POST 10: Reflection and proposition


After the last brainstorming session of refining our design proposition, though I found several useful feedback, I realised my idea was not engaging and a bit confusing. My design intention was focused too much on functionality of the software but not so meaningful in terms of design perspective. In addition, there are already existing software that does a similar job. Even though the design intention was different, the process and the expected result are similar. So I decided to scrape my old idea and move on a new one.

Talking with other peers about their work inspired me of their design approach to the problem. At the same time, I am able to spot the point where they might have missed.

New Brief

People who first started to use internet and social media are likely to post something immature online as they are unaware that the content online stays almost permanently. Sometimes people wouldn’t remember what they did in the past and turns out to be embarrassment. Online user especially the ones who likes to post content online should take cautious of the content in respect of the future in order to keep everything private stays private.


Project Title: The internet wall of regret

Practice Type: Data-Driven

Using twitter search to collate a collection of twitter messages about their regret of posting something online in the past. Messages collected with be displayed on a website that updates in a regular basis. Those messages are analyse into statistic such as how often a regret is post throughout days and weeks.The idea behind this website is to raise people’s attention about their digital footprint and present it in a more coherent way to the young people.

To bring people to interactive to the website, a twitter bot is programmed to reply to those regret messages suggesting that there is another person have the same experience (with a retweet) along with a hyperlink to the “The Internet Wall of Regret” website and a hashtag.

Twitter search currently used for data:

  1. “why did i post”
  2. regret i post
  3. “i regret posting”

The Issue

Some of the tweets like “why did i post” comes with an image from the past which does not really a regret but more like promoting or reminding people of their own reckless actions. A lot of the tweets usually doesn’t come with a context but just stating that they are regret of what they did which may results in repetitive response shown on the website.

Further data scraping from Twitter and analysing them will help identifying useful information or interesting fact to add on the website.

The possible Change

Additional function on the website which maps out the amount of regret messages in every intervals (days, weeks, months) and visualise the data in a more aesthetic manner.



Post 10: Proposition

My previous design problem statement was “Online security needs to be less obtrusive in order to work efficiently”. Initially my thoughts were that at the moment, security measures hinder a user’s experience online. Looking at this problem I saw that security measures such as passwords could either become more obstructive; like the way a home has two doors to open as opposed to one. Or it could become integrated in a more seamless manner; like the way new cars automatically open electronically when the key is in close proximity as opposed to physically opening the door with the key.

Continue reading “Post 10: Proposition”


The last two weeks have been very helpful as it has given me perfect insight into an audiences understanding of my work without the context that I’ve developed over the past three months. For example, my data visualization posters make perfect sense to me but, without a key or explanation, just simply look like lots of dots on a piece of paper.

Even before this stage, having various peers that I have been able to balance my ideas of has been increasingly valuable as the service design that I have intended to create for my final proposal inherently will be used by a greater public and audience that neither have the design or technological expertise or knowledge that I do

What is the problem?

The Internet is broken. It was originally designed for private communications within the US army and since its introduction to the general population; it has gone unregulated and has therefore morphed into an uncontrollable force of contemporary media and entertainment. Whilst this has created a unbelievable platform for sharing and freedom of speech, it has created a platform for misinformation, crime and hate speech. Whilst freedom of speech needs to be retained, as the Internet is a free agent, people need to be held accountable for their actions.

What is my proposal?

My proposal is to create a global verification system that creates a platform for people to speak their mind but also force accountability to individuals who abuse their ‘freedom of speech’. The system would take advantage of the fingerprint sensor that is built into more and more devices. When you want to verify your upload, comment or communication just simply scan your finger, which you have already registered with your local government. Similar to the twitter verification system your text will either be highlighted or a logo will appear next to it to prove that you are who you say you are and that you accept accountability for your actions whilst using the Internet and communicating with others.

What change will this create?

This will allow for complete transparency when people would like to be known for who they are and what they say. This also allows for certain sections of the Internet to remain anonymous, which will serve as a catalyst for free speech and other needed forms of anonymous communication such as online journalism and activism. It will also create “safe places” within the Internet where younger audiences such as young teenagers or children will be held to only communicate with those that have verified themselves and view content in which the government is verified is okay.

