Blog 10

During my week ten class, i expanded on some of the potential ideas and design proposals i had been researching since the mapping exercises, my concept has been slowing evolving to be focused on the measures and counter measures that are associated with intellectual property and data theft.

During the initial stages of my concept development i had a much broader target demographic, with internet being present in all mediums of communications and all age groups using devices, there was a huge range of potential for specific age responses.

After explaining to my group that i had been developing a proposal that would focus on intellectual property and the protection of creative content, the immediate response was to create a response using service design, which i was already planning on doing, however after going into more depth, my class mates said that i should try and make my proposal more engaging and less official/product focuses.

From this point i went into detail about how my secondary idea was to develop a system or some kind of data visualisation project that could help create awareness for those who use and continue to expose themselves online and agree to certain legalities without the proper knowledge. This would be a focus on some of the negative side effects of data exposure or online identity theft, and one method that i had talked about was to have a generative system that people could interact with.

For example, there could be a portrait (awareness focus) or a photograph of a piece of art (copyright focus), which would be placed in a public environment, each image would be broken into several pieces, like a puzzle, and then would allow each individual to take a piece and arrange it on another canvas. This is a good way to illustrate how online information can be manipulated by strangers, the results of this can provide the users with a visual insight into the complexities and problematic nature of having a digital profile and allowing people to have access to your private data.

Revised Proposals

Providing intellectual property security for digital creators or content developers that publish works into a digital environment.

or

Developing a system of information for the 18-35 group see the risks of online data theft and the measure on improving their security.

A service design app that has recognition software that uses visual and text based algorithms to calculate the originality of a piece of work, designers and businesses will use this app to verify the legitimacy of their content, and if they are using to much or their content looks to similar to another work it will not allow the user to publish or save the work.

A system that tracks every time someone makes a download or views a piece of visual content, and if that person re-posts or uses that information it will alert the user that their content is being re distributed.

A service design that translates scam emails/phishing/adds/pop/ups/ surveys and shows the original definition of the potential scammer and what the actual intentions are behind that attempt at your information.

A generative systems, that is a portrait of a person or a piece of art, and is situated in public spaces, individuals then have to place each piece of those images into another canvas and rebuild the image.

A rubix cube that has a portrait of an individual, and each main face has critical information on it, and can be solved to reveal the information, which can illustrate how easy it is to access someone information.

Final Proposal

My final chosen proposal is to create a service design that protects content creators from copyright infringement and online piracy. This service will be primarily used by people who publish digital or visual content often and want to retain a significant legal precedent over their work, the service will provide users with a system that compares their browsing history and previous published works against visual and text based archives to see if the work they’re trying to publish is derivative, this will then show a user in a pre publish screen i.e before you save a PSD document, if the document is original and not retaining identical content. This service also digitally encrypts the successful published files and uploaded it to this services data base, and provides the user with a choice of which creative license they want to apply to it.

 

Name of Service Design

Dominus- Application/Plugin

Issue

Copyright infringement and piracy have become rampant over the past decade, with illegal content existing in some medium on almost every single device, we begin to see an over saturation of the creative markets. There is now so much content to go through, a huge percentage uninspired or unoriginal, which is slowly destroying the industries of design, a big part of that is when a larger businesses appropriates the content of an individual user. My proposal is  a service that provides the knowledge and security of publishing digital or visual content online, embedded in adobes suits of programs, this service would allow the user to choose the kind of license they want and also check to make sure their content has no be stolen or imitated from another individual,.

Potential change 

This will give security from a legal standpoint for all content creators and publishers, and allow the appropriate accreditation for original works, this service will also remind those who create content that unless the proper resources have been referenced, your work can not be considered legitimate, and if a large business decides to imitate the work of a smaller user, there is a digital record proving that the content was published before

Design Executions

This app would have a series of different functions that would help the user publish works to an online clouds that would securely store and license the content, if every the legitimacy of a work of art is in question this service would have provided the evidence that would remove those claims. Similar to a reverse image search on google, and a font based search algorithm, this app would use functions similar to calculate the percentage of original content, and make sure that if a user had copied and pasted, or screen shot content or directly drag and dropped elements, that the user could not publish unless those elements had the appropriate creative commons.

 

Advertisements

Blog 9

Visual documentation of the brainstorming session

Week sixes brain mapping class was a good exercise to help refine each group members target audience, for online privacy is a broad subject that effects every person that has a smart device or is connected to a computer, however the individual issues and concern for each group are varied. My focus was on the specific creative parts of the community, those who rely on their design skills and creative aptitude to develop content are the ones who are vulnerable to data theft, designs, projects and ideas are intellectual property that can be stolen or manipulated into a end product at the consumer level for cheap because businesses dont want to pay.

IMG_0219

The image above is two of my final problem statements, the first being to do with intellectual property theft, and the second is due to personal data theft. The three other ideas on the page were potential problems that could be turned into statements, however this process is on going and a few elements from each problem may cross over to my chosen one so no potential problem has been removed yet.

IMG_0221

The second map is a greater breakdown of my chosen problem statement, this map has some important insights into the motivations behind the human stakeholders of my issue. Considering the nature of copyright and its prevalence in the design community, most map elements are related to the individuals.

untitled-1

The third map is a potential proposal based on the class exercise findings, each proposal has a critical function that can effect the way that we approach intellectual and digital property in an online environment, with copyright infringement and data theft being a rampant part of the world, it is important for individuals to protect their information using sophisticated and efficient technologies.

