2D: Sketching the Concept
For the next step of our project, we were asked to take the idea to the next dimension 2D sketch to visualize 10 different flow of experiences with sketches or storyboards. My team started with research about the following topics and drew insights for our project. It helped us understand, diverge and eventually converge on the core concept: to raise the awareness of protecting private communication through the color-coded love letter.
Research & Precedents:
1. How did Snapchat design its interface and features to filter some user groups?
2.1970s Music Poster. How were the posters designed to attain the hard-core music fans? (Big Five poster artists — Wes Wilson, Alton Kelley, Stanley Mouse, Victor Moscoso, and Rick Griffin)
3. How has code been used in the past to communicate secret messages (i.e. military code in wars)
1. Snapchat is notorious for making no sense to older users. It has a reputation that teenagers use to share incriminating pictures in a place where parents won’t find them. The parents often find the app navigation too confusing to use, mainly because the UI features don’t provide clear instructions and the app has no real utility for the older age group.
2. Many of 1970s music posters are influenced by the social, political and cultural movement. The Psychedelic era leaves us many valuable design lessons to ponder upon. One of the most prominent traits of the poster is that much content is designed in oddly twisted patterns that deliberately takes time for the reader to decipher. This strategy has been widely used to attract hard-core music fans who are willing to spend time figuring out the meaning; meanwhile, the rest will barely notice or likely to spend time interpreting the message.
3. During the first and second world wars, the Allied armies, navies, and air forces used a vast array of simple common words as code words to protect their communications from the enemies. Generally, they adopted words that had no obvious connection to what they were referring, so the code couldn’t easily be deduced. (i.e. Demon – The United States Navy, Butterballs- “Attack at night expected”, Mozart -The Union of Soviet Socialist Republics)
To raise awareness amongst the adults about the vulnerability of personal communication by using color-coded love letters.
1. How could we use colors to interpret the letters?
2. What is the logic behind assigning particular colors to a letter?
3. How do we generate a different color palette each time?
Our ideas ranged from making analog puzzles to using an algorithm on a mobile app to playing an interactive game. We finalized and refined three concepts after reviewing group feedback from our presentation.
Meantime, we are experimenting with various colors and letters to create customized color codes.
· The flow of digital ideas needs a little more consideration
· The Oscar Wilde letter is a cool research point; but maybe needs development
· Color based concepts are cool!
· Origami Encryption is a great idea!
· Nice Idea! But maybe organize by category next time.
· Good recap! Helped us understand how you got here!
· I don’t see the connection between Encryption, privacy, and language of communication.
· AI is not that advanced yet. Some critical readings against AI might be good!
· Checkout: Game: Blackbar, Lil’ Mikela on Instagram
· Like the Origami idea! Invisible ink interesting!
· Lookup: Steganography Image Encryption Technique
· Update PPT style, the flow is unclear.
· Love is a very personal thing, not sure if AI should get in.
· Lookup: in55!W! Check this for your second idea
· What about let the lovers have the same color keyboard and the receiver can type according to the colors he receives?
· The idea of AI is interesting but maybe you can think it in more details?
· Really good process!
· Very interesting concept. AI, how to make sure is protected?
· I like the idea of using data visualization with love letters!
· Love 1970’s Poster Design
· How will you prevent the government and ad company from cracking your code?
· Like the AI idea, develop more on how you find if the device use protection?
Teammate: Kalyani Tupkary