How I convey this proposal?

This proposal will be presented in a dramatized series of short videos representing the dangers of anonymous communication on the Internet and how that could shift by the use of a global verification system. For example, a man is communicating via text on a phone on a dimly lit street corner. Details about price are exchanged which will lead the audience to believe that something illegal is going on. Then it will cut two facts and information about the proposed a verification system and when it cuts back, it will reveal that the individual is actually just trying to sell a second hand item on Gumtree. They will be created with a short form style perfectly suited for social media use where videos under 60 seconds are engaged with more due to the lack of concentration that users often have whilst browsing their newsfeed. I hope to create one of these videos, which can then be used as a style guide for the look and feel of other videos created within the series with other scenarios.


Jack Sinclair



Blog Post 10: Reflection & Proposition (+presentation)


In class, Gemma provided some insightful feedback on how I could enhance my design proposal. My Intended approach was to use an existing map and draw out the journey of the individuals then to collate that data to create an ‘overlay’ of data trails. Instead, Gemma suggested that I should use that data set and establish the streets of the map as well as creating another map solely ‘statistical’ (map key) of the different surveillance cameras encountered in a certain demographical location. The concept of executing this proposition as a street directory was also Interesting in terms of style and structure. Using GPS coordinates to pinpoint one’s location and recording the street name and transcribing that information into a set of data visualisation. Generally, an interesting session where I’ve gathered some useful knowledge and experience on other peer’s approaches towards their design propositions across a vast spectrum of Issues. Christine had a visually & scientifically driven design concept of showing the cons and statistics of ‘farming’ in relations to climate change.


Project Title:

Surveillance/ CCTV Interactions (context of public & private space)

Surveillance Mapping – ‘The Data Trail’ (Blog Post 5) Design proposition is Inspired from the research and content from blog post 5.

The Issue:

The issue is around what can’t be seen by the naked eye, and that is data. Very intricate layers of data beyond the physical and social space. This issue is brought forward and inspired by Dan Hill’s ‘The street as platform’. And in a quote he said:

“We can’t see how the street is immersed in a twitching, pulsing cloud of data. This is over and above the well-established electromagnetic radiation, crackles of static… This is a new kind of data, collective and individual, aggregated and discrete, open and closed, constantly logging impossibly detailed patterns of behaviour. The behaviour of the street.”

What I wanted to understand and analyse was the purpose and existence of a surveillance camera. Such a modern ubiquitous, iconically recognised icon but yet often ignored and not actively engaged with society. Tucked away in the corners of our eyesight. How do we engage the general public to interact more with this technology? To create more awareness in our communities.

Design Practice Type (approach) + The Possible Change:

Datavisualisation (data set)

“Demographical” location based statistic report or mapping the journey of individuals. Seeing how many CCTV cameras are active in a certain location in comparison to other regions.

“Ownership” – How many stores, buildings etc. own and use surveillance cameras or advocate that technology. (I.e some stores print out visuals of shoplifters and emphasise prosecution).

Interactive Service – Creating a social experiment and RECORD the behaviours and attitudes of individuals in a designed space. Meaning a space which is configured with cameras and a space without but observed. (unknown & known space) changes the attitudes and the way we react.

Alternatively (reference Brian) suggested another interactive approach was to personify the cameras. What if surveillance cameras were different? Would this change our attitudes & approach? appropriating  the physical object of what the community sees as a ‘camera’ – will this also change the way we interact in a space?

The Design Action to support change:

Creating a data set of visuals is the predominant focus to support change. Being able to execute and portray the results in various methods and approaches shows a greater scope and understanding of this concept.

Such alternatives were mapping (location coordinates & surveillance), List (names of places and description), Illustrative & collage (quick sketches of all the cameras and buildings of the location). Questionnaires (questions for participants in relations to their daily routine and encounters with surveillance/ CCTV cameras.