IMG_0228 The final image above is a compilation of my original problems that are associated with my specific issue, they have no Target demographic and no particular correlation to the chosen design proposal that I have expanded on in blog 8, however they are themselves very critical issues into exploring the nature of online privacy and to understanding the complexities of how data security can have an impact on Modern Day life.

One of the benefits of collaborating on group exercises is, we had the benefit of having someone outside our issue giving us Insights on how to pursue what they would consider important, when you spend weeks researching on particular topics you develop a personal bias towards what you would consider a legitimate source of research. Having multiple perspectives is what guided me towards my problem statement, and now i have the foundations to build on other particular ares of privacy interest. Each one of my previous potential problems was vetted b the group and they each felt like they all had interesting elements to them but as far as data visualisation and generative systems,  the copyright and data theft issue was one that held the most potential.

 

 

Blog 8

Brainstorming possibilities for a design response

During the week 6 class exercise each member of our privacy group discovered the specific direction that they wanted to pursue in regards to their design proposal, each member of the group had a similar motivation behind their chosen research problem, these motivations are all either related to or heavily linked, the purpose of developing Technologies or educational infrastructures that allow the security of personal data to become synonymous with the digital age. This is the most useful when trying to refine the demographic each member was going to focus on, even though digital privacy effects everyone device to connect to the Internet, each Target group has very specific and quite segregated privacy issues.

IMG_0221.JPG

Using the IDEO methodology my issue can be analysed by the following measures.

Who does the problem affect?

  • Internet Users
  • Multi National Corporations
  • Tele Communication Giants
  • Governments
  • Intelligence Agencies
  • Educational Institutions
  • Private and Public Users

What are the causes of this issue?

  • Media
  • Security Fears
  • Prejudice
  • Technology
  • Advertising and Marketing
  • Private Interests
  • National Security

When does it occur?

Online privacy has been a continuous and ubiquitous practise that has slowly been transformed by the information technology age, with the internet and wireless communications, the issue is occurring on every phone,PC and smart  device that has access to the internet.

Where does the problem occur?

The problem takes place on your personal devices, any place where data can be stored, whether it is online or in a digital cold storage locker, the issue is present.

Why is this issue important?

The issue is directly linked to our personal freedoms and choice of anonymity, as law abiding citizens, we should be allowed to exist without persecution from the public, using someones private data accessed online is just as serious as personal material theft. Whilst there is no focued age demographic for these proposals, the emphasis of these security measures is likley to effect the 16-40 age groups, these groups spend the most time using social media and staying connected online, making them the most succeptable to data theft or exposure.

Some insights that were found due to this exercise was that there is a heavy amount of emphasis placed on the affect that privacy has on the individual user as opposed to a large-scale corporation or political entity, most people when they hear about digital privacy and data security assume that anyone outside of a business or government environment is someone that should be concerned about the welfare of their personal information. Whilst there is a large amount of concern for the individual user in regards to keeping their personal information secure, we have to consider the implications of government intervention when it comes to surveillance and security for there are certain businesses that can be minor or major that still deserve the same levels of personal privacy and anonymity if they so choose.

My chosen problem statement that was developed during the class was dealing with copyright and creative claims, this is a very singular nuance of privacy, due to the fact that most designers, creatives, business men and women at some point have published or placed into the digital sphere large amounts of their own creations. Personal artwork design projects are uploaded onto the Internet using any social media, you are vulnerable to the creative theft of these ideas or images, this practice of manipulating fabricating work from others is very difficult to prove from a legal stand point, especially when a small time freelance artist is going up against a large scale industry that has deliberately extracted components of their work to use at the corporate level. Creative theft is something that occurs often in the design world, and whilst there are measures to ensure your work cannot get directly stolen, that does not stop people manipulating their own version of your work to look nearly exactly the same.

The following is a part of 5 possibilities for my chosen problem statement:

1. Developing a online creative data locker to upload projects, ideas, or for anything that requires copyright or patent claims, and have them be digitally time-stamped, watermarked and encrypted so if someone ever tried stole work, their would be evidence to prove who was the original owner.

2. Another system that could be developed would be a creative surveillance application businesses would be required to use so that them and their employees search history could be monitored, and then any creative output or collateral produced by that company could be cross checked with the sources that they had visited to make sure that they had not stolen, or fabricated any product they’re trying to sell.

3. 1 generative data way I could help identify when plagiarism of copyright infringement has taken place, would be a system that is similar to the “turnitin” app, however this system would go through a process of peer review and then administrative review, this could take place on large-scale portfolio websites for design blogs where users can post images either that they have created or taken from others and then subjected to a rigorous process of scrutiny to see whether the artwork was original or not.

4. Another system that could be implemented that could help control the fabrication of original art works would be, adobe Creative like app that can use mathematical algorithms to see if the user has imported elements or color pallets from local or online sources and cross check them with others found online, like when a font is illegally used an algorithm based on that particular fonts curves and weight can be calculated by a Optical Character Recognition, would allow the creative app to not allow the user to export any content due to the percentage of originality.

5. My final countermeasure for online content theft and creative copyright, is to have each file be embedded with an invisible and traceable code or data that has the ability to leave a digital fingerprint to all those who have touched it, like someone leaves a fingerprint on a glass at a crime scene a similar print left by a computer on a file that has been downloaded or copied or even viewed.

