Financial Cyber Crime is an offence committed over the internet, having a major impact on international banking and the financial sectors. Financial Cyber crimes affect individuals, companies, organisations and astonishingly even countries. All of this creates a negative impact upon the entire economic and social systems, because of the considerable loss of money.
Organised Criminal networks are drawn to the crime, due to the huge profits that can be made. The most worrying aspect about all of this is that, there are a number of factors that make it difficult and sometimes even impossible to trace the criminal or the illegal assets. This can be because of differences between countries and their national jurisdictions, how their international conventions are implemented and their general level of expertise in the investigative process and propositional authorities to catch the cyber criminals.
This is a factor in the growth of this crime. Alongside the ease of creating methods to steal valuable data and financially harm victims, the fact there are ways to hide and get away with the crime internationally, criminals seem to be seizing this opportunity. This is why it is a scary place sometimes online and people need to be aware of the dangers out there. Amazingly, 90% of all emails sent in the world are fraudulent. Baring in mind 294 billion emails are sent each day, that is a lot of scam emails. I will create a poster for my project to identify some crimes that are out there online and I will illustrate what you need to look out for and how to avoid the cyber crimes.
http://www.bbc.co.uk/news/business-35201188
https://www.interpol.int/Crime-areas/Financial-crime/Financial-crime
Sunday, 30 October 2016
Saturday, 29 October 2016
Social Engineering / Cyber Crime Research
Social engineering is a form of psychological manipulation that is becoming increasingly sophisticated. Criminals have developed a unique sense and strategy to fool people, through social learning. Technology is continuously expanding and more and more social connections are creating new platforms for cyber crime to take place. Cyber criminals learn from what the see online and discover methods to manipulate victims through confidence tricks to influence their behaviour.
International police agency Interpol, expresses social engineering as one of the worlds most emerging fraud trends. It is explained why, because of its ease of creation and distribution. You don't need to be a skilled hacker, just someone willing to communicate with people and write emails. Plus, the growth of the internet has played right into the hands of the criminals and it is now very easy to gather information about a target. A key part of social engineering is having information on your victim and criminals can easily get this from buying hacked company data and studying their victim's social profile.
Socialengineering.org have compiled research fro a survey to figure out statistics leading towards cyber crime. They found out,
- 90% of the people we ask will provide not just the spelling of their names but their email addresses without confirming our identity
- 67% of the people we ask will give out social security numbers, birth dates or employee numbers
- We have a 100% success ratio in physical breaches
The data collected is truly shocking, but it is a human error we all can make when not 100% focused. Also, they have compiled more research data into an info-graph that clearly depicts the methods and strategies cyber-criminals use to manipulate their victims, who are the main targets and financial statistics. As well as, security and defensive precautions to help you avoid becoming a victim.
90% of emails are scams, this is astonishing. I have discovered that most common cyber crime attacks mimic banking institutions. This is because, people trust banks and believe they are sincere, professional and dependable. Making it a great platform for criminals to illude victims. They often create a false situation and say, 'you account has been compromised' and informing you to transfer your money into some other accounts they have set up in the victims name for safe keeping. They would reinforce the situation with measurements with emails, letters, phone calls and act very professional in general to create a believable atmosphere.
Thursday, 27 October 2016
Illusive Face Demonstration
Illusive face demonstration 1 from Charlie Hamnett on Vimeo.
Illusive face demonstration 2 from Charlie Hamnett on Vimeo.
Illusive face demonstration 3 from Charlie Hamnett on Vimeo.
I have created visual demonstrations to reveal the illusive face expression in my project. This will reinforce the observers understanding of how the illusion works. I created these 5 second demonstrations in After Effects. It visually communicates how our vision detects high and low spatial frequencies and will reinforce the idea behind this in my cybernetic self project. In my project, I have used this technique to express the dangers online and you never really know who you are talking to behind the profile.
Illusive face demonstration 2 from Charlie Hamnett on Vimeo.
Illusive face demonstration 3 from Charlie Hamnett on Vimeo.
I have created visual demonstrations to reveal the illusive face expression in my project. This will reinforce the observers understanding of how the illusion works. I created these 5 second demonstrations in After Effects. It visually communicates how our vision detects high and low spatial frequencies and will reinforce the idea behind this in my cybernetic self project. In my project, I have used this technique to express the dangers online and you never really know who you are talking to behind the profile.
Monday, 24 October 2016
Project Typography / Cybernetic self
I have researched what fonts are used for credit/debit cards to apply to my project. This will represent the notion of a criminal sense, alluding a victim into giving away their personal information in a scam. I have found Two fonts that are commonly used within credit cards, Kredit type and a font literally called credit card. I will experiment with the two to see which composes with the design in the most appropriate way.
In addition, I intend to integrate the font used in emails to convey the sense most scams are focused through this channel. The three fonts used in emails I have discovered from research are Helvetica, Arial, and Calibri. I will seek to use one of these and find a way to integrate the email type and the credit/debit card type together to create unique typographic content for my poster.
In addition, I intend to integrate the font used in emails to convey the sense most scams are focused through this channel. The three fonts used in emails I have discovered from research are Helvetica, Arial, and Calibri. I will seek to use one of these and find a way to integrate the email type and the credit/debit card type together to create unique typographic content for my poster.
Development 4 / Cybernetic Self
https://s-media-cache-ak0.pinimg.com/564x/87/3b/2c/873b2c818b62589368782b9c2775e269.jpg |
https://s-media-cache-ak0.pinimg.com/736x/32/d2/2e/32d22eac885f179e5b550f080e556f53.jpg |
Using Photoshop I created title type experimentation for my poster. Similar, to the hide and seek idea, I have used the font 'Kredit' to communicate the involvement of money and I trimmed away the bottom section of the text cyber-crime after rasterising the layer, this text layer illustrates the face profile the criminals use as an anonymous source. Underneath this layer, I have created different phrases that question and express the tricks that cyber-criminals put in place to fool victims. I have used the font Helvetica, as this font is commonly used in emails and it communicates the primary channel to reach victims. for this text, I rasterised and trimmed the top layer to place to only reveal the bottom half, revealing enough if its body to read.
For the 'what you don't see text', I have added a transparent and faded effect. I have done this to create an illusive meaning to the design. When you squint or are far away to will not see the phrase, but when up close or focus your eyes you will notice the type. This will work alongside the illusive faces in the design, to help justify an overall misleading effect and relate to cyber-crime.