Post 10 -Reflection and proposition

Before the discussion on my proposal that I had with my peer Liz, I was already a little unsure of what I was creating, or what my actual outcome was to be. Through further research before the session, I had discovered or rather specified exactly what was my specific issue dealing with 18-25 year olds, and what I wasn’t the outcome to do.

It was clear through research that the  monitoring and data collection wasn’t going to end or let up any time soon, especially not with the inclusion of the Internet of Things. And so rather than designing a possibility to end the monitoring on wither end, it was decided that my proposal was aiming at creating awareness of the increased privacy issues, and get round adults to spread the word or understand the Internet of Things. Thus, my proposal was to create awareness, to educate, or to inform.

I didn’t exactly have an actual proposal idea to run through with my peer in the class session. I had a few ideas floating around that I had picked out from the brainstorming session around the 5 possibilities to create change, however I wasn’t sold on a particular one. And so, in the session with Liz, I decided to quickly run through my 5 ideas–quite briefly–and figure out if a particular one caught her eye.

None really did, or they weren’t at a point to yet.

However she was quite startled and intrigued by a story I told her that I founding a news article. Basically, the gist of the story was that a young woman had extremely private and intimate personal data collected from a product of hers, when she had no idea she was being monitored. This snippet sparked both our interests, as it really portrayed the idea that public entities such as business and companies can collected very private data from us without our knowledge, in very private settings and environments. Who knew that you could be monitored through products in your house or bedroom.

Even thought I didn’t have an exact proposal, she did give me some advice and feedback on the ones that I did have, and brainstormed other ideas with me.

The first piece of information the she gave me was that she like the idea of creating awareness or informing the generation of the lack of privacy. We both felt that the monitoring wasn’t going to stop, and luckily she agreed with me. And so this now became the focus of what I wanted my system or design to do ultimately.

Due to the short story that I had told her, and the fact that she was quite shocked by the invasive nature, she felt that it could be a good idea to focus on a specific set of data to help ground the proposal or make it more emotional. While being specific like personal details could have worked, she suggested that I look into creating a proposal around the really private data that we have, such as in the story told. This notion also helped to develop my proposal as there are lots of ways that we give out private data, however most of the time we know we are giving it out. So I thought it could b interesting to focus on the times that we are unaware that we are providing private and personal data, such as in the Internet of Things.

Another piece of information or critique that Liz provided to me was to place whatever my issue or proposal was, into a real world content. Place it in an area, a time, a place, a social setting. And that way, whatever my proposal ends up to be, it will be relatable to the generation or audience the tis it being designed for. Immediately, this made me think of social media and anything online, and also of the bedroom. People always say, or at least imply, that our bedrooms are a visual expression of who we are; our interests, loves, personalities etc. So why not place my proposal in the context of the bedroom and online. There isn’t one person that I don’t know that doesn’t use their phone at least once a day in their bedroom, or doesn’t use a single piece of technology or a product daily. If I had to look around my room, I would at least see a computer, a laptop, an iPad, iPod, phone, Nintendo 3DS, Wacom tablet etc. So it’s fair to say that this setting could work effectively for my target audience.

The final piece of information that we discussed was another port of WHY? Why was I wanting to create something like this? Why were they to interact with it? Why was I thinking of a service design over any of the other emergent practices? The gist of our conversation was that I want people to care. Care about their privacy, care about what information they are putting out there, and care about who is viewing it. So along with the basis of informing the audience or making them aware of the Internet of Things, I really wanted to find a way to make them care.

This session was very helpful as I was able to get another brain on my issue. I could work out if things were working and whether I was in a correct direction, or if I had completely lost the plot. It also taught me (again!) that everybody thinks differently. What I figure could be an excellent idea, could be terrible for someone else or vice versa. I understand exactly now why there is usually user testing and prototyping along the way for all projects.

