comprehensive system should be in place to stop the constant replication and Fabrication of ideas by parties to simply profit off others hard work without crediting. Whilst watermarks have come a long way in helping secure photographs and other large images, it is very difficult to secure design components and visual elements when one is trying to sell them as a product.

Fonts are a good example of how difficult it is to secure the rights to a piece of intellectual property, while they do have Optical Character Recognition software to detect them, there are still ways around this. Personal data comes in many forms, and creative types and designers and all those who spend their lives with artist pursuits, rely on the ability to create ideas or designs with the expectation of being paid for them, which is why I feel like a system that could help secure the individual creator and user from the huge amounts of piracy would be a huge step for online data security.