Sunday, 23 October 2016
After Effects / Motion Graphics / Sarah Nasteruk / Process and production 1
Sarah introduced us to new After Effects techniques that can be effectively and quickly used to create short animations to publish on TV. Initially, I was shown motion graphic videos with some of the techniques I will be learning today, to express the limitless possibilities of what can be done. I was then taught, all videos being published on to TV have to be investigated in the case of seizure awareness. All motion graphics on telly have to be categorised before being published, to tell viewers the well documented quote, 'some scenes may have flashing images'.
30 motion tests in 30 seconds from Steffen K on Vimeo.
This is one of the videos Sarah had shown me. Every second for 30 seconds is a different clip of motion graphic footage and basically this is what we are going to create, but lasting 10 seconds. This will be a good way of showcasing our motion graphic skills for our portfolio, so it was important that I payed good attention to what Sarah had to teach us.
After Effects, Tutorial One Exploration from Charlie Hamnett on Vimeo.
First of all in the Production workshop, Sarah taught us how to apply transitional frames to the one second clips and how you can create many of different transitions to create a reel of simple but visually appealing footage. I learnt how to add transitions and how to work with them using time frames and their tools to arrange the transitions and make them appear and disappear in different ways. In the video above, you can see the transitions that I have learnt. My favourite one is the white diamond to blue reveal around 7 seconds into the video.
Next we learnt wiggle path techniques and how to apply them to objects and shapes. There are two different wiggle techniques that I learnt. One technique I clicked on the shape task bar and added 'wiggle paths', this enabled me to create the outer parts of the shape to wiggle, bringing it to life. you can see this effect 2 seconds into the video. Also, there is a different wiggle path technique that I learnt. This different wiggle technique wiggles the object as a whole, not just its outer regions. To apply this effect you find it in the animation toolbar, then you drag the wiggle path option either onto your shape in its composition or onto the shapes control panel. This is what you see 6 seconds into the video.
After we was shown various new techniques, we applied our new and existing knowledge to practice and create the 10 second video. I really liked the transitional effect that I had newly learnt and will defiantly take this further into my final video that I will create after practice in the studio.
Charlie Hamnett's Motion Graphic (Updated) from Charlie Hamnett on Vimeo.
Here is my final show reel of my process and production motion graphic one. I have applied techniques that I have learnt from Sarah this week and from last year, as well as studying to learn new skills for my own benefit. I have applied transitions, wiggle paths, audio spectrum waves, motion of shape layers, type animations, bounce effects, coding, draw along a line path and more. I also created a logo with my initials, as I thought that idea worked to good effect in the video that Sarah showed me.
The newly learnt skills that I discovered in tutorials to develop my skills was coding audio wave spectrums to create the right beat/scale effect to relate to the music in the best way. I coded it to create larger scale beats using * to do so. I learnt how to create a bounce effect through coding the shape layers and to also code a pop effect in the one second bouncing ball transition mid way into the video. Also, I furthered my knowledge on how to make an object move along a line. Sarah taught my this last year to apply to my EURO 2016 re-branded logo. But, I watched tutorials to learn how to make it move along its path at different rates. I created mine to start fast and finish slow along the line, using easy easy for the first time. I then duplicated this to create a moving pattern around my logo.
All in all, I enjoy learning more about motion graphics. I like the idea of working in TV so it is important I enhance my knowledge around the subject and keep doing so. It is difficult to get your head around at first, but i find the more you play about with the new skills acquired the more likely it is they will stick with you and not have to relearn them over and over. I guess that is the same with most stuff really, the more you do it the more you know it.
30 motion tests in 30 seconds from Steffen K on Vimeo.
This is one of the videos Sarah had shown me. Every second for 30 seconds is a different clip of motion graphic footage and basically this is what we are going to create, but lasting 10 seconds. This will be a good way of showcasing our motion graphic skills for our portfolio, so it was important that I payed good attention to what Sarah had to teach us.
After Effects, Tutorial One Exploration from Charlie Hamnett on Vimeo.
First of all in the Production workshop, Sarah taught us how to apply transitional frames to the one second clips and how you can create many of different transitions to create a reel of simple but visually appealing footage. I learnt how to add transitions and how to work with them using time frames and their tools to arrange the transitions and make them appear and disappear in different ways. In the video above, you can see the transitions that I have learnt. My favourite one is the white diamond to blue reveal around 7 seconds into the video.
Next we learnt wiggle path techniques and how to apply them to objects and shapes. There are two different wiggle techniques that I learnt. One technique I clicked on the shape task bar and added 'wiggle paths', this enabled me to create the outer parts of the shape to wiggle, bringing it to life. you can see this effect 2 seconds into the video. Also, there is a different wiggle path technique that I learnt. This different wiggle technique wiggles the object as a whole, not just its outer regions. To apply this effect you find it in the animation toolbar, then you drag the wiggle path option either onto your shape in its composition or onto the shapes control panel. This is what you see 6 seconds into the video.
After we was shown various new techniques, we applied our new and existing knowledge to practice and create the 10 second video. I really liked the transitional effect that I had newly learnt and will defiantly take this further into my final video that I will create after practice in the studio.
Charlie Hamnett's Motion Graphic (Updated) from Charlie Hamnett on Vimeo.
Here is my final show reel of my process and production motion graphic one. I have applied techniques that I have learnt from Sarah this week and from last year, as well as studying to learn new skills for my own benefit. I have applied transitions, wiggle paths, audio spectrum waves, motion of shape layers, type animations, bounce effects, coding, draw along a line path and more. I also created a logo with my initials, as I thought that idea worked to good effect in the video that Sarah showed me.
The newly learnt skills that I discovered in tutorials to develop my skills was coding audio wave spectrums to create the right beat/scale effect to relate to the music in the best way. I coded it to create larger scale beats using * to do so. I learnt how to create a bounce effect through coding the shape layers and to also code a pop effect in the one second bouncing ball transition mid way into the video. Also, I furthered my knowledge on how to make an object move along a line. Sarah taught my this last year to apply to my EURO 2016 re-branded logo. But, I watched tutorials to learn how to make it move along its path at different rates. I created mine to start fast and finish slow along the line, using easy easy for the first time. I then duplicated this to create a moving pattern around my logo.
