I Tweet, We All Tweet
All the devices we connect to the internet can connect to each other, and have the power to collect and communicate data.
Sketch 1 (1,500 characters)
Every device we have in our homes now has the option to connect to the internet and to other devices within your network. Home appliances can connect to the internet to increase our accessibility to them online, but this can also pose an easy target for hackers. The ability to be influenced has now been extended to our appliances, and they are often not seen as potential weak spots in our security. We tend to overlook the risk that certain weak links in our personal network can result from. The medium I used to make this sketch is Adobe Illustrator.
If given the time, I would illustrate all the types of devices that we unknowingly give the power of the internet to, such as Alexa and Google home devices, as well as lesser known ones like smart thermostats.
Sketch 2 (1,500 characters)
All of our devices now connect to the internet. This means that they are inevitably connected to each other, and all the other devices on the same network. All devices are now capable of communication and transmission of information, just like bees that belong to the same hive. The medium I used to make this sketch is Adobe Illustrator.
Possible further sketches will include more concepts that relate bees to the connectivity of phones, such as the ability to communicate and spread information within a network.
What have you learned through this sketching process? (1,000 characters)
I have learnt a lot through research about hacking methods and the ways our data is tracked. Not only am I more aware of the ways data is collected, I am also reminded of its power to influence other people.
Tell us more about you. (1,000 characters)
I am an undergraduate student studying computer science and cognitive science at the University of Virginia. As someone who studies how computers work and how people think, I am very interested in how to intuitively represent abstract concepts. I also have a background in early childhood education, where I developed science and programming curriculums for elementary-aged children. Accessibility to science and technology concepts is very important to me, especially as we start using technology from an increasingly young age.
Why are you participating in this Challenge? (750 characters)
As a computer science student (and a social media user), I realize the need for more clarity around the subject of cybersecurity. Often, cybersecurity threats are explained in the context of hacking, but fail to include concepts more salient to the public like digital privacy and personal data. This combined with experts in the field who are unable to relay their complex knowledge in a relatable and accessible way, creates a vacuum where technology users are unaware of potential threats. Technology is becoming ubiquitous, and so should the knowledge of how to protect oneself in the digital space.
What is your experience with the field of cybersecurity?
I have minimal experience and/or knowledge in the cybersecurity field.
What best describes you?
I’m a visual creator by hobby.
How did you hear about this OpenIDEO Challenge?
Someone in my network (word of mouth)
Location: State / District