OpenIDEO is an open innovation platform. Join our global community to solve big challenges for social good. Sign Up / Login or Learn more

who points at whom in cyber conflicts?

The illustration humanizes an abstract pixel graphic with adding some vulnerability.

Photo of Lucas K
2 2

Written by

Sketch 1 (1,500 characters)

Who are the ones behind the mouse clicks? Who points at whom in cyber conflicts? The illustration tries to humanize abstract positions in cyber conflicts by giving the pixelized mouse-hand a human attribute: vulnerability. The infographic-like use of typography poses questions about characteristics of in "cyber" located conflicts whilst wondering where and when cyberspace becomes an actual real-world place where pointing mouse cursors becomes pointing rifles.

Sketch 2 (1,500 characters)

The piece suggests the humanization of cyber conflicts in finding real-world analogies asking about the differences and / or similarities of these two "places". My idea intends to find understandable approaches of explaining what is happening or what could happen beyond (the) screens. The abstract and anonymous altercation of different opinions, goals or threats in cyberspace shall be translated via metaphors into vivid pictures to actively discuss which range of intervention, damage or manipulation could be possible. This could help demonstrating the (dangerous) development of the transfer of conflict or even war into cyberspace. In contrast, this is visualized in playful-metaphoric yet serious manner that invites people to get in touch with the complexity of the theme.

What have you learned through this sketching process? (1,000 characters)

Mouse clicks have feelings.

Tell us more about you. (1,000 characters)

I am a freelance designer interested in adressing complex problems.

Why are you participating in this Challenge? (750 characters)

Friends brought me here :-)



What is your experience with the field of cybersecurity?

  • I have minimal experience and/or knowledge in the cybersecurity field.

What best describes you?

  • I’m a professional visual creator freelancer.

How did you hear about this OpenIDEO Challenge?

  • Other

Location: City


Location: State / District


Location: Country

  • Germany


Join the conversation:

Photo of Dima Boulad

Welcome to the challenge Lucas K and thank you for your contribution! I like the simplicity of the graphic style you chose for this concept. How would you consider pushing this idea further? We've had a large number of very interesting submissions so far and we are going through them one by one in the Review phase. In the meantime, we invite you to browse other submissions and join the conversation around cybersecurity on the platform!

Photo of Lucas K

Hello Dima, thank you for your comment.

My idea is defined by the following characteristics / goals:
/humanize abstract positions in cyber conflicts
/ask where and when cyberspace becomes an actual real-world place (/problem)
/ask questions in and about cyber conflicts (and in general:)
/find and use analogies and metaphors to describe complex (cyber security) correlations

So pushing it further does not mean to focus or to hold on to this graphic style (nevertheless I took a conscious decision on this minimalistic yet simplistic approach to start the topic with a "welcoming" not too complex visualization).

Depending on the thematic direction of the following openideo process, this rather means to select a few different and really specific cyber security problems (together with cyber security experts) and tackle these with the described approach (see characteristics). The outcome could be graphical but even mixed-media approaches or actually real-world design installations could be a tool to work around the theme of cyber security and offer options to experience what this topic / field implies. The next step would be inviting others (non-experts) to review / experience the outcome, followed by the documentation of their feedback (depending on the design outcome this can be done on a website survey or maybe even in person). This feedback would be the input for the next iteration (which in this case probably means finalization) and the final outcome.

Pushing my idea further would mean to follow a process oriented approach to work free from any biases and too early assumed solutions. The first step would be to create a few more (graphic) design examples concerning a specific cyber security and discussing them with the non-experts to integrate their impressions in my / our design process. After having (at least one) of these iteration(s) a final protoyp can be created, implemented and tested.

So long.