All in all, I enjoy learning more about motion graphics. I like the idea of working in TV so it is important I enhance my knowledge around the subject and keep doing so. It is difficult to get your head around at first, but i find the more you play about with the new skills acquired the more likely it is they will stick with you and not have to relearn them over and over. I guess that is the same with most stuff really, the more you do it the more you know it.
Saturday, 22 October 2016
Development 3 / Cybernetic Self
Whilst talking to a friend about my idea and me telling him about my ideology behind criminals stealing information through illusive techniques to decode the information from their victims. I was show a poster about a film ex machina where their is decoded information programming a robots functions. I thought the whole composition and everything about this poster was relatable to my project. So, I started to experiment with this idea and the arrangement of the decoding type to convey the criminal activity to decode information through online technology.
Here is my experimentation with the inspiration. I have wrote in the scattered decoding type words that are scrambled that the criminals put together to decode and manipulate their victims into giving away their information. I have also added credit card numbers, National Insurance numbers and more. To read the type follow the line path it is on and the following letter to the right will spell the decoded words. This isn't instantly visable but the closer you get, you should start to notice a pattern and the closer you get the face will change. This reflects the whole idea of the illusive nature of cyber crime. from far away it looks like a different person and scrambled messages, but as you get closer the type pulls together and you see the real face who is the criminal alluding you into giving away details. All in all, my project feels like it is pulling together, just tweaking now to improve it. I need to improve the illusive nature of the face a little more and make my idea more original for my final outcome.
Proces and Production 2 / aidan nolan
Typographic design and communication through posters was the topic of this session. In the first session I learnt how to use type and how it is chosen for a particular mood or audience. Now, I must bring this into practice to create posters. I had a selection of four briefs and had to answer three, creating a poster for each. I am to be presenting my final three posters next session, so it is important that I read the brief carefully and include everything required.
In response to the failures of the previous poster, I have chosen a type that reflects the genre and craft of the beer expedition. The type that I have chose is 'Delirium NCV' and 'Delirium Neon NCV', I researched this type ind it is commonly used to reflect the aura of craft and beer. Using similar techniques as before, I created the structure of a beer pint and placed the text below in good composition to complete the poster. I have continued the colour scheme and text size, the only difference is the choice of font. Delirium NCV and Neon NCV make make the design look much more design efficient and relate-able to the craft of beer, whereas before the font was too playful and bubbly and communicated the wrong attributes such as, childish, immature and bouncy.
For this brief I had to research a designer and create a poster that correctly expresses their way of thinking and the techniques that they integrate into their designs. I chose to create a poster around Lance Wyman. I chose him because of the way he used type and creates linear patterns instantly caught my eye and I wanted to discover more. To correctly answer this brief I had to construct type in a way that relates to your chosen designer to show the acquisition of a newly learnt skill. With this type you had to type the designers name, construct an upper and lowercase alphabet, with the addition of a few numerals and glyph, then create a short paragraph of why you have chosen this specific designer and their years active in the field of graphic design.
Lance Wayman's branding for the Mexico 1966 Olympics was the main area of his designs that made me want to choose him. He uses linear lines around the type he creates to express pulsations alluding from mexico and how it draws attention to the nation hosting the Olympics. This technique is a great a way to illustrate significance and aura around a subject. His linear waves of patterns continued throughout the whole of the mexico 1966 Olympics and his unique style of creating clear linear patterns has followed him throughout his long career. He now designs specialising in systems for cities, events, institutions and transit systems for people to observe to navigate.
I used the font Avenir light and duplicated it to create the linear pattern. I expanded and created outlines of the type so I could extend certain elements to create extruding linear patterns. Also, similar to Wayman I used shape layers to create pulsating patterns from a subject, however unlike Wayman I struggled to create pulsating patterns exuding from my type. Maybe sometime in the future i will come back and create this effect to correctly reflect his practice.
Finally, for my final brief I have created a poster advertising the Huddersfield design network Wilsons Republic. The brief demanded to only used the colours of red, white and black and to use the font minion pro and the whole theme had to be based around the word 'resilience'. I was informed to look at all of their previous posters to get the idea of what they are about and how they present them selves. I discovered they produce illustrative, typographic and strictly abide by the use of grids, often showing the grid they use by filling a section with colour.
I decided I wanted to create an illustrative design. I created a fist punching through the ground to express resilience, conveying the notion of breaking through barriers and having your voice heard. However I thought the fist on its own was too vague and needed some illustrative patterns around the fist to give it more essence of resilience. But, this still didn't achieve what I wanted to communicate.
Eventually, I found a way to communicate resilience and link the design to Wilsons republic in a clever way. I created the fist to hold the logo icon of a pipe to further relate the poster to Wilsons Republic. The white pipe completes the composition and I no longer needed the eccentric patterns to express resilience. It now conveys a message that the design network breaks through barriers to overcome design problems and still remaining resilient, by calmly holding the iconic pipe in the end.
To conclude the process and production workshop, I had great fun creating and overcoming problems, even though I was struggling for time whilst facing these problems. Especially, the Wilsons Republic poster. It was a challenging task but one that I eventually finished and have learnt a lot from, in terms of what and how much a poster really needs.
Here is the first brief that I answered in the process and production session. This brief was advertising the Huddersfield Craft Beer Expedition in 2017, taking place for the first time. I had to include all of the required text and follow the rules set within the brief. I was only allowed to use type and no imagery, only allowed to use red, black and white and to stick to three type sizes, large, medium and small. In the poster above, which I created in the production workshop, I used a font that did not reflect or express the idea of craft and the beer fan base. However, I created the image of a pint of beer with the type using techniques learnt from last week, Vertical and horizontal type scales, kerning and tracking. I used a shade of red to create the beer like impression and white type to express the froth and bubbles at the top of the pint, for both the information type and the image impression type. I knew I had come back to this poster and change the type after the session, to reflect the correct genre of the expedition.
In response to the failures of the previous poster, I have chosen a type that reflects the genre and craft of the beer expedition. The type that I have chose is 'Delirium NCV' and 'Delirium Neon NCV', I researched this type ind it is commonly used to reflect the aura of craft and beer. Using similar techniques as before, I created the structure of a beer pint and placed the text below in good composition to complete the poster. I have continued the colour scheme and text size, the only difference is the choice of font. Delirium NCV and Neon NCV make make the design look much more design efficient and relate-able to the craft of beer, whereas before the font was too playful and bubbly and communicated the wrong attributes such as, childish, immature and bouncy.