6. One other visualisation practise proposal that i had was to have photograph placed in a space, for example an image of a Michelangelos David, and in this space each person can interact with the photograph by taking a piece of the photo and moving it to another canvas. In principle the exercise places intellectual property into the hands of a stranger and then makes their task to re build the photograph without communicating with each other, this puzzle like photograph will then look completly different in the second canvas, illustrating the point that if dozens of people have access to your information, there is no telling what kind of online profile you will end up with.

 

IMG_0219.JPG

My Chosen proposal based on the findings of the class exercises and the development of my online privacy research throughout the semester, has brought me to a point that I would like to pursue and develop potential strategies into approaching the creative theft and digital manipulation of personal ideas in the online and offline communities. Considering the nature of the students that are studying this course most, at some point in their life, if not already will deal with a business, or a client that will unfairly represent their work on their ideas in a fashion that is not attributing them as original owner with the proper credit.

My response to the problem statement was too explore the possibilities of a digital recognition system that can collate large amounts of visual data that can compare when images have been replicated, manipulated or derived heavily from another source. This app would be a complicated piece of software that could extract data from files created by businesses and designers and then cross referenced to other images of videos on the web. One part of this system would be better user tries to create a piece of artwork does heavily derived from resources found online the system would simply not allow the user to export data file into a usable document, this would all be measured by a percentage system that allows the user to know that their artwork or idea or visual creation, has not met the standard of original publications.

Copyright theft and creative theft can be very difficult to prove, considering the vague legality’s that surround this particular component of intellectual property, the more comprehensive system should be in place to stop the constant replication and Fabrication of ideas by parties to simply profit off others hard work without crediting. Whilst watermarks have come a long way in helping secure photographs and other large images, it is very difficult to secure design components and visual elements when one is trying to sell them as a product.

Fonts are a good example of how difficult it is to secure the rights to a piece of intellectual property, while they do have Optical Character Recognition software to detect them, there are still ways around this. Personal data comes in many forms, and creative types and designers and all those who spend their lives with artist pursuits, rely on the ability to create ideas or designs with the expectation of being paid for them, which is why I feel like a system that could help secure the individual creator and user from the huge amounts of piracy would be a huge step for online data security. 

 

 

Blog Post 7

Issue mapping Class Exercise Part 1

During our issue mapping collaboration exercise in class with other digital privacy  groups, we established that most students that chose to research online privacy did so due to the nature of the increasingly prevalent consequences of un unchecked government intervention and surveillance can have on private citizens. Almost every member of the collaborative group had a particular insight or story to tell that they had heard or researched in regards to a substantial online privacy event.

These incidents were events such as the Australian Cenus Survey hack, Edward Snowdens testimony and revelation of confidential informations in regards to the CIA’s illegal operating capabilities, and Julian Assanges Wiki leaks episodes. Some students even had personal stories about friends or acquaintances that had had experienced some level of data invasions or information theft or misconduct. Using each individuals personal insights and levels of understanding of this issue, we were able to construct our 100 words and relevant stakeholders map without any difficulty.

The most interesting part of these task was how the majority of other students reacted to certain words, i think these kind of insights go to show the stigmas that are associated with certain issues. Every time a major public event or piece of media is released to the public about any given issue, the psychology behind their expectations of the legitimacy of that issue is in question, especially when dealing with an issue that has everything to do with the legitimacy of multimedia and information transformation.

Some of our most highlighted words were, “National Security, Cloud, Identity Theft, VPN, Hacking, NSA, CCTV, Silk Road and the Dark Web”. I would speculate this is due to how much over the past several years has been published on these particular words. With the NSA targeting Edward Snowden, and the multiple cyber attacks on the U.S as well as Australia has led to a precedent of fear when regarding these issues. However the most noticed work was the Dark Web, i would make assumptions of this word being more significant because of its mysterious nature and uncertainty, the dark web sounds like some kind of illuminati when in reality its a sub layer of internet that is just below the surface of every user.

I think that during the mapping class more students began to understand the various complexities of each issue based on how from a research perspective these issues are projected, i think one additional method that could be successful in the future to help explore and understand complex social issues would be to have each student find one positive event surrounding their issue and one negative one, and then see how each student reacts to that event with a rating scale to indicate whether or not they agree with the parameters placed on it.

Below i the images taken in class in regards to the mapping exercise plus a small infographic  made for the words, surreal poem and expanded word system tasks.

ISSUEmapping

Issue mapping Class Exercise Part 2

For the second part of our issue mapping i think each group has begun to establish a deep understanding of the various complexities and lengths that their issue can have, the increasing depth of the stakeholders breakdown is a comprehensive method of finding duality in each character involved. Each issue has its own stigmas attached to it, and by the same standard each stakeholder should have their opinions on the legitimacy of those stigmas, for example, a private user that uses a VPN may be considered by the government as untrustworthy or give cause for reasonable doubt because of their secretive nature, however most individual and private users would argue that as law abiding citizens they have the right to personal freedoms one of which being able to choose to have a private or public lifestyle.

