top of page

IN THE SHADOW OF PRIVACY

2015.01 - 2015.05  / Semester 2, MA: Design Informatics

小组项目 (5 人)

项目 "In the Shadow of Privacy" 是课程 "Digital Media Studio Project (DMSP)"的课程小组项目。

其中个人主要工作: 项目创意;项目Free Cookies 活动访谈提供编辑与访谈者;影片拍摄;影片剪辑;电影海报拍摄设计;

 

 

项目背景:在现代社会中,公共信息变得越来越多,你很容易在这些共享信息中找到你需要的资讯。但是,当这些共享信心变得越来越多的同时也意味着越来越的个人隐私正在被侵犯。 你是否曾经想过,当你发现你身边某个人的隐私信息正在一点点地泄露的时候,其实你自己的信息也在不同的泄露。 而在生活中,在互联网行为中,你的很多行为都会让你的隐私泄露,但是绝大多数人并没有意识到,而且,即使有了微薄的意识,也不会对这种 “习以为常”的侵犯行为感到过多的不满。这个项目将重点聚焦在 “互联网的隐私侵犯” 主题中,我们做了一些互联网隐私主题调查活动,并对活动的结果进行 “再活动”,最后将这个循环的过程拍成了隐晦概念的独立短片。

 

FREE COOKIES / 免费COOKIES

1 / Activity Description 活动概述

在项目的第一个阶段,我们举办了一个“Free Cookie”活动。活动内容主要是让每一个经过图书馆门前的人们用自己的个人信息和我们交换免费的Cookie饼干。但是其实Cookie在活动中不单纯只有饼干的意思,更加隐射了互联网的浏览记录Cookie,也就是人们在用他们的个人信息在和我们交换免费饼干的同时,他们一定程度上已经在互联网世界中泄露了自己的Cookie. 

 

在调查中,我们收集了将近60个人的个人信息,这些信息包括:他们的姓名,Facebook账号,邮箱地址和国籍。 Y** F**,是一个被我们讨论后选中的 “活动实验者”,他是一位正在读大四的马来西亚人。我们通过使用他的姓名,Facebook账号,邮箱地址和国籍这些信息来深度搜索他的个人信息,换言之,一定程度上,我们正在使用这些信息 “侵犯” 他的隐私。在搜索工作结束后,我们将搜索得到的结果做成了一本属于YF的人生履历,并约了他进行下一步的活动探索。这本人生履历中包含了我们搜索到的关于YF的(几乎所有的)个人资料,包括他小学开始就读的学校和班级,小学时期最好的朋友甚至暧昧对象,他正在使用的香水品牌,他过去使用的所有手机品牌和电脑品牌,他曾经旅游过的足迹,他的实习工作和志愿者经历等等一切令人惊讶的个人隐私信息。

 

"Free Cookies" Activity Poster

We invited Yii to have a private interview. This interview is designed to have three parts. In the first step, we showed him a PowerPoint to explain the purpose of our project, then he got a printout of his profile. While he read the profile, we set a camera to record his reaction and expression. Finally, we had a face- to- face talk and interviewed him with the topic of Internet privacy.

 

* For privacy protection, I would not upload any private files that include Y**F** to here.

 

2 / Meet Y** F** 访谈

What we have found after Y**’s interview and the whole searching procedure was that most users have little awareness about protecting their privacy when they using the Internet. It is necessary to strengthen the user consciousness. First, it is very common and normal for them to share the personal information online, displaying themselves’ daily life such as locations, relationship is becoming one of their socializing style. Secondly, the development of Internet products such as Google tend to have more power to arrange people’s life. That is to say, users may increasingly addict to this kind of convenience and became less concentrate on personal private space.

 

So what we had decided to do in our submission 2 is focusing the result we have got and keeping deeper discussion about how to represent the internet influence on people’s daily. We came up with an idea of short video and wanted to use a concept called “black man” to mimic the internet shadow. By reappearing scenes about how internet organize people’s life and even replace the humanity, we hope to enlighten audiences’ thinking about the appropriate use of internet, most importantly, to find out a better way to save our confidential from online experience.