For this brief I had to research a designer and create a poster that correctly expresses their way of thinking and the techniques that they integrate into their designs. I chose to create a poster around Lance Wyman. I chose him because of the way he used type and creates linear patterns instantly caught my eye and I wanted to discover more. To correctly answer this brief I had to construct type in a way that relates to your chosen designer to show the acquisition of a newly learnt skill. With this type you had to type the designers name, construct an upper and lowercase alphabet, with the addition of a few numerals and glyph, then create a short paragraph of why you have chosen this specific designer and their years active in the field of graphic design.
Lance Wayman's branding for the Mexico 1966 Olympics was the main area of his designs that made me want to choose him. He uses linear lines around the type he creates to express pulsations alluding from mexico and how it draws attention to the nation hosting the Olympics. This technique is a great a way to illustrate significance and aura around a subject. His linear waves of patterns continued throughout the whole of the mexico 1966 Olympics and his unique style of creating clear linear patterns has followed him throughout his long career. He now designs specialising in systems for cities, events, institutions and transit systems for people to observe to navigate.
I used the font Avenir light and duplicated it to create the linear pattern. I expanded and created outlines of the type so I could extend certain elements to create extruding linear patterns. Also, similar to Wayman I used shape layers to create pulsating patterns from a subject, however unlike Wayman I struggled to create pulsating patterns exuding from my type. Maybe sometime in the future i will come back and create this effect to correctly reflect his practice.
Finally, for my final brief I have created a poster advertising the Huddersfield design network Wilsons Republic. The brief demanded to only used the colours of red, white and black and to use the font minion pro and the whole theme had to be based around the word 'resilience'. I was informed to look at all of their previous posters to get the idea of what they are about and how they present them selves. I discovered they produce illustrative, typographic and strictly abide by the use of grids, often showing the grid they use by filling a section with colour.
I decided I wanted to create an illustrative design. I created a fist punching through the ground to express resilience, conveying the notion of breaking through barriers and having your voice heard. However I thought the fist on its own was too vague and needed some illustrative patterns around the fist to give it more essence of resilience. But, this still didn't achieve what I wanted to communicate.
Eventually, I found a way to communicate resilience and link the design to Wilsons republic in a clever way. I created the fist to hold the logo icon of a pipe to further relate the poster to Wilsons Republic. The white pipe completes the composition and I no longer needed the eccentric patterns to express resilience. It now conveys a message that the design network breaks through barriers to overcome design problems and still remaining resilient, by calmly holding the iconic pipe in the end.
To conclude the process and production workshop, I had great fun creating and overcoming problems, even though I was struggling for time whilst facing these problems. Especially, the Wilsons Republic poster. It was a challenging task but one that I eventually finished and have learnt a lot from, in terms of what and how much a poster really needs.
Friday, 21 October 2016
Design Content & Delivery / Polina Zioga / Seminar / 21st Oct
Following on from last week, I prepared and presented my draft presentation to receive feedback for improvement. We presented our draft presentation in pairs and talked about it with lecturers Tracy Lannon and Polina Zioga. I discovered that I need to reason my research findings in greater detail, to explain 'who is this', 'why is this', etc.
After, Polina reinforced to us the structure of the presentation. Start with your research title, blog URL, name and course on the first slide. Followed by a background and literature review around 5-7 slides of your research title. Finally, to end the formative presentation with a main research question, that will set us up for research leading to the summative presentation assessment.
To conclude the seminar, presenting my draft presentation has provided me with an insight of what my lecturers expect of me when it comes to the formative assessment. I have come out of the seminar much more aware of what I need to research and how I have to display my research findings. Before we left Ploina once again outlined the dos and don'ts we need to remember for when we present.
After, Polina reinforced to us the structure of the presentation. Start with your research title, blog URL, name and course on the first slide. Followed by a background and literature review around 5-7 slides of your research title. Finally, to end the formative presentation with a main research question, that will set us up for research leading to the summative presentation assessment.
To conclude the seminar, presenting my draft presentation has provided me with an insight of what my lecturers expect of me when it comes to the formative assessment. I have come out of the seminar much more aware of what I need to research and how I have to display my research findings. Before we left Ploina once again outlined the dos and don'ts we need to remember for when we present.
Tuesday, 18 October 2016
Seminar 3 / Profile Picture Frames / Cybernetic Self Research / Tracy Lannon
In this seminar I listened to ideas of others contributed some of my own to help the developmental progress in our projects. I explained my idea of incorporating the illusive nature in scamming online, with the implication you never know who is on the other side of the internet. Plus, the idea of how I want to connect this with how our eyes perceive illusion, by creating the high and low spatial frequency vision between two faces to express the illusive side to scamming. It was recommend to me by one of my coworkers that if may be a good idea to frame the illusive faces with contemporary social media frames to illustrate where the danger is situated. I thought this could be a really simple, but effective idea to incorporate into my design to improve the message I intend. I will investigate this notion and experiment with it in my project.
I have gathered profile picture frames, as an idea to combine each frame outline to use as a boarder for my illusive image of faces. I could possibly overlay each frame behind my image to illustrate that anonymous criminal activity scales across all media channels, to my audience of social media users. This will reinforce the idea of false perception, linking the faces to social media profile pictures through the application of the recognisable frames and will communicate alongside my image the illusive side to not knowing who is on the other end of the internet.
I will experiment with this idea as a feel it may be important to get the link of profile picture frames into the mix of the design. Some are different shapes and some stick to the traditional square which I would have to do something about. I will create the traditional squares to be slightly rotated and slightly raised to create the impression of different profile picture frames. Also, I will create possible compositions for my overall poster design, by arranging the title type in different positions. This will serve as a template to reflect on when designing my poster.
Monday, 17 October 2016
Pete Norris / Lecture 3 / Market Data and Market Research
Moving forward from last week, Pete taught us about market data and market research in industry. Data and research is the logical next step from last week after learning, after analysis, understanding the brief and what the client wants. Now its time to discover what more we can get to help us design for what we need and research is the way to push this forward.
Initially, we looked at marked research. There are two types of market research, Primary data and secondary data. Secondary research is known as, desk research. You use the internet or books and fire away to find data and information, everything is at hand and there is no need to create any hassle to go out and find it. On the other hand, there is primary data. Within primary data there are two stems, quantitative and qualitative. Primary data is when you go out to find your own body of research.
