POST 10: Reflection and proposition


After the last brainstorming session of refining our design proposition, though I found several useful feedback, I realised my idea was not engaging and a bit confusing. My design intention was focused too much on functionality of the software but not so meaningful in terms of design perspective. In addition, there are already existing software that does a similar job. Even though the design intention was different, the process and the expected result are similar. So I decided to scrape my old idea and move on a new one.

Talking with other peers about their work inspired me of their design approach to the problem. At the same time, I am able to spot the point where they might have missed.

New Brief

People who first started to use internet and social media are likely to post something immature online as they are unaware that the content online stays almost permanently. Sometimes people wouldn’t remember what they did in the past and turns out to be embarrassment. Online user especially the ones who likes to post content online should take cautious of the content in respect of the future in order to keep everything private stays private.


Project Title: The internet wall of regret

Practice Type: Data-Driven

Using twitter search to collate a collection of twitter messages about their regret of posting something online in the past. Messages collected with be displayed on a website that updates in a regular basis. Those messages are analyse into statistic such as how often a regret is post throughout days and weeks.The idea behind this website is to raise people’s attention about their digital footprint and present it in a more coherent way to the young people.

To bring people to interactive to the website, a twitter bot is programmed to reply to those regret messages suggesting that there is another person have the same experience (with a retweet) along with a hyperlink to the “The Internet Wall of Regret” website and a hashtag.

Twitter search currently used for data:

  1. “why did i post”
  2. regret i post
  3. “i regret posting”

The Issue

Some of the tweets like “why did i post” comes with an image from the past which does not really a regret but more like promoting or reminding people of their own reckless actions. A lot of the tweets usually doesn’t come with a context but just stating that they are regret of what they did which may results in repetitive response shown on the website.

Further data scraping from Twitter and analysing them will help identifying useful information or interesting fact to add on the website.

The possible Change

Additional function on the website which maps out the amount of regret messages in every intervals (days, weeks, months) and visualise the data in a more aesthetic manner.



POST 9: Visual documentation of the brainstorming session


Throughout the process, the strength of our brainstorming session is that we all able to understand each other’s concern upon online privacy and surveillance. Each of us provide as least one point we can implement in.

However our weakness was that our process was all focusing on the direct way to solve the problem which I think it might not be the best solution to do it and eventually we ends up common solution that might already exist. We should have refer to our map generated previously and use it as a starting point to find other solutions. Our ideas were too broad as we didn’t narrow down to specific stakeholder or feeling. Which result of less resolution found at the end. Also we did not managed to analysis what we have written on the paper, otherwise we could came out with solution that takes the pros from all ideas and refine it.


When we are discussing about my problem, we came out with 5 different approaches yet they all very similar to each other. All of them are software or systems that either check, record, or analyse the website in order to alert the user about their online behaviour. However when I look at it now, I was tended to move towards to psychological aspect of the problem. Instead of solving the privacy issue problem, I focus on how to keep the user comfortable while knowing all those online tracking and metadata left behind.

POST 8: Brainstorming possibilities for a design response

Throughout the brainstorming session with the group, my point of focus for my discussion is about the unawareness of user’s distribution of their own digital footprint. Nowadays, people tend to access the service provided on the web without much consideration of what digital footprint they could left off. More importantly, people underestimate the duration of the data stored on the web. For example at social media, users sometimes post inappropriate or embarrassing content on the web. If those content are not dealt with caution, it could ruin one’s image or the others which result in disadvantage in the future.

In order to approach the problem, here are the possible solutions that came up in the session:

  • Monitor system recording all online action and data flow performed by the user
  • Database history that records data given out by the user
  • Alert System that perform a consent of what metadata is to given away when accessing the website
  • A system that list all of your own information, clicking on each info expand into all the website that contains that piece of information


A software attached on an internet browser that aims to alert user when a piece of sensitive information is about to give away before accessing to a website. It acts like a consent confirmation on the mobile when installing a new app on the mobile phone.

