PROJECT4-USER AGREEMENT

Project display

Brief

This project requires us to use the narrative method of the movie to complete a design challenge.

This website is the source of our topic selection: https://foresight.arup.com/our-tools/drivers-of-change/

The theme I chose is CONVERGENCE. When digital technology is integrated into our lives, it benefits from potential pitfalls, such as cybercrime, cybersecurity issues, etc. Internet services occupy a consumerist society, and people almost inevitably use Internet services all the time. In addition to bringing convenience to the digital world, it also brings corresponding problems.

CONVERGENCE

I extracted and understood CONVERGENCE on the website. In the original text of the website, the author mentioned that “Convergence studies emerging business models (such as open innovation) and emerging disciplines (such as nanotechnology). With the rapid development of interdisciplinary technology, new solutions and new problems will follow. “So, with the integration of technology and other fields, it will bring some negative effects while bringing convenience.

Digital Convergence

According to core-ed:

The concept of digital fusion refers to the combination of previously discrete and separately used technologies, as well as the almost “invisible” integration and use of technologies as part of our daily lives. The key driver here is the ubiquitous influence and presence of the Internet, and our ability to access it through an increasingly wide range of devices. In addition, the “intelligence” of the equipment we use and the services it connects to provides us with the opportunity to interact with our surroundings in an unprecedented way.

Digital convergence and privacy

If privacy is a state, then “security” is also a state, and the overlap between the two may be much more important than the picture above implies. Especially in the 21st century, privacy has become a currency, and security is nothing more than convenience or an afterthought of “likes” on social media.

「User Agreement 」&「Privacy Protection」

When every human enters the digital world, he will click “Agree” on the “User Agreement”. After signing such an agreement, Internet companies can legitimately obtain all information from the database. But this data takeover method is mandatory (it can even be called a robber). This kind of digital control relationship is different from the state of buyers and sellers. In this state, human social self-awareness is weakened, and instead is forced to be placed in the frame of digital information and accept all false value recognition. What’s sadder is that this sense of oppression is now a reality that people must bear.

User Privacy

I performed visual processing based on commonly used apps and their user agreements and summarized the types of data they collected.

The longest privacy policies of these apps are close to 18,000 words, and the shortest ones are 6,000 to 7,000 words, and the average number of words is about 13,000. It takes an average of more than 40 minutes to read it at an average reading speed of about 300 words per minute.

In addition, Facebook has also experienced user privacy leaks. According to a news website (Business Insider), a low-level hacker forum exposed the personal data of 533 million Facebook users on the 3rd. These users involved 106 countries and leaked information. Including Facebook ID, user’s full name, location, birthday, profile, and email address.

THE TRAP

According to Harari’s Brief History of the Future: Data is a double-edged sword that can benefit mankind. It may also indulge individual desires or allow institutions to control the public. The key to whether it can lead to the benefit of mankind lies in “whether data control can be distributed reasonably and safely”; who controls the data is the most important issue of this era.
That is: “Who owns the data? Regarding my DNA, my brain, and my life, does the data belong to me, the government, the company, or the entire human race?”

CONCLUSION

How many people really have the patience to finish reading the “User Agreement”, even this is a high probability of deliberately doing it. In the Internet world under the monopoly of giants, we have to succumb to these rules, habitually click “I Agree”, and “voluntarily” reveal our personal privacy to the platforms.

IDEA DEVELOPMENT

THE STORYBOARD

This story looks at user privacy issues from the perspective of God. First of all, cctv360-degree shooting without blind spots symbolizes that our privacy has also been observed without blind spots, just like being monitored. Then there is the display of the user terms. The user has no patience to read it through, and directly clicks “I agree”. This kind of behaviour is enough to take off your clothes and let others watch. Then a user was wrapped in data, and her data was uploaded unlimitedly. Finally, the data that changed from one person to multiple people were monitored.

Shooting technique

Hitchcock-Montage
A narrative composed of a series of designed close-up shots is a basic montage technique.
A hand, a face, a gun, a back view, a story strung together, using this method to tell an event, only show the part you want to show, you can induce the audience, and you can completely master the rhythm.
An example of the shower scene in “Psycho”, this section uses a series of scenes to avoid the most violent place. You have never seen the dagger poking into the heroine’s body, but the most violent scene is already in the minds of the audience.


Kubrick colour

Video screen

发表回复

您的电子邮箱地址不会被公开。 必填项已用 * 标注