Sei sulla pagina 1di 65

PROTECTION SYSTEM

DESIGNER STATEMENT

The data protection paradox is real. As technology


advances society into a world in which we live connected
to the internet, issues of identity, transparency, privacy,
and security are critical to debate. Although more and
more people make efforts to protect their information,
data capitalism has led us to a service landscape allowing
you to partake on one condition: you have to sacrifice your
personal information.

With this project, we want to foster discussion on future


data protection practices. We took to worldbuilding as
a method and created an ecosystem of devices working
in symbiosis to safeguard you in a corrupted information
environment. Through research, speculation, and critical
thought, we developed a scenario hinting at what our
future may come to look like.

We hope that this futuristic glimpse will be used as a


launchpad for you in your own research, speculation, and
critical thought on where we are and where we are going.

Love,
Heidi Gaudet, Kaitlin Jetviroj, and Amanda Sanchez
RESEARCH
WORDS
Provide
Desolate
Shelter
Symbiotic
Endemic
Relationship
Digital
Spiky
Dry
Hot
Barren
Flowers
Juicy
Sweet
Fragrant
Pollen
Succulent
Nocturnal
Timely
Seasonal
Connected
Evolution
Old
Transformative
Microhabitats
T HE MOJAV E DESER T

INSPIR ATION ECOSYSTEM


We kicked off this project by researching an
existing natural ecosystem: the Mojave Desert. Our
research objective was to identify three significant
actors and illustrate their interdependent
relationships within the larger context of the
ecosystem. Our shared fascination for this
deprived, desolate environment later informed our
worldbuilding and the design of our devices.
DESER T MICROCLIM AT ES

S Y S T E M DI AGR A M
THE SUN
The Mojave desert and its inhabitants revolve
around the sun. All the plants and animals have
adapted to the desolate environment, resulting in a
unique set of symbiotic relationships.

THE CAC T US
The Organ Pipe Cactus lives for about 150 years.
It begins to bloom at the age of 35. It blooms
between May and June, but only at night. As the
sun starts to rise, the flowers close up for the day.
This makes it difficult for traditional pollinators to
interact with the cactus.

THE BAT
The Long Nose Bat lives in symbiosis with the
Organ Pipe Cactus, acting as the only night
pollinator. The relationship between the bat and
cactus is an example of mutualism: a relationship
in which both actors benefit from each other.

T HE SUN

T HE CAC T US T HE B AT
IDEATION
Endemic Intelligence System
The Endemic Intelligence System (EIS) is your personal data ecosystem and
the hub of all your connected EIS devices. Rather than storing your familys
personal data in the cloud, your information is contained within the walls of
your home. Your WiFiThe Mountain Rangestores and protects all
information collected on you and your family memebers. The Moutain Range
gives you full control over internal and external data access; it puts you in
charge of when and what can be accessed by who.
T HE WORLD

USER FEEDB ACK


EXPLORATION
THE MASK
The mask is the outside protector in a desolate
world. Because the outside is susceptible to
hackers, you must wear a mask to protect your
data and keep your identity safe.

THE DOORKNOB
The doorknob in the transition room provides the
verification you need to enter the server in which
you live. As you place your mask on the doorknob,
it gathers data from your mask and verifies your
identity with a face scan and mask DNA analysis.

THE ANALYST
Using the data gathered from the doorknob, the
analyst scans for security breaches and gives
feedback on the status of your intelligent wear.
Once it clears you of any viruses, it triggers the
doorknob to unlock. You can enter your server.

T HE M ASK

T HE DOORK NOB T HE A N A LY S T
PROTOTYPING
FIRS T ROUND PRO T O T Y PES

PAPER PROTOT YPING


Our sketching brought us to an early concept that
we wanted to validate. Therefore, the next step in
our process was to create physical prototypes of
the three objects. At this early stage, we turned to
cardboard, tape, and post-its to create the analyst
and doorknob. For the mask, we simply used a
medical mask.
TESTING ENVIRONMENT
In order to test our scenario, we had to establish
three contexts: the outside world, the transition
room, and the inside world. We decided to use a
coat room as the room of transition and asked the
participants to enter their imagined home through
this chamber.
INTER AC TION TESTING
During our testing session, we introduced our
users to the testing environment. After giving them
a short synopsis describing the world, we provided
them with the paper objects. We then observed
how the participants intuitively interacted
with the environment. Afterwards, we debriefed
them on their experience.

Generally, all participants understood the mask as


something to wear for protection in the outside
world. However, they struggled to understand the
functionality of the doorknob and its relationship to
the mask. The funcitonality of the analyst was clear
to all participants. The participants interpreted the
analyst as a reflection of themselves, indicating
whether or not their accessories were free of virus.

