OpenIDEO is an open innovation platform. Join our global community to solve big challenges for social good. Sign Up / Login or Learn more

Profile

Recent contributions

(1)

Contribution list

By using a familiar analogue in nature and learning, we can shed light on a topic that is typically obscured by its technical complexity.

By using a familiar analogue in nature and learning, we can shed light on a topic that is typically obscured by its technical complexity.

Photo of Kyle Jochai
6 3

Recent comments

(3) View all
link

Kyle commented on Keep them happy

Your hand-drawn IoT characters are very expressive, and the organic lines really soften what is often depicted as staid & blocky (I'm thinking of most tech icons I've seen over the years). I agree with @DeletedUser that if you can find ways to differentiate between the devices and make them each a unique personality you can really make this a fun way to discuss the critical security topics surrounding each device.

link

Kyle commented on Surveillance Frog

Hi Ricardo Menendez -

Thanks for the feedback! Glad frog dissection is more universal than I realized. :D I would love technical suggestions on surveillance layers. I am a non-technical visual designer, so that's where I'm approaching this challenge from. Identifying a user as the frog and showing tech providers as the dissectors was my primary goal, but I could see expanding on the idea to be more specific.

Will check out your idea now!

link

Kyle commented on Surveillance Frog

Hi Robyn Hwang - I may have oversold my knowledge of cybersecurity. ;) While I do work in the industry, mine is a non-technical role in marketing and design. So my knowledge of the tech is pretty general and simplified. My reasoning for this concept is more abstract and I really enjoy the idea of getting beneath the surface and exploring what's not immediately visible. When we interact online, we do it for obvious reasons - shopping, paying bills, communicating, reading/watching, etc. But while we are doing that, the surveillance is occurring in secret, basically. We don't see it or even realize its happening outside of a EULA or site roadblocks (seen since GDPR went into effect). I suppose connections could be drawn between specific methods for that surveillance in the anatomy of the frog (IE the muscles as connecting various pieces of the surveillance apparatus). Would appreciate any technical help anyone can provide on that and I will also look for more ideas among the entries here.