SlideShare una empresa de Scribd logo
1 de 10
Noor Aqsa Syazwannie
     1081102469
    Cyberstalking
Stalker Brain Scanner
Abstract

Stalker Brain Scanner is an installation that explores inside the mind or thoughts of a stalker. The
installation consists of a hanging brain sculpture and equipped with an iPad. It is the brain
scanner, linking the innermost thoughts of a stalker to a video play. When user enter the
installation area and standing inside the brain sculpture, a short directed video about
cyberstalking will be played. The installation only can fit one user. The video is about a very
creepy and disturbing cyberstalker as he peruses victim's Facebook profile. The stalker will look at
the victim's information, photographs, recent status updates and friends list. Then he pulls up
Google Maps and finds directions to the target's home. The scene will end as he gets out of the
car, presumably to track down his target which can be you.
Introduction
Personal Context
• Cyberstalking behavior creates a paranoid feeling which is not comfortable with the
    surrounding. The victims will feel insecurity and hard to trust anyone around them. It can
    disrupt the life of the victim and leave them feeling very afraid and threatened.
• Experiencing the feeling of being stalked is personal. About one out of a thousand people
    may feel like they are being stalked. Be aware of the surrounding is very important.

Social Context
• As for social context, the behavior of a person is general. The society somehow will have the
    feeling to revenge, being obsessive and do any inappropriate behavior. In cyberstalking
    cases, the majority victims are women and most stalkers are usually men.

Cultural Context
• The trends and methods of cyberstalking behavior have become a culture. There are many
    methods used to stalk nowadays. Being stereotype is also a common attitude in the society.
Development
Techniques / Process

To build a brain sculpture, I used foam and jersey cloth. I cut the foam into small pieces and fill it
    into the cloth. I made a lot of them and place them onto the big semi-circle food cover. I
    used copper wire to place the foam cloth. The copper wire was twisted around the foam
    cloth and the food cover. The foam cloth was formed like a brain shape. After done with
    covering the food cover with the foam cloth, I sprayed the cloth with pink spray paint. Then I
    made the outline on the cloth using fabric paint.

I used iPad as the video display. Carefully hanging the iPad using copper wire inside the brain
     sculpture. The brain sculpture was hung with rope.

The video was directed by myself. The video shooting took limited space which is in a small room
    and in a car. I used Adobe After Effects to edit the video. Video trimming, color correction,
    transition and screen video capture are all used during video editing.
Development
Development
Development
Technical Diagram
Development
Floor Plan
Development
Problems & Future Planning

Time Management
    The project weeks allotted for completion sounds like a long time, but it goes by quickly.
   Especially during a short semester. Sometimes feel tempted to postpone work on the
   project because the due date seems so far off. So I make an implementation schedule that
   allocates reasonable amounts of work throughout the entire semester, then stick to that
   schedule.

Overachiever
    A common problem is selecting a topic that is far too ambitious for the allotted time. So I
   just need to remember that I have only a few weeks to finish the design, development and
   testing of my project. Besides, I need to update always and consult with the lecturer of what
   I am planning to do.

Cost Budget
    At first I want to build a cabin of brain sculpture. High cost is needed, so I have to change my
    idea on how to represent the brain in cheaper way. I decided to make the brain hanging,
    instead of building a cabin.
Conclusion
Cyberstalking is a real social problem that is fast spreading, therefore it is important
to be alert with the surroundings that addressed cyberstaking.

Más contenido relacionado

Similar a FYP Final Presentation Slides

Planning booklet
Planning bookletPlanning booklet
Planning booklet
taygage
 
Digital scrapbooking in the classroom
Digital scrapbooking in the classroomDigital scrapbooking in the classroom
Digital scrapbooking in the classroom
rsendejo
 
Final evaluation presentation part 4
Final evaluation presentation part 4Final evaluation presentation part 4
Final evaluation presentation part 4
sdh95
 

Similar a FYP Final Presentation Slides (20)

FMP Evaluation
FMP EvaluationFMP Evaluation
FMP Evaluation
 
Planning booklet
Planning bookletPlanning booklet
Planning booklet
 
Planning booklet. story book
Planning booklet. story bookPlanning booklet. story book
Planning booklet. story book
 
Planning booklet
Planning bookletPlanning booklet
Planning booklet
 
Planning booklet
Planning bookletPlanning booklet
Planning booklet
 
1.1 Initial Ideas + Context
1.1 Initial Ideas + Context1.1 Initial Ideas + Context
1.1 Initial Ideas + Context
 
Smart devices 2
Smart devices 2Smart devices 2
Smart devices 2
 
Planning Booklet
Planning BookletPlanning Booklet
Planning Booklet
 
Dt
Dt Dt
Dt
 
Stone Ward Brand Management March Meeting: Brainstorming Tech First
Stone Ward Brand Management March Meeting: Brainstorming Tech FirstStone Ward Brand Management March Meeting: Brainstorming Tech First
Stone Ward Brand Management March Meeting: Brainstorming Tech First
 