It picks up every new website when the user is about the access, the external server is used to access it for the user first, then scan for all possible metadata that could be gathered from there. And eventually return the result and a consent confirmation back to the user. Every website that is acknowledged by the user can display all together in one screen, allowing user to view them in one place. The software can possibly risk assess for the user and make recommendation to user about the integrity of the website. They should also have a database that contain a list of safe website and blacklist in the perspective of the data mining issue.

With this software, people should start to realise that websites are actually services that give out information in returns of your metadata. People would start to evaluate the necessity to give out their information before accessing to a new site.

POST 7: Issue mapping


I learnt that though working with people who are doing the same topic, their understanding and value are different to other people. Through their perspective, unseen facts and ideas can be discovered. We created an issue map focusing on the relationship between government and individual. As we go through each the relationship between each stakeholder and emotion on this topic helps clarify how each of them affects each other. As we link up the relationships, we move on identifying the tension. Mapping out the tension of the issue provide a clear reason of the nature of the problem. In our cases, government and individual; Individual gain incentive, services and intellectual property rights while losing their freedom, privacy and ownership.

However our input was not extensive enough to identify the nature of the problem. We should more open and write down any small thing that might relevant to the issues.


In the exercise where we pretend to be an actor, it provokes more thoughts about the possible issues that is causing the issue right now. Through identifying the role of the object, it helps revealing association of it with people, politics, and issues. Which ultimately, find out a small issue that could be solved and make a step forward to tackle the online privacy issue.

POST 6 Scraping the web for data


The result from the search above aims to explore the response towards privacy issues and sought recent action that is relate to Australian government’s action with the hashtag #auspol. 9c577eb2ae

Firstly I found that most of the messages are retweets (listed in red) from a popular twitter account which usually direct people to a external website. Those websites are most likely to be online news website about the issues regarding to data privacy. Most these account have the name like “Privacy Camp” and “Privacy Now!” suggesting that those account mainly retweet messages to spread the words for those who followed them. This search is another way of getting news about privacy issues in Australia.

Most of these tweet are representing negative attitude upon the current situation of where privacy level is sitting (at least that is what the audience is thinking). Words like spy, attack, invade, abuse, violation were used . None of the tweets are positive about the current sate of privacy but instead spoil more about bad incident happened.



  • Most tweets are made by accounts who are political and/or concern again privacy.
  • Based on the tweets, most response are negative towards the current state.

POST 5: Approaches to design for change, design-led ethnography

I have listed a set of questions for my interviewees to explore their general awareness and attitude towards online privacy and the cause of social media.

Living on a digital era

They claimed that more than half of their time is spent online. Most of their time online are seem to be browsing on social media such as Facebook and YouTube reading off the news feed. It is inevitable to use internet as studying and all other thing has advanced digitally and rely on online system.

Point of view on their privacy

They describe privacy as something important that do not want people to know unless they acknowledge it. The interviewees are aware of which services require personal details and able to control their privacy setting online where possible. Therefore when interviewees attempt to post comments and responses online, they don’t require to think excessively about exposing one’s privacy before hitting the submit button.

However in terms of their password patterns, they claim they usually only keep everything under one password as it would be less manageable for maintain all account at once.

About Data mining and collecting tools

They understand in most situation when try to use a service online, their data might be collected for further analyses. They don’t mind if their data is collected as long as their identity is not expose to public or causes any inconvenience for them. Generally speaking data collected would bring positive improvement or personalised service that suits them.


One of the interviewee told me a story about social media. He ignored one of his friend’s invitation for a dinner on the Facebook, but a snapshot of him was taken and uploaded of him revealed that he is having a dinner, which is at the same place as his friend. On the social media people tend to be more ignorant because nature of the digital platform allow them to do so. Most communication between two people are done asynchronously so people can make selective choice of what to or not to response.



  • Young people who have been in contact with electronic device in their childhood are aware of consequences of mistreating their own action online.
  • People are not really aware of the long term effect of their own digital footprint.
  • Though they might not know what data is being collected for other purposes but they are not sensitive to it unless it interrupt one’s life to some extent.
  • Most people uses one password for all online accounts which may results in undesirable data leakage.
  • People’s attitude and action about a same issue are deal differently online and physically.