Breaking down the steak holder again into human and non human groups is a concise method of extracting opinions on each issue, for a lot of non human stakeholders such as larger corporations and multimedia enterprises posses the opinion that the freedom of information shouldn’t be limited due to public privacy concerns, however the individual human stake holders that are apart of those industries and businesses would have a much more distinguished opinions from those of large established entities. IMG_0211.JPG

In the image above you cay see a more focused breakdown of some of the stakeholders involved in these issues, and appearing in each section you can see both the positive and negative parties associated with each focus group, for example the personal users section has individuals, families, and hackers. Each one of those sub groups has their own expectations of policy in regards to privacy, the opinion of a hacker would be in total disregard of government regulation of internet security, yet a family would probably be more inclined to understand the position of the government compared to the hacker.IMG_0210.JPG

Some of the debates that can arise due to investigating these issues at a greater depth is to understand that the issue that me be prevalent in certain focus groups, usually has a much larger and broader conflict. For example, there are some people out there who believe that complete subservience to the state is the only way to have an effective government, also know as totalitarians, these types of people would agree that the regulation and restriction of privacy is a better way to ensure privacy, however if you compare those people to socialists, you would see the argument that community based decisions and smaller scale government is the most effective way to respect the individual citizens rights.IMG_0209.JPG

The focus issue is another measure that can help identify the nuances of a particular issue, once we had expanded on the system around the ABS census, we started to realise that there is much more diversity amongst both sides of the arguments that you wouldn’t have considered before. These types of different motivations are good starting points to execute focused surveys and interviews, for the opinions of each member of a focus group may not be aligned with their respective party, for example if you were to research the ABS’s reasoning behind the Census, you would find that the information gathered will help identify were money should be allocated and dictate budget spendings, yet if you asked a member of one of the major political parties, one would tell you it is to investigate Australians, and another would say to keep you safe.IMG_0212.JPG

The final part of the exercise that was in important part of understanding the issue was to see the Actors in controversy spread across the issue in question. This is a perspective that i would have never thought of trying to research due to how focused it is on only one particular component of my issue, seeing all the different elements that influence the issue is quite informative, there are more significant components of even one debate topic that i would have predicted, to see the emotions on each side of the issue can give a more empathetic understanding of the opponent and perhaps even a channel of communications that can help come to a resolution of an issue. IMG_0213.JPG

The following images are an increased insight into the breakdown of the actors involved in the ABS census issue, the actors template can show how one object or component of an issue will react when placed in a particular environment, for this example we see some of the moral codes and operating practises that the ABS has in regards to the census, some of these elements actually have more in common with those who would stand against the issue that those who were for it.IMG_0214.JPG

 

 

 

 

 

Blog Post 6

Web Scrapes: Reddit, Twitter, Huntonprivacy

My chosen social media Platforms for my data analysis and web scrapes are Reddit Twitter and hunton privacy blog. The first platform i will discuss is reddit. Reddit is a message board wherein users submit links. What differentiates it from a real-time information network like Twitter, Facebook or Instagram, is that the stream of content is administered by the community. Posts that are considered to be significant are upvoted, and those that are not are downvoted. This will determine where each post is positioned on the site, this results in the most popular posts being made of the front page, which is seen by hundreds of thousands of people.

Reddit has its own personalised advanced search tools, apart from that standard word or phrase search, Reddit has a more detailed search terms, such as the following.

use the following search parameters to narrow your results:

subreddit:subreddit
find submissions in “subreddit”
author:username
find submissions by “username”
site:example.com
find submissions from “example.com”
url:text
search for “text” in url
selftext:text
search for “text” in self post contents
self:yes (or self:no)
include (or exclude) self posts
nsfw:yes (or nsfw:no)
include (or exclude) results marked as NSFW

Theses parameters allow you to extract who posts on Reddit from other websites, for example if you want to find posts from a particular website you can, this allows for a deeper insight into how blog posts and articles can be circulated around the web, and how some gain more traction than others. The main search parameter that is used however to get target results is the selftext: parameter, this search tool also show you the different categories in which the data had been distributed into.

flow-chart

From my Reddit search i found 1,842 different post broken up into each of these categories.Each category listed below has in an in depth subreddit system that is filled with a varying amount of results in regards to my search parameters, when I chose to arrange the post by the amount of comments just on page 1, I found the total number of comments from the popular articles reaching over 39759. What makes the reddit system so unique is the nature of transitioning posts is entirely built on the legitimacy of the author, that combines with the interesting upvote component of this system is that  current events May push a post higher because it’s relevancy has increased due to a connected event in  the real world.

CaptureCapture1

  1. /r/autotldr (470)
  2. /r/personalfinance (223)
  3. /r/legaladvice (189)
  4. /r/techsupport (149)
  5. /r/nosleep (104)
  6. /r/relationships (81)
  7. /r/metalgearsolid (68)
  8. /r/sysadmin (65)
  9. /r/Bitcoin (63)
  10. /r/dirtypenpals (60)
  11. /r/DarkNetMarkets (59)
  12. /r/ITCareerQuestions (59)
  13. /r/cscareerquestions (56)
  14. /r/AskNetsec (53)
  15. /r/conspiracy (52)
  16. /r/unitsd8u (51)
  17. /r/freedonuts (45)

One methods that could be used to visualise this data, would be to break down how many  up-votes each post got and the related it to Morse code patterns or binary patterns. You could select several different posts and then use the number of up votes and translate that number into binary, i feel like this could be an interesting way to show how data could be represented if it was portrayed in a language that is detrimental to that information existing in the first place. The idea of having visuals symbols such as Morse code is also a visually engaging concept, for the idea behind Morse code was to communicate large distances only using a combinations of long and short light or sound signals. This idea show how even though we have incredibly sophisticated methods of communication, we could still use older methods now and they could be interpreted as symbols to text.