Planning booklet
Planning bookletPlanning booklet
Planning booklet
 
Community Service Initiative Journal
Community Service Initiative JournalCommunity Service Initiative Journal
Community Service Initiative Journal
 
Evaluation
EvaluationEvaluation
Evaluation
 
Planning booklet
Planning booklet Planning booklet
Planning booklet
 
Digital scrapbooking in the classroom
Digital scrapbooking in the classroomDigital scrapbooking in the classroom
Digital scrapbooking in the classroom
 
Planning booklet
Planning bookletPlanning booklet
Planning booklet
 
Critical thinking group project 350
Critical thinking  group project 350Critical thinking  group project 350
Critical thinking group project 350
 
Critical thinking
Critical thinking Critical thinking
Critical thinking
 
Final evaluation presentation part 4
Final evaluation presentation part 4Final evaluation presentation part 4
Final evaluation presentation part 4
 
Dom Midgley | Planning Booklet
Dom Midgley | Planning BookletDom Midgley | Planning Booklet
Dom Midgley | Planning Booklet
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

FYP Final Presentation Slides

  • 1. Noor Aqsa Syazwannie 1081102469 Cyberstalking Stalker Brain Scanner
  • 2. Abstract Stalker Brain Scanner is an installation that explores inside the mind or thoughts of a stalker. The installation consists of a hanging brain sculpture and equipped with an iPad. It is the brain scanner, linking the innermost thoughts of a stalker to a video play. When user enter the installation area and standing inside the brain sculpture, a short directed video about cyberstalking will be played. The installation only can fit one user. The video is about a very creepy and disturbing cyberstalker as he peruses victim's Facebook profile. The stalker will look at the victim's information, photographs, recent status updates and friends list. Then he pulls up Google Maps and finds directions to the target's home. The scene will end as he gets out of the car, presumably to track down his target which can be you.
  • 3. Introduction Personal Context • Cyberstalking behavior creates a paranoid feeling which is not comfortable with the surrounding. The victims will feel insecurity and hard to trust anyone around them. It can disrupt the life of the victim and leave them feeling very afraid and threatened. • Experiencing the feeling of being stalked is personal. About one out of a thousand people may feel like they are being stalked. Be aware of the surrounding is very important. Social Context • As for social context, the behavior of a person is general. The society somehow will have the feeling to revenge, being obsessive and do any inappropriate behavior. In cyberstalking cases, the majority victims are women and most stalkers are usually men. Cultural Context • The trends and methods of cyberstalking behavior have become a culture. There are many methods used to stalk nowadays. Being stereotype is also a common attitude in the society.
  • 4. Development Techniques / Process To build a brain sculpture, I used foam and jersey cloth. I cut the foam into small pieces and fill it into the cloth. I made a lot of them and place them onto the big semi-circle food cover. I used copper wire to place the foam cloth. The copper wire was twisted around the foam cloth and the food cover. The foam cloth was formed like a brain shape. After done with covering the food cover with the foam cloth, I sprayed the cloth with pink spray paint. Then I made the outline on the cloth using fabric paint. I used iPad as the video display. Carefully hanging the iPad using copper wire inside the brain sculpture. The brain sculpture was hung with rope. The video was directed by myself. The video shooting took limited space which is in a small room and in a car. I used Adobe After Effects to edit the video. Video trimming, color correction, transition and screen video capture are all used during video editing.
  • 9. Development Problems & Future Planning Time Management The project weeks allotted for completion sounds like a long time, but it goes by quickly. Especially during a short semester. Sometimes feel tempted to postpone work on the project because the due date seems so far off. So I make an implementation schedule that allocates reasonable amounts of work throughout the entire semester, then stick to that schedule. Overachiever A common problem is selecting a topic that is far too ambitious for the allotted time. So I just need to remember that I have only a few weeks to finish the design, development and testing of my project. Besides, I need to update always and consult with the lecturer of what I am planning to do. Cost Budget At first I want to build a cabin of brain sculpture. High cost is needed, so I have to change my idea on how to represent the brain in cheaper way. I decided to make the brain hanging, instead of building a cabin.
  • 10. Conclusion Cyberstalking is a real social problem that is fast spreading, therefore it is important to be alert with the surroundings that addressed cyberstaking.