POST 3: Mapping the participants (human and non-human) and constructing an image archive


Map of Participants and Stakeholderspost3map-01

Image Archives

INKCINCT cartoons, 2007-485-modern-scales-of-justice

This illustration shows how technology changes the way  audience receive messages from media. Nowadays, through media we only see less one side fact.


The cartoon demonstrates a representation of people lack of understanding of the reason behind data surveillance and deny the effect of counter-terrorism.

Reutersk, telesurtv

This image represents the emotion free of anxiety after successfully turn down NSA’s mass surveillance program.

S Letch

This image demonstrates people become spontaneous about social media and lost their mind over consuming data and information online.

Y Zhang, chinadaily

This image visualises the situation of the victim when sensitive personal information of individual is exposed to public especially when they are triggered to certain incident.


This image implies how most mobile app gathers lots of the personal information and digital footprint in return of a service. If those were explicitly told to user beforehand they would have to reconsider before using the service.


A typical cliche way of visualising how most people understand the term “digital footprint” and the relationship with online tracking.


Edward Snowden’s denied the effect of counter-terrorism through data surveillance.


A visualisation of our identity represented in digital form. Browsing history become a medium to reveal the interest and hobby of the person.


A metaphoric imagery of data surveillance of mobile through internet and mobile apps of the personal’s personal life.


Zhang, Y. 2010, China Daily, <;

INKCINCT cartoons 2007, <;

Reuters 2015, TelesurTV, <;

Kudelka n.d., <;

S Letch 2016, <;

Patt J. 2013, <,5907&gt;

n.d., <;

Guardian n.d., <;

illo n.d., <;

MEAA n.d., <;

POST 4: Identifying and collecting a design example

Studio Thick: Re-imaginging government transactions

Studio Thick is an Australian based strategic design consultancy specialises in service design and customer experience. They concern about global challenges and strive for re-inventing products and services for a brighter future.

Victorian Government’s public services were causing citizens many troubles and difficulties. Studio Thick needs to rethink the entire service experience from end-to-end and reboot how citizens should complete their tasks in a most effortless manner.


Victorian Government Customer Service Centre from Thick on Vimeo.


First of all, they started with identifying the issues that the citizens are facing when they need a government transaction. In order to do that, they conducted 3 months of trial customer service centre to capture as much user feedback as possible. In this period, extensive surveys, interviews and observational research are conducted to gather analytical result for further refinement. Their strategic approach relies on rapid improvement and prototyping.

In terms of the spatial layout of the physical store, Thick works with the award-winning Melbourne architects Figureground to disscuss about the relationship between the concierges and the customer. With the help of them, they can effectively identify how the customers flow through the space based on their own context.

In terms of the digital portal, the approach is citizen-centric whether they are elderly, disabled or uneducated will be able to use it properly. Tested the flow of interaction with different context. The use of digital reporting tools, Google Analytics, to observe the user’s action into meaningful data.



Studio Thick 2015, Reimagining government transactions, viewed 22 August 2016, < >


POST 2: Building your expertise using scholarly secondary sources

The nature of social media is leading an intrusive movement against the online privacy. One of the scholarly sources have explore the relationship between online privacy and social media and how does it affects the balance between work and private life.

The author Beatrix M. P. van Dissel is a research assistant of acting dean of law from University of Adelaide. This article is submitted to Australian Privacy Foundation discussing issues along with legal emphasis. The author believes that the current law is insufficient to protect employees for their private actions during their out-of-hours which leads to termination of their job. This issue is quite international but this article has explicitly express his thought in Australia’s point of view. This article is factual based as she has listed several case studies from Fair Work Australia relating to the use of social media that questions the effectiveness of the current law protecting against the employee. It does seems like there is a bias towards to the employee as most case studies result in employee to be found not guilty. Which in result, they reinstate even though the employers truly believed that the employees misconduct in the way damaging their public image. However I do agree that the nature of sharing information via social media blur the borders between one’s private and professional lives. The employees feel the need to be obligated for their behaviours even out-of-hours as they thought their actions will be exposed to their employer. It will cause disciplinary consequences if they are not cautious for their actions on social media. Therefore, it suggested the need of increasing privacy between the employer and employee otherwise the employment relationship will only lead to worse.