Web Scrape Twitter

For my second chosen multimedia platform I chose the more obvious alternative for my web scrape and decided use Twitter. Based on the information that we were given in the lecture and the quick workshop that we were given in class, the embedded data extraction system that is set up between Google documents and Twitter allows someone to very easily archive large sets of information without having to independently import each data set into spreadsheet. One reason why Twitter is also a good platform to correlate data in regards to certain social issues, is because the results that you can attain from observing certain Twitter patterns are similar to the amount of quantitative data that you can get from a survey, quite often people, when completing surveys are answering questions from an interviewer, there is a temptation to embellish or bend the truth perhaps because there may be an agenda present. Which is why its a fantastic platform to get an array of opinions without having to let that person know that you were interested on their perspective on these social issue, allowing you to avoid bias or prejudice.

Twitter has some interesting search functionality,  below is listed the main features that this particular app utilises. Twitter allows you to send and read other users updates or messages,messages are limited to 140 characters, you can send and receive updates via the Twitter website, SMS, emails or a third party application, and finally You can restrict delivery to your circle of friends and you can search for people by name or user name, import friends from other networks, or invite friends via email. Twitter also has an advanced search option this allows you to search certain phrases, exact words or certain hashtags that could directly related to your particular interests, using this advanced functionality you can also limit your search to accounts and posts that mention other specific accounts, this is a good way to find out if certain twitter accounts are posting consistently on a particular issue.

flowchart1

The data that i found from the twitter archive search was comprehensive to say the least, from my own refined search parameters i was able to find 279 tweets about online privacy in the past week, and that was using online certain phrases. The amount of data that has been collected has been overwhelming, the amount of posts have reached in total based on my search spreadsheet is 1,859,876 people, which is the total combined number of followers linked to each post. The average user has 6914 followers in regards to this post, which means comparatively to blog searching and other articles based posts, the ability to reach millions of people through this micro blogging app can prove to be incredibly effective. I think one of the most interesting parts of this search is to see the occupation of each twitter account, this kind of information is important when trying to understand the expectations of those accounts in regards to certain issues, whether someone may or may not be more inclines to re tweet a post based on their own specific account information.

One interesting visual style that you could represent this data would be to use the related bird theme that is associated with twitter, and use that theme to create a comprehensive date set on online privacy. You  could do this by recording what each tweet has said and then extract the sounds waves of what each tweet looks like visually, i think that this could be a really engaging method of data visualisation, and it could show some similarities in the patterns of thought that people have in regards to these kinds of issues.

Capture.PNG

Scraping the web for data: Huntonprivacy

For my web scrapper i decided to scan a very prolific legal services firm called Hunton & Williams, they are a legal firm for a range of issues one being internet privacy and the future of online security, on particular component of the site is their blog called huntonprivacy and they post in depth articles about current events globally and new information in regards to digital privacy. This scrape allowed me to gather information quickly about the history of online privacy over the past several years, and then to be able to collate that data into a small info graphic that allowed for some insights into the patterns of information posted about these issues.

The main purpose of Hunton & Williams LLP’s  is to provide experience, breadth of knowledge and outstanding client service in regards to legal issues. The firm is a leader in its field and has been recognised by the publications made in their blog section.

There are no real unique qualities to his website or the platforms they use to share information, and i deliberately chose  a platform outside of the regular social media spheres, for i wanted to gather information on published articles and not on public speculation, whilst i feel like public opinion is vital to understanding the issue, i wanted to see how much accurate information i could gather on relevant online privacy issues that have been significant over the past several years. Whilst this website limits in its functionality, i used a web scraping service called import.io which helps create intelligent technology that translates the web into data.

My process for using my web scarping service was to first figure out what kind of information i needed, whether it be text or image based, because i was looking for articles i used the scrape to target articles posted about digital privacy over the past several years. Then i had to use the parameters such as the defining a column that has website attributes to acquire information, for example, i chose one column then click on a title and it will give me ever single title on that URL link and categorise it into a data set. Once you have all your URL’S input into the data extractor and set up your parameters, the extractor gets all the relevant information based on the input parameters and gives your your results. This scrap  gave me a huge array of articles that gave me extracts of the content, dates of posts, amount of comments and the title of the articles itself.

Untitled-2Untitled-3

The original scan i created resulted in several hundred articles, whilst this was a wellspring of information, the parameters where to vague to allow me to see the important pieces of data. Once i refined this search down i was able to extract a series of articles from my chosen multi-media site and analyse that data to create some insights.

My data consists of several different pieces of information, i chose some target questions to then show what data was relevant to my particular interests. My focus for this scrape was one, country article was focuses on, amount of articles posted in 6-month blocks, articles focuses on personal data or more corporate or private sector data and the content of each article whether it is about bio-metrics, legislation or cookies. ect ect.

This scrape has allowed me to understand the focuses of how larger scale social networks approach these issues, for a blog site that is devoted to posting only content related to my issues, i would find the data to be a lot dryer and harder to categorise into relevant insights, however i also found that the information gained just by just searching larger social media sights or using Google, would find information with some levels of prejudice in them. Overall i found this method of data mining to be interesting and practical if you want a broad range of sources quickly, however if you have a more individualised agenda this method will result in too much content that is unrelated to your targeted ideas.

One visual response that could come from understanding this data is to use little folder symbols with varying levels of thickness that correlate to how much information has been posted around a central main data central image, i:e a large digital brain, computer or planet, and have them revolve around in spherical manner with certain peaks based on what words were used or countries mention, or whether or not eh article is positive or not. The image below is an example how how you could visual describe this kind of information in a interesting visual way. Using this kind of circular module can yield a compelling set of data displayable whilst giving the viewer enough of a coherent data structure.