Quantitative research entails asking a lot of questions and usually undertaken with the classic clipboard and pen. There are three types of quantitative data, geographic, pshycographic and socio-economic. Geographic data discovers how you live and where you live. Figuring out whether the area you live in has an influence on you and the type of things you will buy. Phycographic looks at how you think and what interests and excites you. What you think and what interests you may have may determine what you buy and this is what phycographic research finds out. Then there is socio-economic data. This looks at your class and financial ability, discovering whether this will influence what you buy. Quantitative research is good because it helps to pinpoint a market, lots of answered questions makes lots of clarity and detail. However, this method can be complex and difficult to due, especially if you have time restraints. Plus, it is carried out at a price, usually £150.00+ and an ethics form is needed to ask the questions in public.
Qualitative data is much more regarded as quality data. This is the interview and focus group, talking with people who are in the know and talking about a market or issue that you need to understand. It is much cheaper than quantitative research, all you need to do is arrange a meeting and go and talk to them. So, it is easily done and offers a much better three dimensional view of the situation. The cons are there are no statistical validation, it is an opinions affair and the success of this research depends on your ability to control the discussion.
After you have obtained the required research you need to use it, introducing market segmentation. Market segmentation works out exactly the people who you are talking to, this is critical. Once you understand those certain people who you target to can begin to picture them and know learn to understand how to communicate to them. You can break your market down by all sorts of things, age, sex, social class, geography, interests and more. Doing this will help to cleverly focus design to where your market will see them. For example, you would not situate a design for an old person far away from them at the back of the room, you would situate the design somewhere where they are sitting so they can easily interact and see.
A way to explain Market segmentation, we looked at the market for books. Books are broken down into two areas, non fiction and fiction. Fiction breaks down into all sorts of areas, children's, comic, horror, romance, thriller and more. Then each of these are expanded to their own brackets. For example, children's books will be broken down into age, 1-3 years, 3-7 years and 7-12 years. All of this helps to create a focus towards an audience and target what you design for them.
To make sure you have segmented your audience successfully, you have to make you it is measurable and something you can identify. Also, to make sure you can get access to it and use it as a means of communication to access these particular people. Then you need to make sure that sour market is substantial, in terms of what you are going to be paying for adverts. Is the audience great enough to generate an income. Because, I learnt if you wanted to insert and advert into the market, you have to pay an awful lot of money. Mens Health for example, if you wanted to inert a mens health advert into a cover of a magazine, your looking at around £15,000 per insertion. There is a lot of money involved and you shouldn't be scared of it, if you carry out everything we have learnt advertising will work. Finally, are your designs meaningful. Basically, is it relevant to the company and audience, if its not it wont work effectively.
Next, I was introduced to data sources. some are private and confidential that me as an academic can use to research, discover and learn for myself within the world of design at the moment. The data that is private and confidential, is only retrieved at a price so it is very important I do no share the information I may find out from these sources. The data sources are seen above.
To end the lecture we was shown a reel of cleaver adds that amazed the world and successfully advertised their products in unique ways. We was shown this as to make sure our minds think wider than from just traditional paper. Also, to be encouraged to not stick to the limits necessarily when given a brief, to push the boundaries and be unorthodox. With social media these days, anything out of the ordinary goes viral and the whole world sees the advertisement. Hitting a much wider audience that you could have imagined. Which is a way of thinking that will continue to evolve and grow as technology and social media continues to rise. I have learnt a lot in this lecture and can take a lot away from it. I now feel more confident and aware in terms of research in industry and I have a more open mind to ideology in terms of answering briefs than I did before the lecture.
Initially, we looked at marked research. There are two types of market research, Primary data and secondary data. Secondary research is known as, desk research. You use the internet or books and fire away to find data and information, everything is at hand and there is no need to create any hassle to go out and find it. On the other hand, there is primary data. Within primary data there are two stems, quantitative and qualitative. Primary data is when you go out to find your own body of research.
Quantitative research entails asking a lot of questions and usually undertaken with the classic clipboard and pen. There are three types of quantitative data, geographic, pshycographic and socio-economic. Geographic data discovers how you live and where you live. Figuring out whether the area you live in has an influence on you and the type of things you will buy. Phycographic looks at how you think and what interests and excites you. What you think and what interests you may have may determine what you buy and this is what phycographic research finds out. Then there is socio-economic data. This looks at your class and financial ability, discovering whether this will influence what you buy. Quantitative research is good because it helps to pinpoint a market, lots of answered questions makes lots of clarity and detail. However, this method can be complex and difficult to due, especially if you have time restraints. Plus, it is carried out at a price, usually £150.00+ and an ethics form is needed to ask the questions in public.
Qualitative data is much more regarded as quality data. This is the interview and focus group, talking with people who are in the know and talking about a market or issue that you need to understand. It is much cheaper than quantitative research, all you need to do is arrange a meeting and go and talk to them. So, it is easily done and offers a much better three dimensional view of the situation. The cons are there are no statistical validation, it is an opinions affair and the success of this research depends on your ability to control the discussion.
After you have obtained the required research you need to use it, introducing market segmentation. Market segmentation works out exactly the people who you are talking to, this is critical. Once you understand those certain people who you target to can begin to picture them and know learn to understand how to communicate to them. You can break your market down by all sorts of things, age, sex, social class, geography, interests and more. Doing this will help to cleverly focus design to where your market will see them. For example, you would not situate a design for an old person far away from them at the back of the room, you would situate the design somewhere where they are sitting so they can easily interact and see.
A way to explain Market segmentation, we looked at the market for books. Books are broken down into two areas, non fiction and fiction. Fiction breaks down into all sorts of areas, children's, comic, horror, romance, thriller and more. Then each of these are expanded to their own brackets. For example, children's books will be broken down into age, 1-3 years, 3-7 years and 7-12 years. All of this helps to create a focus towards an audience and target what you design for them.
To make sure you have segmented your audience successfully, you have to make you it is measurable and something you can identify. Also, to make sure you can get access to it and use it as a means of communication to access these particular people. Then you need to make sure that sour market is substantial, in terms of what you are going to be paying for adverts. Is the audience great enough to generate an income. Because, I learnt if you wanted to insert and advert into the market, you have to pay an awful lot of money. Mens Health for example, if you wanted to inert a mens health advert into a cover of a magazine, your looking at around £15,000 per insertion. There is a lot of money involved and you shouldn't be scared of it, if you carry out everything we have learnt advertising will work. Finally, are your designs meaningful. Basically, is it relevant to the company and audience, if its not it wont work effectively.