So now for my revised proposal—

Growing up in the age of Technology, 18-25 year olds have witnessed the rise of the Internet and its wide spread use. And in todays society we are being introduced to the Internet of Things, a system where all devices and products will have the ability to connect to the Internet and feed information to their suppliers and companies. However, users this age aren’t aware of the Internet of Things or its increased invasion of privacy. While they don’t necessarily care about their online privacy, they know what personal information should or shouldn’t be posted. The problem becomes the increased invasion of data monitoring with which we are unaware of in public and private spaces.

Since the internet is so ingrained in our daily lives, ending the data collection and monitoring isn’t a possibility. Instead, the change would be to create awareness and inform this generation of the increased potential for data monitoring with the inclusion of the Internet of Things. The change should get them to think differently about the Internet of Things and what products could be linked and connected, as well as how they interact with their private and personal environments. The change should start a conversation between this generation, for them to continue to spread the word.

Which brings me to my possible design action. The Unseen, or Unseen Connections (the name is pending), is a service design that aims to create change. The proposal is an augmented reality app that shows or reveals the unseen connections that products and devices have to the Internet of Things. The user could be introduced to the app through a social media hashtag that sets up the campaign and encourages them to see their ‘home’s Internet of Things’. After answering a few questions, and inputing parameters for daily use, the app then accesses the phones camera and superimposes graphics and lines over the real life image. The app reveals what devices are or could be connected, revealing to the user the possibility for data monitoring and collection. After this, the app also provides tips of ensuring your privacy in the Internet of Things, especially your bedroom, based on the results seen in the camera. From here, the user is then encouraged to continue the conversation, and spread a link or the hashtag to their friends and peers on social media. Reveal the connections, be informed or shocked, and spread the word.

Proposal visualisations

Reflection and proposition [POST 10]

The feedback I received from my colleague was helpful; as it allowed me to gain a better understanding of how potential users would perceive and use the proposed app. Firstly, there were concerns about how many services the app would provide. In my peer’s opinion, I should avoid making a very complicated app that attempts to solve every single problem related to online privacy. Taking that into consideration, I started to think more deeply about the structure of my app and how it would function. As result of our conversation, I decided to remove some features from the app that originally I was planning to include.

Secondly, my colleague suggested that I should consider making the app more attractive to people who are not familiar with the issue of online privacy and mass surveillance. She wondered what would encourage people to download my app in the first place. Responding to that, I believe that anyone downloading my app would already be familiar with the issue. The aim of the app is to guide people through possible ways to achieve online anonymity, and not to convert users who do not really care about the matter. For example, Pirate Bay is not trying to persuade people into illegally downloading files; they are just offering a service for people who are already into it. If they were to convince people to illegally download stuff, they would have to invest in advertising and marketing, however the functionality of the website Pirate Bay would remain unchanged. Convincing someone to buy something is a pre-purchase process, thus coming up with a marketing plan to sell my app goes beyond the scope of this assessment.



Project title: OFF app

Practice type: App and service design

The issue: There are great apps and software available that have the potential to help users to communicate and browse the Internet more privately, however many times they are hard to find or people are not aware of them.

The possible change: The proposed app aims to centralise information about existing apps (including links to download them) as well as providing users with tips, news and a forum where questions can be answered. The app will be nicely designed becoming attractive to the target audience, people aged 18-24. By providing an online platform where all other existing apps are made available and explained, I believe that the number of people who download anti-mass surveillance software will increase considerably.


The app will feature:

1) Information and news: a compilation of news around the world regarding software that enhances online privacy.

2) Search for apps: users will be able to search for apps according to their needs (e.g. text message encryption, voice call encryption, social media chats encryption, browsers, file-sharing websites, ghost-mail providers, etc)

3) Forum where users can exchange information, ask questions and inform other users or administrators of new available apps.

4) A glossary where online terminology will be explained.

5) If notifications for the app are turned on, users will be notified about safer ways to use the Internet in real time as they use their phones. For example, if someone is about to send a private message using Facebook Messenger, a notification will pop-up on the screen not only informing that person about the risks of sending an unencrypted message, but also what app is available to solve that problem.




Blog 10

During my week ten class, i expanded on some of the potential ideas and design proposals i had been researching since the mapping exercises, my concept has been slowing evolving to be focused on the measures and counter measures that are associated with intellectual property and data theft.