My 5 point Summary is:

  • More Articles are Focused on Large scale Data retention
  • The United States has the most amount of content related to Online Privacy
  • There were more articles posted in 2014 than 2015 (based on my site)
  • The most popular discussion about online privacy is about Laws and Legislation
  • There are 8 articles specifically talking about the FTC in regards to the US’s Privacy Laws
Screen Shot 2016-08-24 at 10.58.21 AM
Huntington Privacy Blog, Webscrape
Montyhaytonscrape-01
My infographic on my web scrape- Monty Hayton 2016

References

D13yacurqjgara.cloudfront.net. (2016). [online] Available at: https://d13yacurqjgara.cloudfront.net/users/314283/screenshots/2102279/voice-rec3_1x.png [Accessed 30 Aug. 2016].

Reddit.com. (2016). autotldr: search results – selftext%3Aonline+security. [online] Available at: https://www.reddit.com/r/autotldr/search?q=selftext%253Aonline%2Bsecurity&sort=relevance&restrict_sr=on&t=year [Accessed 30 Aug. 2016].

Reddit.com. (2016). reddit.com: search results – selftext:online security. [online] Available at: https://www.reddit.com/search?q=selftext%3Aonline+security&sort=relevance&restrict_sr=&t=year [Accessed 30 Aug. 2016].

.

Blog Post 5

Approaches to design for change, design -led ethnography

For my research for Online Privacy and Data security i have looked at several different platforms of data distrubution, using social media sites such as facebook, portolfio websites, and design based projects that relate to my issue. During my time researching for online privacy you come accross a range of different confliciting issues, the most paramount of issues being the bias you find surrounding articles, or the standard “tabloid” journalism you see slathered accorss social networks.

These networks or multimedia sites ususally start with a clickbait title of sorts to lure an unassuming internet browser to their page, for example the comparions between The Sydney Morning Herald titles and The Guardian.

“The internet and the death of privacy”

http://www.smh.com.au/digital-life/digital-life-news/the-internet-and-the-death-of-privacy-20150804-girnl3.html

Internet privacy: how Australia’s new laws will work

https://www.theguardian.com/world/2014/feb/04/internet-privacy-how-new-laws-work

As you can see above you get various misleading titles when you are reading articles from larger scale media industries that have private agendas to push, and then from more factual based news and information driven media you get a focus on the issue at hand with out reducing the issue down to testimony’s from a very prejudiced group of people. A part of gaining unbiased information is gathering that information from sources that exisit on both sides of the issue, which is what i try to do when i find any issues where there is conflict.

Some of the research that helps place a personal identity to these issue are the class exersises, one great way to gather intersting data is linguistic data collection and what better way to do thos that have 20 or so subjects each place value on keywords or ideas behind an issue.

One such data collection method was the Week 4 class exercise of categorizing 100 words and breaking them into antonyms. This is an interesting visual way to get quantitative data, for each issue group already has a more refined definition of what the main motivations are behind theses issues, which leads to certain words or phrases being significantly more profound than others.

For when each student placed a mark on the words that stood out the most for each issue, you can start to see certain psychologies come into effect, for a lot of the cards with more than 3 or 4 marks would seem to be more attractive because they had received marks in the first place. This behaviour shows that perhaps only when the majority points out some prevalence in an issue, is when we can have an engaged discussion with mutual input and constructive dialogue.

IMG_0201
100 words in association with Internet Privacy
IMG_0202
Catagorizing each word/ The most Significant words Selected by the class
One successful method of researching i have done is analyisng the results of surveys and questionaires. I find that whilst you do get some inconsistency with surveys online as oppossed to verbal or group interviews, you do find that people feel more comfortable being part of a large scale survey instead of being selected individualy.
One important insight that i found is find information sources that are based in other countries, comparing global trends and public opinions can be a good way to see how cultural stigmas effect how an issue is percieved. One example of this is some information i found about how Americans feel about their online privacy. During 2015 a survey was taken and found that:
  • 93% of adults say that being in control of who can get information about them is important; 74% feel this is “very important,” while 19% say it is “somewhat important.”
  • 90% say that controlling what information is collected about them is important—65% think it is “very important” and 25% say it is “somewhat important.

I feel like this shows that a larger percentage of americans understand the basic fundamentals of internet privacy, this i feel is due to the fact that beacuse of large exposure incidents such as Edwards snowden or wikileaks has weakened the regime of the conservative American government, and this leads more people to question how information should be treated.

 

I found when i foucused my research to stick with an age group, i found the insights to be so vastly different, the opinions of Gen Y vs the generation of our parents are on the complete opposite of the privacy spectrum, and i mean that in a good way. During my research i found a study undertaken in the US by Pew Research found that:

  • 91% of 12-to-17-year-olds posted selfies online, 24% posted videos of themselves.
  • Another 91% were happy posting their real name, 82% their birthday, 71% where they live and the school they attend, 53% their email address and 20% their mobile phone number.

This results and findings can give important insights into the evolution of privacy in gen y over even a 5 year period, this helps create intersting content and can help struture my findings in an engaging way.

One research method that i looked at but never decided to pursue was the Observational method. This kind of research often has no clearly defined research problem, and questions may arise during the course of the study based upon those obersvations that could deflect the real underlying issues. In regards to online privacy being able to observe the habits of people interacting with their devices and computers is itself the entire issue we face today, the over reaching of industries and governments trying to gain access to personal information against their will or without consent.