Next, I was introduced to data sources. some are private and confidential that me as an academic can use to research, discover and learn for myself within the world of design at the moment. The data that is private and confidential, is only retrieved at a price so it is very important I do no share the information I may find out from these sources. The data sources are seen above.
To end the lecture we was shown a reel of cleaver adds that amazed the world and successfully advertised their products in unique ways. We was shown this as to make sure our minds think wider than from just traditional paper. Also, to be encouraged to not stick to the limits necessarily when given a brief, to push the boundaries and be unorthodox. With social media these days, anything out of the ordinary goes viral and the whole world sees the advertisement. Hitting a much wider audience that you could have imagined. Which is a way of thinking that will continue to evolve and grow as technology and social media continues to rise. I have learnt a lot in this lecture and can take a lot away from it. I now feel more confident and aware in terms of research in industry and I have a more open mind to ideology in terms of answering briefs than I did before the lecture.
Friday, 14 October 2016
Cybercriminal Money Scams 2016 / Cybernetic Self Research
Cyber criminals have affected online businesses and individuals since the internet first came to be. The rise in technology have led internet services and websites to make it easier and easier to pay bills, shop, make online reservations other means of payments. You can do any of these actions from anywhere in the world, removing any physical boundaries and making our lives easier. However, It also makes life easier for crime. Cyber criminals have endless vulnerable targets in the world who they can scam for money and endless platforms to perform the crime. Below are the most common up to date techniques cyber criminals scam people with.
Phishing Email Scams
Phishing scams are communicated through emails and social networks. Cyber criminals will send messages to try and trick you into giving away any login details or personal information that they can use for their benefit and leave you in the dumps behind. They get their victims to believe that the message sent is from an official source, usually pretending to be bank authorities or other financial institutes. Their messages contain links that take you to web pages that resemble that of a real company, but is actually controlled by the criminals, asking for personal information on a fake login access page.
They are most successful when people arent paying much attention, so they play on this to lure them into a trap. Phishing criminals create a sense of urgency to frighten the target, telling them a story of how their bank account is under threat and that they need to fix this as soon as possible. Often asking for personal information to quickly access and confirm your identity of the account. At this point they now have all the information they need to access the account or sell the account to the dark web or other interested parties.
Money Laundering Scams
This scam is one of the oldest and most popular scamming schemes, most people will have encountered one of these scams in their mail box in their internet life. It starts by opening an anonymous emotional message who claim to be an official government member, a business man or a wealthy family member asking for help to retrieve a large sum of cash from a bank. In exchange for help the offer a you a large sum of money. The scam starts off with the victim paying for small fees and legal costs and then leading you on to pay more for additional services, transaction and transfer costs. They keep sending confirmation letters to make you believe it is legit, but eventually, you end up with no money and no promised money.
Greeting Scams
Another old scam, this is usually a greeting card message that seems to be from a friend. But, when opened you usually end up with malicious software that is being downloaded and installed on your computer. Causing adds to pop up all over your screen as you use it. In some cases however, your device can be infected with really dangerous malware. In this case your computer will start sending private data and financial information to a fraudulent server controlled by IT criminals.
Guaranteed bank loan or credit card scam
This scam sends messages to people that guarantee you large amounts of money that have already been pre-approved by the bank. People who are experiencing difficult times at the moment they receive the message they may be vulnerable to fall for this 'too good to be true offer'. However, this in general is an easy scam to spot. Using your common sense you will be able to to tell that it is fake, a huge bank loan or credit card would not be approved without knowing your financial situation.
Lottery scam
The lottery scam is a message that you open informing you have won a huge sum of money. But, before you can gain access to that money you have to pay some initial small fees. A lot of people fall for this as it highlights everyone wildest dream of quitting their jobs and living off of their winnings for the rest of their lives. this fantasy sometimes clouds peoples judgement and jump straight into the transactions to receive their so called money.
Hit-man Scam
Cyber criminals send you threatening messages to scare you into paying money. Most of the messages say they will kidnap a family member or that they have been payed to kill you unless a ransom is paid to them. They reinforce this threat with a message filled with details about the victims life, using personal information they find on social media. This is why it is wiser and safer to not display lots of personal information on social media.
Romance Scams
This scam plays on the nature of a persons subjective self, when their lust causes them to drop down their guard and think illogically. The scam takes place on social networking sites, where victims are informed about the notion of romance. The male scammers and usually based in west Africa and the female scammers are usually from eastern Europe. Cyber criminals have used this method for years and have improved their method based on their victims reactions. Some strategies take months to gain the trust of the victim and in some cases a meeting is arranged. The way they gain money from these scams are either, an unpredictable event occurs and the scammer needs money to buy a passport or other item of desperation, or they are kidnapped and held for ransom at the arranged meeting.
Fake Anti-Virus Software
This scam consists of a pop up saying 'your device is infected, install this antivirus software no to protect'. Scammers design the pop up to appear how you would expect windows or a security service provider to illustrate the problem, making you think that it maybe true. In some cases you can end up with a Trojan, Keylogger or CryptoLocker virus. These can lead to scammers to block and encrypt your operating system and request a sum of money for you to gain access to the computer again.
Impersonation Scam
Cyber criminals can hack onto your social media accounts and pretend to be you for their own value. They can create a false situation and ask for help through cash transactions from all of your contacts, to hopefully gain money from the concerned individuals who are offering their help. To avoid the situation of a profile hack, you should treat your social media account information as you would with your bank and do not display lots of personal information online that criminals could encode to discover your password.
Make Money Fast Scams
One of the most common scams is the scam that promises the fortune of making money fast on the internet. They promise you made up jobs, plans and methods of getting rich fast and promised money from government sources. With the implication to work at home victims feel safer and lured into giving away personal information and financial data with the promise from a make believe source over the internet.
Travel Scams
The victim receives an email with an irresistible offer to travel to an exotic location for a special holiday, but it expires in a short amount of time. The criminals hide necessary costs until you pay the initial offer and they simply take your money without sending you anywhere. To avoid this, go with the well known and trust worthy travel agencies to be safe.
https://heimdalsecurity.com/blog/top-online-scams/
http://cdn2.hubspot.net/hub/441818/file-3147721398-jpg/blog-files/paypal-phishing-scam300x300.jpg |
Phishing Email Scams
Phishing scams are communicated through emails and social networks. Cyber criminals will send messages to try and trick you into giving away any login details or personal information that they can use for their benefit and leave you in the dumps behind. They get their victims to believe that the message sent is from an official source, usually pretending to be bank authorities or other financial institutes. Their messages contain links that take you to web pages that resemble that of a real company, but is actually controlled by the criminals, asking for personal information on a fake login access page.