 

3 / Conclusion 活动结论

短片: IN THE SHADOW OF PRIVACY

1 / Idea Introduction  短片主题简述

The idea of this short film came from the interview with Y** F** (our prime respondent in our “Free Cookies” event). In the interview, Y** mentioned that he is a big fan of Google because of its numerous application services and the convenience it provides. However, he thought little about the security, or privacy when he was using Google services.

 

Most applications and websites are able to find out their users’ personal information and preferences by storing and calculating the data from the input of users. Some take it further and use these private information beyond what is necessary for the delivery of their services, even to the point of exchanging data with other companies for their own gain.

 

In order to engage more effectively with their users, companies may analyse the data that they collected from the users’ intentional and unintentional input. From the analysis they can build a better profile of the user and customise certain interactions to better suit the user’s needs.

 

If we were to apply the same process in the digital world to real life scenarios, what would happen? Would people still be willing to share so much of their personal information? These are the questions our group tries to explore, and that is why we decided to simulate how people use their applications.

Movie Poster

2 / Short Video 短片

Thinking of your life, what is the difference between the present and the past. When you are typing, your phone knows your next word. When you are listening to music, the music player knows the song you like. When you are shopping online, your computer knows your size. Have you ever considered that your privacy has been violated when you are enjoying the convenience of digital devices. What if they are not inanimate devices, but human forms, who are familiar with all of your privacy, what will happen then?

3 / Story Explanation 故事剧本分析

We use the behaviour of shadow man to reflect some some related behaviour of privacy violations in our daily life. This part would explain all the meaning behind these behaviours.

Scene 1:

 

- Alex types “take medicine” on the memo, shadow man attaches a sticky note with medicine picture on it.

[Shadow man is a reflection of Alex’s personal electronic assistant who knows lots of detailed information of Alex. The action of shadow man attaches Alex’s memo on his body means he obtains the information of Alex’s memo.]

 

 

Scene 3:

 

- Shadow man comes with all the emails of Alex. He begins to classify the emails into different groups (e.g major, social life, ad, spam...)

[The behaviour of shadow man here is to imitate the Gmail category, which always divides email into different groups automatically.]

 

- ( Foreshadowing) Shadow man throws an important email into the trash.

[This behaviour reflects that sometime email box makes mistakes and moves some important email into the trash category. ]

 

 

 

 

Scene 4:

 

- Shadow man comes closer to Alex, he robs the laptop from Alex’s hands and begins to help Alex to type his information to the website.

[Imitate Chrome Browser “automatically filled in” function.]

 

 

Scene 5:

 

- Alex walks on the street, and shadow man follows behind him.

[This scene implies that the “Shadow man” is following your behaviour all the time.]

 

 

Scene 6:

 

- When he opens a website, the shadow man shows up with the bra he bought last time.

[This show-up of shadow man reflects the pop-up advertisement when people are browsing some website.]

 

 

 

 

 

EXHIBITION 展览

Send invitation Emails / 发邀请函


We have two versions of inviting emails: one is for public, the other is for people who have participated in our “ Cookie exchange” activity in front of the Main Library. We want to get feedbacks from that people and to see the changes may be happened about their thoughts of privacy and public.

1 / Propaganda

At first, it is only about the video. Later we find that only a video does not go far enough. Since it is somehow a fictional video, it will be a little bit abstract to the audiences. To make our audiences have a better understanding of the video, we decided to make it into an exhibition. The exhibition consists of several parts. A small literal game is a warm-up to give the audience a rough idea of the topic of our exhibition. After the video, corresponding activities help the audience to introspect their own lives and also shorten the distance with the audience. At the same time, Free Cookie activity and its follow-up are introduced in the exhibition. People who attended Free Cookie Event are also invited to the exhibition as well. This does not only attract more people to visit the exhibition, but also maintains the continuity of our course. The outcome shows that what we have done is a great choice.