An Interview on Online Privacy Concerns

Research interview for emergent practices, Online Privacy and Data Security. For this interview i asked a my interviewee (Hilary) about the current issues dealing with internet security and how they feel about the future and their own personal data security.

Question 1: Do you feel Secure with your internet Privacy.

Answer: Sometimes.

Question 1a: “When are the times that you dont feel secure?”

Answer 1a:” I feel when i use public wifi and other open networks i am more apprehensive when browsing, and when using any public computer, for example i would log into to my bank account or private when using public wifi. ”

Question 1b: When are the times that you  feel most secure?

Answer 1b: “When using my home network. ”

Question 1c: “What makes your home network more secure?”

Answer 1c:” Its harder to for hackers to hack my private network than when im using public wifi, warning even coming up when you use public computers saying dont use theses machines for personal tasks.”

Question 2a “It takes only 10 minutes to crack a lowercase password that is 6 characters long, how does this make you feel about your security.”

Answer 2a. ” Most websites require, not only, that all of it inst lowercase, but require one number and special symbol, for example and face book requires at least 8. ”

Question 3a: Do you read the terms and conditions when promoted using software or apps on your devices. ”

Answer 3a. “Nope, most people dont right?”

Question 3b “Would it surprise you if i said that most website and apps implement strategies in those terms and conditions where they can use your personal information such as photos for marketing?”

Answer 3b” Not at all”

Question 3d: “what would you do if you ever saw your personal information online”

Answer 3d: “Get it taken down”

Question 3e. “How would you go about doing that”

Answer 3e: “I would go the head of the company, then the media and then potentially get legal council to advise me.”

Question 4: ” Have you ever heard of a “kite mark””

Answer 4: ” Nope, what is it”

Response” It is  a visual symbol for consumers to know that they arent signing up to anything they objected to, its like a traffic-light system to give an indication of what degree of data privacy protection a website offered or a terms and conditions document”

“Thats Clever, i would use that”.

Question 5: ” What would make you stop suing a particular service  when it came to personal data, what changes would make you want to stop”

Answer 5: ” If social media would give full access to the government without reasonable justifications, i would delete my accounts”

Question 6: ” Have you ever been the victim of identity or known anyone to?”

Answer 6: ” Nope”

Question 7: Would you consider yourself a cautions person when suing the internet. ”

Answer 7: ” Reasonably”

Questions 7a: ” What is reasonable caution”

Answer: 7a: ” i only download from reliable sources, using different passwords for different accounts, changing passwords semi regularly”

Question 8: “do you know what internet cookies are?”

Answer 8: ” Websites leaves them behind, the help sites like Facebook target products at you”

Question 9:  “An average of 97.4 billion spam e-mails and 973 million malware e-mails are sent worldwide each day, do you there should be penalties for this kind of internet traffic.”

Answer 9: “without a doubt”

Questions 9a” What separates spam from normal adverting”

Answer” Its all spam if you ask me, but spam is unwarranted, and unwanted, if its something i didn’t actively sign up for i dont want it.”

Question 10: ” Hackers can gain access to your webcam and microphone, does that make you apprehensive about using your webcam and microphone”

Answer 10: “defiantly”

Question 11: “Do you ever use VPNs”

Answer 11: “yeah”

Question 11a, ” when did you use them?”

Answer 11a, ” my friends brother had a Netflix account  and we used it to stream videos because the VPN was set up from the us.

Question 11b: “Would you feel insecure using chat or instant messages to share private information?”

Answer 11b: ” i wouldn’t share bank information through chat or email”

Question 12:  “Would you say you have a significant online profile”

Answer 12: ” yeah, i have Facebook, Instagram, linkedIn, my work website and tumblr”

Question 13: ” Do you think you can identify scammers online”

Answer 13: “for the most part, a lot of the scammers are from overseas so their English is poor and it gives them away”

End

Design Probe

My chosen design probe was to have my interviewee record over 1 week how secure they felt when undertaking daily tasks, and to record each day how many sites she visted that were secure and how many were not. Secure sites are verified sites that are protected and unsecure is everything else that would show up in a regular broswer search. The point of this exercise is to establish clear bounderies that an individual will set and how potetially dangerous their browsing may be.

The results were taken from the sites visited outside of work, due to the nature of certain jobs and resposibilites those jobs hold, time spent on sites at work cannot be factored in to this data. Considering the nature of the results the interviewee showed me the positions that her websites landed on the safe scale, i would have gotten her to list what websites names and links were, however this was a lot to ask consdering how busy they are with work and other tasks. The information gathered and after a coversation with the interviewee showed me that, the safer sites she was only were sites like, facebook, pandora, youtube, behance, realestate and ikea. The unsafe sites were usually ones in realtion to torrents, downloads and streaming sites. All other sites remained somewhat neutral, such as google searches and tumblrs or blogs and other non multi national sites that arent as large on the web.

probe

 

 5 Point Summary
  • Using surveys is a great method of primary research data.
  • Avoid using social media sites for legitmate content.
  • Using Key words to understand an issue gives an insight into the minds of those affected by the isse.
  • Gathering information on other countries is a good way to compare the public expectations of the issue.
  • Always maintain a target age group for your issue, this usually results i much better results

One final method i always find to be a success is using infographics to understand data, beacause the human brain can understand images 15000 times fast than words, and if you can break an issue down into images and structure it in a visually engaging way, then you understand the information that has been presented to you. For example i expanded my stakholders map into a infographic.