T ES T PREPA R AT ION
FRAMEWORK
SYSTEM MAP

THE SYSTEM
In our next iteration, we began to visualize the
behavioral pattern of the system. We played with
ideas of how you are protected, how your data is
displayed, and how each object relates to the other
objects and the system at large. Informed by user
input, we developed a system map, constructed
a scenario, and established an interaction
framework that clearly states the relationship
between the objects.
T HE M ASK USER FEEDB ACK

T HE DOORK NOB T HE A N A LY S T: I T ER AT ION 1


T HE A N A LY S T: I T ER AT ION 2
DESIGN LANGUAGE
T HE OU T SIDE WORLD T HE T R A NSI T ION ROOM

THE OU TSIDE WORLD


You live in a world where you no longer have any
devices. Instead everything you wear is intelligent.
Technology is baked into your clothes, shoes,
glasses, wristbands, and other accessories,
making you vulnerable to hackers and large
coorportations trying to capture your data.

THE TR ANSITION ROOM


The transition room between the outside world
and inside world is the place where you verify your
identity and have your data analysed to make sure
it is virus-free. To not bring any hackers inside
of your house, you go through a data protection
procedure to clear yourself.

THE INSIDE WORLD


You live in a sever and your house protects all your
information. While the outside world is hostile, the
inside world is safe. All your information is stored
and protected. You feel comfortable, relaxed, and
can be yourself.
T HE INSIDE WORLD
DEVELOPMENT
3D MODELS: ITER ATION 1
T HE M ASK

T HE DOORK NOB T HE A N A LY S T
3D PRINTS: ITER ATION 1
T HE M ASK

T HE DOORK NOB T HE A N A LY S T
3D MODELS: ITER ATION 2
T HE DATA LOCK

T HE DATA DOCK T HE DATA PASS


3D MODELS: ITER ATION 3
T HE DATA LOCK

T HE DATA DOCK T HE DATA PASS


3D PRINTS: ITER ATION 2
T HE DATA LOCK

T HE DATA DOCK T HE DATA PASS


FINAL RENDERINGS
THE SCENARIO
DATA PROTEC TION SYSTEM ( VIDEO), 2017

1. Close up of Data Pass


2. Girl looking at Data Pass from behind
3. Glowy scan effect covers girls body
4. Same effect scans Data Pass
5. Detects problem
6. Shot of girl looking down at Data Pass
7. Scans Data Lock
8. Data Lock is clear
9. Feedback confirms that everything is clear
10. Far shot of girl walking out of frame
11. Frame is clear
12. Shot of a door
13. Shot of girl walking to the door
14. Shot of Data Dock
15. Close up of girl turning the knob
16. Close up of girl taking off Data Lock
17. Close up of Data Dock with Data Lock on it
18. Close up of Data Pass
19. Data Pass being set on Data Dock
20. All objects together
21. Glow scan indicating charging
22. Close up of objects
23. Data Pass spinning
24. Data Lock spinning
25. Data Dock spinning
26. All objects spinning
27. End
THE DATA LOCK
The final iteration of the Data Lock is smaller and
less intrusive than the first iteration, yet protective
of your faces most important features. The lock
took the form of an accessory rather than armor
and reflects the users personality traits.

THE DATA DOCK


The Data Dock changed from a critical part of
the transition room to a more casual dish storing
and charging your intelligent wear. Now, instead
of placing the mask on the mounted doorknob
to unlock the door, you simply place your data
accessories on the dock and enter your home.

THE DATA PASS


The final Data Pass is a personal identification card
replacing modern forms of identification practices.
The pass holds and protects all your data. Its used
as an interface to give you feedback on the status
of your data.
CREDITS

Concept Development: Heidi Gaudet, Kaitlin Jetviroj, and Amanda Sanchez

Product Design: Heidi Gaudet, Kaitlin Jetviroj, and Amanda Sanchez

Creative Direction: Heidi Gaudet, Kaitlin Jetviroj, and Amanda Sanchez

Storyboarding: Heidi Gaudet

Editing and Effects: Heidi Gaudet

Sound Design: Heidi Gaudet

3D Models: Heidi Gaudet, Kaitlin Jetviroj, and Amanda Sanchez

Camera: Kaitlin Jetviroj, and Amanda Sanchez

Actor: Unknown
BRANDING
BR AND E VOLU TION, Phase 1

Ecosystem: The Mojave Desert

Actors: The Sun, The Cactus, The Bat

BR AND E VOLU TION, Phase 2

Ecosystem: Endemic Intelligence System

Actors: The Mask, The Doorknob, The Analyst

BR AND E VOLU TION, Phase 3

Ecosystem: Data Protection System

Actors: The Mask, The Dish, The Identification Card

BR AND E VOLU TION, Final

Ecosystem: Data Protection System (DPS)

Actors: Data Lock (DL), Data Dock (DD), Data Pass (DP)
PROTECTION SYSTEM

PA S S

DOCK

LOCK
BEHIND THE SCENES
END

Heidi Gaudet

Kaitlin Jetviroj

Amanda Sanchez

Potrebbero piacerti anche