 

Post event on Facebook page / Facebook发起活动

 

We posted an event introduction and announcement on the public page of Facebook, and invite friends to attend to our exhibition.

Link to Facebook page: https://www.facebook.com/PublicConfidential

Link to event  page: https://www.facebook.com/events/801493533232491/

2 / Activities of Exhibition / 展览活动

Location:

Soundlab 1st Floor, Alison House, 12 Nicolson Square, Edinburgh EH8 9DF

 

Date:

6:30PM - 10:00PM, 02 April 2015

 

Session:

The exhibition consists of 5 parts. It starts and ends at the same place and is a linear visit process. To get a higher visiting efficiency and compact pace, there is always one guide all in black to lead visitors through the whole exhibition as one show. Ecah show lasts approximately 20 minutes.What’s more, each member is also responsible to explain  the detail of each part.

 

 

Basic information & Preparation

All of our group members are dressed in black and wear masks to match the mood of the exhibition.

 

Black suit & Mask

Ticket

Public and Private Board

Since more people may come to our exhibition, we prepare the tickets and make sure that they could visit the exhibition in order.

 

As it turns out, the tickets help a lot during the exhibition. There are 58(or more) people attending our exhibition.

 

Due to the fixed length of show, we use this board to tell people who are waiting for our exhibition the inner situation. Private means that the show is going on and you can get in now. It is private now. Public means that the next show is coming, and you can come in now. It is public.

 

Exhibition Part 1: WordBoners

After the submission 2 shooting, our group wanted to include a few related interactive exercises into the exhibition, in order to engage better with the audience and encourage thoughts on privacy and safety. Originally we planned to have some keywords relating to privacy on a board, but we wanted to have more interaction between the audience and the keywords. Therefore we searched on the Internet for creative activities and came across some interesting “wordboners”. Following the idea and format of these we designed short expressions/phrases or sentences captures elements of privacy in illustrative typographies.

 

 

e.g. Twitter Amazon Facebook Vine Instagram Linkedin Whatsapp Skype  → Take risk

 

In this Information Age, more and more people use multiple social media accounts; most of us enjoy the user experiences that are provided by these sites/applications. However, users may never think about what affect these has on them; what social media provides them with and what they take at the same time.  We have seen numerous news articles on individuals or the general public being spied on or offended by others on social media. Thus we probably need to think about our privacy when we use them.

 

Think back, you will find that your life is full of shadow men. They pry your privacy and secrets. They organize and manage everything for the best without making a sound. Do you know how your Shadow men work? Stand here and watch what happens around you.

With 3 projectors, the shadow men are alive on the wall. They are doing different things on the wall, giving visitors a shocking experience.

Exhibition Part 3: Your Shadow Man

More information about short movie can be found above.

 

Exhibition Part 2: Short Movie

CONCLUSION

1 / Audience reaction / 观众反应


Most of the audiences enjoyed taking part in our exhibition and they especially liked the idea of “The Shadow of Privacy” video and the Yii foong Tien’s reaction video. They mentioned that both of these two parts showed direct and strong ideas, which made them to think about their own behaviours and actions in the digital world.

2 / Audience feedbacks / 便利贴反馈

-  It would be better to divide the whole exhibition into two parts (separated in two rooms).

-  One part for movie projection, the other part for the discussion.

- Be more resourceful with the appliances, such as reducing the number of projectors from 3 to 1.

-  The video should be runned completely.

 

 

3 / Self-evaluation / 自我评估


Through the exhibition we gain plenty of feedbacks from the audience, we found that certain parts in our exhibition can be a little better, such as better usage of exhibition space and distribution of tasks, more resourceful use of appliances, and making sure the video runs fine completely. Nevertheless, the general feedback provided by the attendants suggests that the exhibition was well thought-out, planned and conducted with great care. All of this sums up a successful event demonstrated by the great turnout of attendants, many of which commented on the effective advertising that attracted their interest.

bottom of page