They are most successful when people arent paying much attention, so they play on this to lure them into a trap. Phishing criminals create a sense of urgency to frighten the target, telling them a story of how their bank account is under threat and that they need to fix this as soon as possible. Often asking for personal information to quickly access and confirm your identity of the account. At this point they now have all the information they need to access the account or sell the account to the dark web or other interested parties.
Money Laundering Scams
This scam is one of the oldest and most popular scamming schemes, most people will have encountered one of these scams in their mail box in their internet life. It starts by opening an anonymous emotional message who claim to be an official government member, a business man or a wealthy family member asking for help to retrieve a large sum of cash from a bank. In exchange for help the offer a you a large sum of money. The scam starts off with the victim paying for small fees and legal costs and then leading you on to pay more for additional services, transaction and transfer costs. They keep sending confirmation letters to make you believe it is legit, but eventually, you end up with no money and no promised money.
https://ilookbothways.files.wordpress.com/2011/01/ecard1.png?w=450 |
Greeting Scams
Another old scam, this is usually a greeting card message that seems to be from a friend. But, when opened you usually end up with malicious software that is being downloaded and installed on your computer. Causing adds to pop up all over your screen as you use it. In some cases however, your device can be infected with really dangerous malware. In this case your computer will start sending private data and financial information to a fraudulent server controlled by IT criminals.
http://www.scam-detector.com/assets/how%20to%20get%20prequalified%20for%20a%20mortgage.png |
Guaranteed bank loan or credit card scam
This scam sends messages to people that guarantee you large amounts of money that have already been pre-approved by the bank. People who are experiencing difficult times at the moment they receive the message they may be vulnerable to fall for this 'too good to be true offer'. However, this in general is an easy scam to spot. Using your common sense you will be able to to tell that it is fake, a huge bank loan or credit card would not be approved without knowing your financial situation.
http://www.ripandscam.com/images/lottery-ghana.jpg |
Lottery scam
The lottery scam is a message that you open informing you have won a huge sum of money. But, before you can gain access to that money you have to pay some initial small fees. A lot of people fall for this as it highlights everyone wildest dream of quitting their jobs and living off of their winnings for the rest of their lives. this fantasy sometimes clouds peoples judgement and jump straight into the transactions to receive their so called money.
http://nnimgt-a.akamaihd.net/transform/v1/resize/frm/storypad-IUkL49scI4FGKgY5dEIBe5BSplA%3D/f1a9f422-80fe-44ca-877d-85ccd36b116d.jpg/w1200_h678_fmax.jpg |
Hit-man Scam
Cyber criminals send you threatening messages to scare you into paying money. Most of the messages say they will kidnap a family member or that they have been payed to kill you unless a ransom is paid to them. They reinforce this threat with a message filled with details about the victims life, using personal information they find on social media. This is why it is wiser and safer to not display lots of personal information on social media.
https://www.webroot.com/blog/wp-content/uploads/2014/06/online-dating-scam-300x225.jpg |
Romance Scams
This scam plays on the nature of a persons subjective self, when their lust causes them to drop down their guard and think illogically. The scam takes place on social networking sites, where victims are informed about the notion of romance. The male scammers and usually based in west Africa and the female scammers are usually from eastern Europe. Cyber criminals have used this method for years and have improved their method based on their victims reactions. Some strategies take months to gain the trust of the victim and in some cases a meeting is arranged. The way they gain money from these scams are either, an unpredictable event occurs and the scammer needs money to buy a passport or other item of desperation, or they are kidnapped and held for ransom at the arranged meeting.
https://heimdalsecurity.com/blog/wp-content/uploads/2014/09/fake-antivirus.jpg |
Fake Anti-Virus Software
This scam consists of a pop up saying 'your device is infected, install this antivirus software no to protect'. Scammers design the pop up to appear how you would expect windows or a security service provider to illustrate the problem, making you think that it maybe true. In some cases you can end up with a Trojan, Keylogger or CryptoLocker virus. These can lead to scammers to block and encrypt your operating system and request a sum of money for you to gain access to the computer again.
http://www.riskandinsurance.com/wp-content/uploads/2015/07/CyberFraudImage_700x525-700x525.jpg |
Impersonation Scam
Cyber criminals can hack onto your social media accounts and pretend to be you for their own value. They can create a false situation and ask for help through cash transactions from all of your contacts, to hopefully gain money from the concerned individuals who are offering their help. To avoid the situation of a profile hack, you should treat your social media account information as you would with your bank and do not display lots of personal information online that criminals could encode to discover your password.
http://waystoavoidscamsonline.com/wp-content/uploads/2016/05/make-money-online-scams-768x300.png |
Make Money Fast Scams
One of the most common scams is the scam that promises the fortune of making money fast on the internet. They promise you made up jobs, plans and methods of getting rich fast and promised money from government sources. With the implication to work at home victims feel safer and lured into giving away personal information and financial data with the promise from a make believe source over the internet.
http://www.smartconsumer.ct.gov/smartconsumer/lib/smartconsumer/images/travel_scams_plane_ad.jpg |
Travel Scams
The victim receives an email with an irresistible offer to travel to an exotic location for a special holiday, but it expires in a short amount of time. The criminals hide necessary costs until you pay the initial offer and they simply take your money without sending you anywhere. To avoid this, go with the well known and trust worthy travel agencies to be safe.
https://heimdalsecurity.com/blog/top-online-scams/
Recent Money Flipper Scam / Instagram and Facebook / Cybernetic Self Research
A recent social media scam was called the money flipping scam. This was set up by a criminal group who expressed that they could flip your money to make more money, like a magic trick. This of course went viral, as bizarre stuff do on social media, causing some people to fall for it, especially inexperienced users. The anonymous profile reassures people that the money making tricks are real and work, with prearranged photographs and videos of the trick performed with satisfied customers. However these are all set up to create the idea of false perception.
