HIDE & SEEK
In the natural world, sometimes a species’ self-defense mechanism is the ability to not be seen by predators.
Sketch 1 (1,500 characters)

Sketch 2 (1,500 characters)

What have you learned through this sketching process? (1,000 characters)
I really enjoyed pushing past the default visuals I'm used to seeing in infographics and articles discussing cyber security.Tell us more about you. (1,000 characters)
I'm an art director based in Portland, Oregon. I went to OTIS College of Art & Design and have worked in fashion, and tech industries for over 10 years. I love the concept side of advertising and marketing and often look to the outdoors and travel for inspiration.Why are you participating in this Challenge? (750 characters)
I've freelanced in the tech industry for a few years and am all too familiar with the default, fear inducing, images often used to describe cyber security. I'm excited for a different language to discuss these ideas.Website(s)
craftograph.com, instagram.com/cogclubWhat is your experience with the field of cybersecurity?
- I have minimal experience and/or knowledge in the cybersecurity field.
What best describes you?
- I’m a professional visual creator affiliated with an organization.
How did you hear about this OpenIDEO Challenge?
- In the news
Location: City
PortlandLocation: State / District
OregonLocation: Country
- United States of America
What opportunity areas are you covering with this final portfolio? (250 characters)
Internet of Things, Hackers and Hacking, Digital Privacy + Encryption, Cyber ConflictFinal Portfolio (1,500 characters)





How would you summarize your final portfolio in 100 words or less? (650 characters)
Before I began illustrating any one of the opportunity areas, I looked at them through the lens of the natural world. Using this metaphor makes the concepts more accessible to viewers across cultures, as nature is all around us. My goal was to illustrate familiar ideas from nature that when paired with headlines describing the complex concepts of cybersecurity, would spark intrigue and inspire viewers to read on or learn more about the topic.Briefly describe your imagined use case for the work in your portfolio. (250 characters)
I designed the images to be used by journalists or activists, in social media or to accompany articles.What was the most useful feedback that you received? (1,000 characters)
The most valuable feedback came from our mentor during the mentorship call. I was urged to revisit the illustration and to convey the moth in flight to better convey the idea of a transfer of information during encryption. This feedback altered the illustration for the better.How have your concepts evolved since the Ideas Phase? (1,000 characters)
I have added several concepts to the portfolio since the original phase and have refined the original idea I submitted. I believe the image I refined from phase one is more technically accurate having gone through the mentorship phase.How have you been able to incorporate technical accuracy into your concepts? (1000 characters)
Working with the mentor has helped to make my first idea more technically accurate.How do your concepts expand the conversation on cybersecurity? (1000 characters)
My goal was to illustrate familiar ideas from nature that when paired with headlines describing the complex concepts of cybersecurity, would spark intrigue and inspire viewers to read on or learn more about the topic. I can see these graphics being used across media and in many industries.If you were provided with additional time and resources, are there additional ways that you’d wish to reimagine the visual language of cybersecurity? (1,000 characters)
I could see creating a wealth of imagery in a variety of mediums, that continues to communicate concepts of cybersecurity through the lens of the natural world.What resources did you find most helpful? (optional, 1,000 characters)
The community of participants and those who commented on my image were inspiring from the start of the process. It was helpful throughout to go back and re-read some of the comments.Commitment to Creative Commons License (CC BY 4.0)
- Yes, I ensure that my portfolio is in compliance with CC BY 4.0.
15 comments
Join the conversation:
CommentAhmad Gharbeia