Van Dissel, B. M. P. 2014, ‘Social media and the employee’s right to privacy in Australia’, International Data Privacy Law, Vol. 4, No. 3, pp.222-234.

POST 1: Creating a data set using secondary sources

Article 1: New data retention laws begin today, this is what you need to know

The author of this article is Harry Tucker, a technology reporter in He does not an expert on the field but generally passionate about any technological topic. The motivation of this article is to inform Australians about the introduction of the new data retention scheme and how does it affecting the audience. The article states mostly fact as it builds up a background story before discussing about its impact. The standpoint of this article remains unbiased but instead provoking the audience’s awareness to the topic. The author sits in a neutral attitude towards the effect of the scheme. Instead he addresses quotes from different public figures and organisations such as Tony Abbott and Edward Snowden. The information was listed and allow audience to decide their own voice.


Article 2: How your phone tracks your every move

The reporter for this article is Will Ockenden, who is a general reporter works in ABC interested in technology, cyber-security and science. The author was motivated by the effectiveness of tracking digital footprint after the announcement of the new data retention law in Australia. The author had written in total of 44 articles mainly revolve around cyber-security issues. This article has positioned themselves as a test subject and visualise the experience of being tracked in victim’s perspective. The analysis is written based on real life data of the author and visualising the data through data mining technique like pattern recognition into diagrams. Compare to other articles with similar topic, instead of generally provide information and quotes from professionals about it, this article implies the power of the data retention law by recording a footage of experiment with the given context (the author in this case).


Article 3: As surveillance gets smart, hackers get smarter

This article is written by Monqiue Mann, who is a lecturer of School of Justice in Queensland University of Technology and also a member of Australian Privacy Foundation. The injustice side of the data retention law motivated the author to write the article comparing the surveillance system and the hackers. This article is appear to be biased towards the injustice issue of accessibility of the privacy and go against the data retention law. The articles lacks of solid facts to support the argument on either side. The effectiveness of the new data retention law is doubted in the author’s position.


Article 4: How Do Advertisers Track You Online? We Found Out

Simon Hill, the author for this article, is a freelance technology journalist and editor passionate about technology. Most of his article contributions are about tips and recommendations on mobile technology with minor articles discussing about issues on online privacy. Through those articles, I believe he is motivated on how to improve life satisfaction through mobile technology. Hill is no expert himself but in this article he uses lots of quotes from different experts to support his statement. This article is factual as it uses and defines new terminology along the way and provides audience sufficient knowledge about the topic before moving on. Hill is positioned himself with the expert’s point of view and wants people to become aware of the existance of online tracking. Similarly to other articles, it aims to point out things and emphasis it if people not already aware of the issue.


Article 5: The IoT threat to privacy

Christine Bannan is a third year student at University of Notre Dame Law School and she posted an article about the relation between IoT(internet of things) and privacy. Though she is not a professional editor, she has proven her ability as the winner of the 2016 Edelson PC Consumer Privacy Scholarship. Her motivation for this article is driven by the concern of the IoT privacy issue after revealing one of the Samsung privacy policy – warn consumers do not discuss sensitive topics near the device. There is no reference or quote from other professional body on this article, so this article is only see as a opinion based. Unlike other articles where they uses a lot of different reference to support their statement in order to increase to integrity. She positioned herself as an advisor where suggest a concern that would eventually causes greater issue based on her knowledge. I agree with her statements but I believe more fundamental information is required to create a more structured and deep discussion.


Tucker, H. 2015, New data retention laws begin today, this is what you need to know,, viewed 16 August 2016, <>

Ockenden, W. 2015, How your phone tracks your every move, ABC, viewed 16 August 2016, <>

Mann, M. 2016, As surveillance gets smart, hackes get smarter, The Conversation, viewed 16 August 2016, <>

Hill, S. 2015, How Do Advertisers Track You Online? We Found Out, Digital Trends, viewed 18 August 2016, <>

Bannan, C. 2016, The IoT threat to privacy, TechCrunch, viewed 18 August 2016, <>