During the initial stages of my concept development i had a much broader target demographic, with internet being present in all mediums of communications and all age groups using devices, there was a huge range of potential for specific age responses.

After explaining to my group that i had been developing a proposal that would focus on intellectual property and the protection of creative content, the immediate response was to create a response using service design, which i was already planning on doing, however after going into more depth, my class mates said that i should try and make my proposal more engaging and less official/product focuses.

From this point i went into detail about how my secondary idea was to develop a system or some kind of data visualisation project that could help create awareness for those who use and continue to expose themselves online and agree to certain legalities without the proper knowledge. This would be a focus on some of the negative side effects of data exposure or online identity theft, and one method that i had talked about was to have a generative system that people could interact with.

For example, there could be a portrait (awareness focus) or a photograph of a piece of art (copyright focus), which would be placed in a public environment, each image would be broken into several pieces, like a puzzle, and then would allow each individual to take a piece and arrange it on another canvas. This is a good way to illustrate how online information can be manipulated by strangers, the results of this can provide the users with a visual insight into the complexities and problematic nature of having a digital profile and allowing people to have access to your private data.

Revised Proposals

Providing intellectual property security for digital creators or content developers that publish works into a digital environment.


Developing a system of information for the 18-35 group see the risks of online data theft and the measure on improving their security.

A service design app that has recognition software that uses visual and text based algorithms to calculate the originality of a piece of work, designers and businesses will use this app to verify the legitimacy of their content, and if they are using to much or their content looks to similar to another work it will not allow the user to publish or save the work.

A system that tracks every time someone makes a download or views a piece of visual content, and if that person re-posts or uses that information it will alert the user that their content is being re distributed.

A service design that translates scam emails/phishing/adds/pop/ups/ surveys and shows the original definition of the potential scammer and what the actual intentions are behind that attempt at your information.

A generative systems, that is a portrait of a person or a piece of art, and is situated in public spaces, individuals then have to place each piece of those images into another canvas and rebuild the image.

A rubix cube that has a portrait of an individual, and each main face has critical information on it, and can be solved to reveal the information, which can illustrate how easy it is to access someone information.

Final Proposal

My final chosen proposal is to create a service design that protects content creators from copyright infringement and online piracy. This service will be primarily used by people who publish digital or visual content often and want to retain a significant legal precedent over their work, the service will provide users with a system that compares their browsing history and previous published works against visual and text based archives to see if the work they’re trying to publish is derivative, this will then show a user in a pre publish screen i.e before you save a PSD document, if the document is original and not retaining identical content. This service also digitally encrypts the successful published files and uploaded it to this services data base, and provides the user with a choice of which creative license they want to apply to it.


Name of Service Design

Dominus- Application/Plugin


Copyright infringement and piracy have become rampant over the past decade, with illegal content existing in some medium on almost every single device, we begin to see an over saturation of the creative markets. There is now so much content to go through, a huge percentage uninspired or unoriginal, which is slowly destroying the industries of design, a big part of that is when a larger businesses appropriates the content of an individual user. My proposal is  a service that provides the knowledge and security of publishing digital or visual content online, embedded in adobes suits of programs, this service would allow the user to choose the kind of license they want and also check to make sure their content has no be stolen or imitated from another individual,.

Potential change 

This will give security from a legal standpoint for all content creators and publishers, and allow the appropriate accreditation for original works, this service will also remind those who create content that unless the proper resources have been referenced, your work can not be considered legitimate, and if a large business decides to imitate the work of a smaller user, there is a digital record proving that the content was published before

Design Executions

This app would have a series of different functions that would help the user publish works to an online clouds that would securely store and license the content, if every the legitimacy of a work of art is in question this service would have provided the evidence that would remove those claims. Similar to a reverse image search on google, and a font based search algorithm, this app would use functions similar to calculate the percentage of original content, and make sure that if a user had copied and pasted, or screen shot content or directly drag and dropped elements, that the user could not publish unless those elements had the appropriate creative commons.