Computer Virus Interactive Data Visulaisation…

BREIF: You are required to produce a group-based project/artifact. It’s almost as simple as that. You have full scope to work in any way you prefer within the broad arena of Creative, Media, Design.

There are no restrictions on what you use to create this project or what it might encompass but you will need to show your process, workings and reflection in your research log / blog.

You should aim to make an ambitious project, but of appropriate scope for a group project, that builds on the knowledge, practice and experience that you have gained over the last two and half years. It may well extend ideas and research undertaken on other modules and projects.

You will need to show all your process and workings through the following two assignments, so the focus for this one is to make the project. You will all receive the same grade for this assignment unless it becomes evident that there is a mismatch of individual endeavour.

NOTES: Below you can see some initial notes that I made about our initial idea.

[RESEARCH] Sources of Inspiration:
Pixel Avenue:

Comparison of Terms and Conditions Lengths:

Ballet Rotoscope:

Plague Inc:

Do Not Track:

Google – What is malware?:

Malware, Viruses and Log Visualisation- Iain Swanson:

Is Google always listening:

TREATMENT DOCUMENT: Below you can see the treatment document that we put together to pitch our project idea to the rest of the class. For the design of the treatment document, we adopted the NHS’s branding guidelines for their own in-house documents, our treatment is specifically based off a 2016/17 annual report document that I found online. We used their font (Frutiger), and the exact colour blue used in their logo (#0069A6). The aim of this was, from the off, to communicate the theme of our project visually, without having to explain our intentions of producing a project inspired by and using the metaphor of viruses. It made sense to us to make a treatment document for the project, that had a medical feel to it. I think this clinical aesthetic is something we will continue when we start thinking about designing the graphical interface of the final project because the feedback we received about the NHS theme of our treatment document was positive. It did, however, make people feel slightly uneasy and concerned because people are used to reading about the symptoms and treatments for injuries, infections and illnesses in the style of the document that we adopted. I personally think this is quite apt because we are intentionally trying to worry people, to get them to consider and question the security of their personal data when using certain technology platforms, and then make the comparison between the technology platforms and computer viruses. We feel there is an irony in the sheer panic when someone’s machine gets infected with malware, they are usually very quick to remove it. However, they are happy to continue using platforms like Google, Facebook and Microsoft which we believe are doing many of the same things as the malicious malware they are so quick to remove.

FURTHER RESEARCH: Onavo Protect used by Facebook to monetize usage habits within a privacy-focused environment. They did not disclose that Facebook owned the spyware.

The 2010 WebcamGate case was an issue involving a school. 66,000 images were taken of students in their bedrooms. This was done using spyware software installed on their school provided laptops.Above: The table shows our comparison of Facebook, Google and Microsoft to Spyware, to highlight the similarities and crossover between a computer virus and the three platforms.

Below: Is an updated version of the comparison table above, we updated the table to make it more readable and understandable for both us and others. As well as changing the basic layout and construction of the comparison table, we also researched specific viruses to compare with our chosen technology companies. Unlike the method, we adopted in the previous iteration of our comparison table. Where we compared our chosen technology companies to the list of spyware features, which is much less specific and more general than the comparison between the specific features of certain computer viruses, that we included in the updated comparison table below.

STORYBOARDING: We thought a lot about the storyboarding process and did a large amount of sketching because the setup to the interactive data visualisation experience was really important to the success of the project. Another integral element to the project was that the user understood the virus metaphor that we had chosen for the project, without the user fully understanding the metaphor it would not be very effective.









Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s