#yes I put emojis in my google doc file names lol
Explore tagged Tumblr posts
Text
WIP game
Post the names of all the files in your WIP folder regardless of how non-descriptive or ridiculous. Let people send you an ask with the title that most intrigues them, and then, and then post a little snippet of it or tell them something about it.
I saw @afewbulbsshortofatanningbedâ doing this and it looked so fun! These are mostly AR fics, and a couple original story ideas!
Selkie story đŚ
Yassenfrog đ¸
Raksha Bandhan ficlet
Yassenâs Nemesis
Alex rescues a cat-spy
Space Hotel
𧸠Paddington + Alex in jail
Tom + Yassen detective agency
Tintin crossover
Victorian AU đ§
Canadian AU đ
Jungle Book AU
The Carpet Weaver
Never Do These Things if Youâre A Vampire!
Sci-fi mermaids
#yes I put emojis in my google doc file names lol#this list is longer than I thought#especially considering real life has been mean to me and I haven't had much time to write this year!!!#ask game#fic ask game#Alex Rider#alex rider fanfiction
4 notes
¡
View notes
Text
Group Brainstorming and Debriefing
For our brainstorming session, we followed a very similar approach as to what we did in the class brainstorming activity. We revisited our list of 1 how might we questions, and as a group highlighted which of these we found most interesting or fruitful. From there, we each committed to remotely brainstorming for 15 minutes on each of the highlighted ideation prompts, and then another 15 minutes reflecting and giving feedback on the results once they were all in. We used google docs and slack as our main communication and brainstorming platforms- where we could begin live editing on the google doc while multiple of us were on the same document. We were able to hash out our thoughts after both in the google doc and through slack, where we shared our main concerns, or judgements, about the brainstorming results. Next, we went back in and reorganized our thoughts into a more categorical visual display. I found this ideation exercise exciting to come up with as many ideas as possible, and also a bit challenging. I found myself trying to go over the time limit or still pondering questions after I had already moved on. One thing that was kinda funny and weird during my reflection stage of this step, was that I said outloud in my apartment âwhy are phones more dangerous with data security than my google home ? Is it proximity?â To which my google home responds âyesâ from the corner of my room. Perhaps she was brainstorming with me!
In reflecting on the exercise a day or two after completion, I am kind of caught up in the idea that some of the solutions posed strayed away from the ideation prompt. I found myself in this problem a few times, where I would come up with as many possible distribution ideas but then none of those would actually relate to Internet of Things. One take away is how vital it is to keep the prompt in front of us at all times during this process, so as to be constantly reminded. My favorite idea out of these so far is the mobile app thatâs a personal assistant/ teacher to IoT and data security. Another is finding a way to parcel data created from IoT devices (letâs say google home alarm sleep schedule, or stating that you have run out of milk, to then have those voice commands integrated with mobile apps to automatically send milk your way, to analyze your sleep cycle in the health app, etc.) In essence, this idea is to integrate voice recognition, on demand delivery and convenience services, and smart phone interfaces to make our smart devices incredible more smart.
Below you can find a transcript of our ideation brainstorming session:
IoT Core definition:
as we ideate to have a macro view of topic we chose considering privacy/security issues
An IoT device is distinguished by being identified as a "Physical Object" ( not a person ) embedded with "Network Connectivity" (sensors, electronics) that enables "Data Exchange" (collection of information, data transfer & storage). Categories for the devices can include Consumer, Commercial, Industrial and Infrastructure and they are developed to make access to information ( via a wearable or Smart Home device) more convenient and readily accessible.
How might individuals gain access to their data:
JSON FILES
Color maps *
Emojis
Different type of data visualizations **
Based on pop culture
Based on your Soc
2 step verification
Maybe have to go to the town center every city has one to become a smart city **
Thumb print scanner
Based on your dna (insert a drop of blood) **
Housed in your amazon account
Data must be able to be digestible by smartphones
Government provided smartphones
Data libraries
Phone app that comes with smart phones with data access - *** Jenean
API
Self scanners at grocery stores *
ATMs
Making everything open-source
everytime a piece of data is produced, it is uploaded onto a public server
Treat data like puzzle pieces
reimagine data as a collective unit rather than individually focused
World atlas or like database of every individualâs data⌠registered into database with a deviceâs first use of internet.. Collective storing after
Legal protection.. Companies must distribute to each customer unless opted out *
Regulation of data access
Unlocking said data through fingerprints or eyescans
Everyone should be able to request to download their data
Cameras on devices
Notifications if you are sharing an alarming amount of data *
Piggybacking⌠notifications for each time data is shared with another company/user
A service that can delete your data across multiple devices
An app that helps you manage how and where you share your data **
Access to the data
We were looking at it from 2 different ways to have companies/governments to allow access to the data that they were using in their companies. Â And then on the other side of the spectrum
Looking into opting out of information but in a layer by layer that type of situation
Making it as digestible as possible. Imagine if privacy policies, or credit card statements, or mortgages where in a digestible format.