Because, this went viral and looked like a real thing people were thinking maybe this could work and people was falling for it. This is how a lot of scams publicise themselves through social media. Criminals took money off of people by asking them to go out and buy a green dot money pack, which is a prepaid card, to top up with the amount you want to flip. If you want to flip £100 you would flip to and receive £1000. After topping up the card they will ask for the card details, so they can access it and add a 0 to the £100 to create £1000. But, they will tell you in order for them to add the 0 they will have to cut the profits, to basically make the false business sound real.
In the end, they simply take the card details and steal the money. No money has been flipped and what ever money deposited on the card would be seen ever again. This is one small scam of many from social media. I highlighted this one because it is fairly recent and I can relate this to my current project, 'raising awareness of criminality through anonymous profiles online', to gather research and build a final design to highlight the crimes cyber criminals commit online.
http://www.dalerodgers.co.uk/wp-content/uploads/2015/01/instagram.png |
In the end, they simply take the card details and steal the money. No money has been flipped and what ever money deposited on the card would be seen ever again. This is one small scam of many from social media. I highlighted this one because it is fairly recent and I can relate this to my current project, 'raising awareness of criminality through anonymous profiles online', to gather research and build a final design to highlight the crimes cyber criminals commit online.
Tracy Lannon / Studio Research Feedback / 14th Oct
Tracy provided guidance towards creating a research question and how I could take my project further, in terms of focus. I was having difficulty to create a research question for my project direction. I had collated many possibly research angles but it was hard to group them together and create a research question. After, my discussion with Tracy I discovered a solution to overcome this problem and get back on track.
What I found, was my whole idea was very broad and just needed focusing on a more specific audience and a particular theme. Tracy guided me to look into specific crimes committed by anonymous profiles online and who are the targeted victims. From this, I can pin point an area that I will investigate further to create a better and audience specific design. For example, I could look in to credit card fraud and the most targeted victims, Identity theft and victims and other scams and specific victims. This is something I will investigate to progress my project development.
To conclude, I have gained a greater understanding of how to develop a research question and his has given me a refreshed focus on where I should be going with my project. I was also recommended sources of research to help, 'google scholar', 'academia' and 'research gate', to help me in my study.
To conclude, I have gained a greater understanding of how to develop a research question and his has given me a refreshed focus on where I should be going with my project. I was also recommended sources of research to help, 'google scholar', 'academia' and 'research gate', to help me in my study.
The Research Question / Polina Zioga / 14th October
Understanding how to develop a research question, was the topic of today. A good research question talks about your research subject and reveals how you will investigate your research subject. It will provide direction and become a guide to what you research, acting as the spinal cord of a body of research. Helping to narrow down research, instead of aimlessly researching anything and everything. Plus, it helps you stay on track and not stray away from the subject at hand, which can happen when you write a lot without a solidified focus from the beginning.
It was explained to us how you create a research question. First you state your subject and interests and create a title. Then research around the area and highlight all of the relevant information that intrigues you the most ticking all the boxes that you want to investigate. From this you should be able to build a research question. Below is an example to summarise, investigating Scandinavian graphic design.
After, I put what I had learnt to practice to create my own research question. My area of interest for my project is to raise awareness of criminality online through interactivity with anonymous profiles. In pairs, we both pulled out questions from each others title and gave feedback of what and how to research to create a research question.
Questions we pulled out from my title include
'investigate stories that have happened'
'tricks and illusions the criminals set in place that make you mistake and interact'
'types of crime online'
'who are targeted / different ages? / old people scans / credit card scams / young?'
'Technologies influence, before and now'
From this discussion about research angles and feedback, I have an idea of where I could take my research and create a research question. I could create a research question to focus on certain topics within my broad title. For example, I could create a research question focusing on specific targets and specific crimes, credit card fraud or determining whether old or young people are more vulnerable to criminality online through anonymous profiles.
It was explained to us how you create a research question. First you state your subject and interests and create a title. Then research around the area and highlight all of the relevant information that intrigues you the most ticking all the boxes that you want to investigate. From this you should be able to build a research question. Below is an example to summarise, investigating Scandinavian graphic design.
After, I put what I had learnt to practice to create my own research question. My area of interest for my project is to raise awareness of criminality online through interactivity with anonymous profiles. In pairs, we both pulled out questions from each others title and gave feedback of what and how to research to create a research question.
Questions we pulled out from my title include
'investigate stories that have happened'
'tricks and illusions the criminals set in place that make you mistake and interact'
'types of crime online'
'who are targeted / different ages? / old people scans / credit card scams / young?'
'Technologies influence, before and now'
From this discussion about research angles and feedback, I have an idea of where I could take my research and create a research question. I could create a research question to focus on certain topics within my broad title. For example, I could create a research question focusing on specific targets and specific crimes, credit card fraud or determining whether old or young people are more vulnerable to criminality online through anonymous profiles.
Tuesday, 11 October 2016
Words hurt / Cybernetic Self Research
https://s-media-cache-ak0.pinimg.com/564x/46/b0/a2/46b0a2ccb85331e62fe2a2dc3178d577.jpg |
When I saw this design on Pintrest, by Mathew Hayes, I instantly liked the ideology of using type in this manner within my project. This poster design is about cyber-bullying and raising awareness they are not alone and help on the table if needed, for both bully's and the bullied to sort them selves out in the right way. The idea I have in mind, gained from this poster is to have type behind or connected to my illusive image of faces and the type will communicate the documented crimes that anonymous users commit. I would use a really dark shade of grey for the type to almost match the black background and to not distract any attention away from my illusive image. Plus, this would also have a positive impact on the image as you would not see this type from far away or squinting, until up close and focusing.
I will try and make the type appear as digital as possible to reflect the cybernetic theme. I will research typefaces used on social media to further engage with the ideology behind the design and maybe position, rotate and resize the type in different compositions like Mathew to create an interesting effect. This could illustrate the different angles anonymous criminals take to manipulate the victim. Similar, to the poster design above I would make the type fade, as it gets further away from the image. This would be a good technique to draw attention to the image.
In addition, the overall composition of Mathews design draws attention to his image. A path I will definitely follow. The placement of his title type does not distract any attention off of the powerful image and the fact the image is so powerful the title type does not need to be big to capture the audiences attention. The image itself intrigues the audience to want to find out what the design is about. He also uses type in different colours for the title to cleverly express the issue and the solution to the issue. The issue is highlighted in white and the solution is clarified in red. This could also be an idea to take on board.
Subscribe to:
Posts (Atom)