Map (1)rgb-01

References

Oaic.gov.au. (2016). Community attitudes | Engage with us| Office of the Australian Information Commissioner – OAIC. [online] Available at: https://www.oaic.gov.au/engage-with-us/community-attitudes/ [Accessed 20 Aug. 2016].

Pew Research Center. (2016). Americans feel the tensions between privacy and security concerns. [online] Available at: http://www.pewresearch.org/fact-tank/2016/02/19/americans-feel-the-tensions-between-privacy-and-security-concerns/ [Accessed 20 Aug. 2016].

Pew Research Center. (2016). The state of privacy in America: What we learned. [online] Available at: http://www.pewresearch.org/fact-tank/2016/01/20/the-state-of-privacy-in-america/ [Accessed 20 Aug. 2016].

Pew Research Center. (2016). The state of privacy in America: What we learned. [online] Available at: http://www.pewresearch.org/fact-tank/2016/01/20/the-state-of-privacy-in-america/ [Accessed 20 Aug. 2016].

Pew Research Center: Internet, Science & Tech. (2015). Americans’ Attitudes About Privacy, Security and Surveillance. [online] Available at: http://www.pewinternet.org/2015/05/20/americans-attitudes-about-privacy-security-and-surveillance/ [Accessed 22 Aug. 2016].

Pew Research Center: Internet, Science & Tech. (2013). Teens, Social Media, and Privacy. [online] Available at: http://www.pewinternet.org/2013/05/21/teens-social-media-and-privacy/ [Accessed 20 Aug. 2016].

 

Interview On Online Privacy

Research interview for emergent practices, Online Privacy and Data Security. For this interview i asked a my interviewee (Hilary) about the current issues dealing with internet security and how they feel about the future and their own personal data security.

Question 1: Do you feel Secure with your internet Privacy.

Answer: Sometimes.

Question 1a: “When are the times that you dont feel secure?”

Answer 1a:” I feel when i use public wifi and other open networks i am more apprehensive when browsing, and when using any public computer, for example i would log into to my bank account or private when using public wifi. ”

Question 1b: When are the times that you  feel most secure?

Answer 1b: “When using my home network. ”

Question 1c: “What makes your home network more secure?”

Answer 1c:” Its harder to for hackers to hack my private network than when im using public wifi, warning even coming up when you use public computers saying dont use theses machines for personal tasks.”

Question 2a “It takes only 10 minutes to crack a lowercase password that is 6 characters long, how does this make you feel about your security.”

Answer 2a. ” Most websites require, not only, that all of it inst lowercase, but require one number and special symbol, for example and face book requires at least 8. ”

Question 3a: Do you read the terms and conditions when promoted using software or apps on your devices. ”

Answer 3a. “Nope, most people dont right?”

Question 3b “Would it surprise you if i said that most website and apps implement strategies in those terms and conditions where they can use your personal information such as photos for marketing?”

Answer 3b” Not at all”

Question 3d: “what would you do if you ever saw your personal information online”

Answer 3d: “Get it taken down”

Question 3e. “How would you go about doing that”

Answer 3e: “I would go the head of the company, then the media and then potentially get legal council to advise me.”

Question 4: ” Have you ever heard of a “kite mark””

Answer 4: ” Nope, what is it”

Response” It is  a visual symbol for consumers to know that they arent signing up to anything they objected to, its like a traffic-light system to give an indication of what degree of data privacy protection a website offered or a terms and conditions document”

“Thats Clever, i would use that”.

Question 5: ” What would make you stop suing a particular service  when it came to personal data, what changes would make you want to stop”

Answer 5: ” If social media would give full access to the government without reasonable justifications, i would delete my accounts”

Question 6: ” Have you ever been the victim of identity or known anyone to?”

Answer 6: ” Nope”

Question 7: Would you consider yourself a cautions person when suing the internet. ”

Answer 7: ” Reasonably”

Questions 7a: ” What is reasonable caution”

Answer: 7a: ” i only download from reliable sources, using different passwords for different accounts, changing passwords semi regularly”

Question 8: “do you know what internet cookies are?”

Answer 8: ” Websites leaves them behind, the help sites like Facebook target products at you”

Question 9:  “An average of 97.4 billion spam e-mails and 973 million malware e-mails are sent worldwide each day, do you there should be penalties for this kind of internet traffic.”

Answer 9: “without a doubt”

Questions 9a” What separates spam from normal adverting”

Answer” Its all spam if you ask me, but spam is unwarranted, and unwanted, if its something i didn’t actively sign up for i dont want it.”

Question 10: ” Hackers can gain access to your webcam and microphone, does that make you apprehensive about using your webcam and microphone”

Answer 10: “defiantly”

Question 11: “Do you ever use VPNs”

Answer 11: “yeah”

Question 11a, ” when did you use them?”

Answer 11a, ” my friends brother had a Netflix account  and we used it to stream videos because the VPN was set up from the us.

Question 11b: “Would you feel insecure using chat or instant messages to share private information?”

Answer 11b: ” i wouldn’t share bank information through chat or email”

Question 12:  “Would you say you have a significant online profile”

Answer 12: ” yeah, i have Facebook, Instagram, linkedIn, my work website and tumblr”

Question 13: ” Do you think you can identify scammers online”

Answer 13: “for the most part, a lot of the scammers are from overseas so their English is poor and it gives them away”

End