transparency/public
Pushing for an informed opinion
*Ooh guys just thought of an interesting exampleâŚ.  my current renters insurance is an app that is named maya and she tells me all the legal stuff of my policy in a texting format and i respond like â tell me moreâ and she explains in greater detail - Jaime *
Very Interesting ~Jenean  Â
^^Love this, I couldâve definitely used Maya during my move out process lol (Johnnie)
Control our tracking settings on our devices
VPN
In private browsing/incognito
Restrict purchasing of user data
Notify users of their data being sold
Data exchange database
Increased encryption standards
Distributed file systems
Use Data receipts (public key cryptography)
Automatically delete data
Reapproaching cloud storage
Removing data collection
Scheduled data releases
Api integration
Application interfacing with what you say
Parce all the data into segments for Specific uses (connecting voice commands with mobile apps, order triggers, safety resources, scheduling and productivity apps) and distribute the segments separately like Blockchain⌠no one resource has access to entirety
Treat data like iTunes library/ App Store
scheduled data clearings
Data expiration and permanent deletions across all that have access
Lack of interface on IoT device could lead to something being hacked and you donât know*
Distributing data through new or different media than the standard
Creating new file types that are locked to specific devices
DNA based
Physical record of data
Combining encryption with messaging platforms
Various servers for specific users and have them be checked out
Updated hardware to turn commercial grade into consumer grade
Intranets of various types of data
Using computer vision to move away from source code
Getting rid of the code
How can we have these devices be digital but not survive on code (to avoid hacking)
Each device creating its own coding language so no other computer could read it
Have the device man all the data usage
Jumbling up code after each data production
Provide examples of how companies are using their data to sell them different products
Requiring hover messages over everything that you click that states this gives companies this information about you
Showing the implications of actions like (this page would like to track your location), or saying that if you allow uber to track you when you are not on the app then they will use this to raise rates on your area
Letting users know when different data streams are commingled into information that is being used
How to implement web trackers into your handheld devices(there are different chrome extensions that show what type of cookies are tracking you and what type of data they are transmitting. Why isnât something like that for mobile)
Push notifications on distribution
Incorporating transparency of data distribution in voice/messaging
Amber alert like messages when a breach occurs
Visualization of where data is housed, where its been sent/who has access (pie chart like slice)
Eguides about data sharing
Data encryption education
A website teaching users about what type of data companies are collecting and teaching how to opt out
Data-use fireside talks sponsored by companies big in data analytics
Hack-Athons put on by common mobile app companies
Infographic videos walking through use of specific data
Taking data use like a narrative journey⌠comic book stories of the journey, magic school bus
*why were phone books ok but sharing your other info scares people*
Sending transactional emails with each distribution
Transparent reporting of breaches
Phones carry more personal data than any other device
Once we download an apd we should have to double opt in to sharing data. Meaning once they ask uber wants to share your location  and then they ask are you sure uber can now do XYZ click confirm to share this data
How do we fight robo callers/ robo texters
It is soo easy to click on a phishing link on your phone versus any other IOT device
We need to be able to protect ourselves from public wifi problems
Can almost always locate a person by their cell phone
Browsers are set to normal browsing⌠private mode not always accessible
Phones are a main device for communication
If not on wifi, they are consistently connected to cellular network..exposure
Proximity*
Because of phone logs
oversight
Traceable
Most mobile apps are connected to internet/ cellular connection
You have to give your phone number away for so many signups
Same with email, which many have connected to their phone
Frequent reminders that an app is using specific information⌠you have been sharing your location with ____ for 2 weeks. Would you like to continue sharing your location?
How might the government regulate the collection of data from IOT technology?
How might we use blockchain  for better data privacy
How might Smart cities utilize bluetooth/wifi/QR/etc. to collect data more securely
How might the government become more strategic in their leadership on how to use IoT
funding to modernize IT infrastructure to enable IoT projects
How might we leverage the advance of sensor technology make data more safe
0 notes