SlideShare a Scribd company logo
1 of 15
COMM2324 Assessment 2 Part A | Project Plan | Page 1
COMM2324 Interdisciplinary CommunicationProject
Project Plan
Team Name:MV
Project:Cybersecurity
Tutorial: Wednesday, 2:30 pm
Contents
1. Purpose 2
2. Aim 2
3. Context 2
4. Audience 4
5. Message 4
6. Objectives 4
7. Stakeholders 5
8. Challenges & Constraints 5
9. Point of Difference 7
10. Project Form 7
Appendix A: Production Plan 10
Appendix B: Project Ideation 10
11. References:
14
COMM2324 Assessment 2 Part A | Project Plan | Page 2
1. Purpose:
The purpose of our marketing schemes is to raise a greater awareness on the dangers of
cyber breaches around campus and inform students of their individual responsibility and
input in maintaining the cyber safety of the university. We are doing this because
knowledge on cybersecurity is an important factor in keeping the personal information of
both the university and students safe from hackers.
2. Aim:
Our aim is to raise enough awareness and help students understand the dangers of cyber
breaches and their vulnerability to it. We want students to be accountable in being cyber
aware at RMIT and outside of university and be responsible in keeping the university safe
from cyber breaches. We want them to respond to cyber threats, such as scams,
immediately and report any suspicious activity to the university. Therefore, we want to find
more interactive and interesting ways to reach out to students in order for them to take
cybersecurity seriously.
3. Context:
University networks are the source of important intellectual property data as well as
student personal information and sensitive business or political documents. Hence,
cybersecurity practice plays a central role in daily university management. Recently, it is in
the spotlight after Australian National University was reported to be the target of a serious
cyber attack. According to McMurdie C “Universities are a top target for cybercriminals” and
yet this issue has not been solved thoroughly. Overall, cybersecurity breaches have almost
doubled in the last five years – and the financial impact of these breaches is expected to
exceed A$10.1 trillion over the next five years (WEF Global Risk Report 2018). Since
cybersecurity is a socio-technical problem, it calls for all participants not only the technology
department (Astin G 2018). According to the data from RMIT’s Office of the Chief
Information Security Officer (CISO), even though RMIT has not yet been impacted by a
major cyber attack, the university is exposed to great cyber-threats on a daily basis due to
very big number of users accessing the RMIT network and about 500 000 emails are
managed via the servers everyday.
We conducted a survey to examine the level of cyber-awareness within city campus as well
as their reaction to the previous campaign of CISO. This survey reveals many noticeable
understandings of student cyber habits and their attitude towards this subject. Most of the
students heard about this term and all of them aware of its importance. They also think that
they are vulnerable to hacking in the future. However, 94,1% of responses showed that
students tend to give personal information when asked on the internet such as their email
accounts or birthday though all of them never pay attention to spam emails. The number of
students having tendency to give their details to a stranger is dominant over the rest. From
the survey, their habit of setting their password is also addressed. There is a big number of
students using the same password and their personal information for every account even
though most of them try to make their password complex. We also combine the survey
COMM2324 Assessment 2 Part A | Project Plan | Page 3
result from CISO which indicates that students primary use non-RMIT issued devices to
access RMIT networks which are harder to regulate using technology. This survey result also
shows that about half of university software online downloaded by students is from non-
trusted stores. Besides, only two in three students have security software on their mobile
phones and laptops. However, 22% of them avoid updating their mobile device regularly.
The research from CISO also pointed out in 2017, around 41% of students did not have their
devices scanned before opening documents, due to perceived time constraints or deeming
this step unnecessary. Noticeably, a third of students store passwords on their computer or
write them down, with around the same number admitting to using the same password for
work and personal accounts. The survey also indicated a negative result for student reaction
to previous campaigns of CISO. To conclude from both surveys, RMIT students are well
informed of this issue but the level of security awareness within the student body is still low.
They do not fully understand the potential risks behind their common internet practices and
tend to ignore the cybersecurity messages since they think it is boring and too common.
For this phase of the campaign, the first challenge to be faced is the wide area of RMIT city
campus. In addition to that, the campus is fragmented in terms of location and the
community is not closed so it is hard to capture students’ attention at once. Moreover, this
disperse and diverse audience spends less time on campus than previous student
generations, and are bombarded with internal and external messages every day so that they
tend to ignore any traditional ads on their way. As such, it intrigues us to create a campaign
that is original and get to the target audience’s top of mind in the most natural, fastest and
unexpected way. The second obstacle that we encountered is the limited budget from our
client. Taking an awareness campaign to the next level on a zero budget requires us to
exploit every useable channel and simplify the project idea to maximize the capacity we
have.
In addition to its expansive digital footprint, RMIT University is embarking on a digital
transformation journey to improve the experience, effectiveness, and quality of its teaching
and learning for students and staff. Cybersecurity is crucial to the enablement of this event
and the secure transformation will become increasingly more important as the university
increases its digital presence and student base. From the finding, most of RMIT’s cyber
breaches come from inadvertent data breaches, carelessness and insider attacks. Hence, it
is important to encourage a cyber-aware culture to reduce and manage these risks as well
as prepare for external threats. There are many successful cybersecurity campaigns around
the globe such as Cyber Security November 2017 Awareness campaign from UK parliament
(UK parliament 2017), UTSA Capital Campaign: Cybersecurity Initiatives from The University
of Texas (The University of Texas 2015), Cyber Security Awareness Campaign from Eastern
Michigan University (Eastern Michigan University 2013)
COMM2324 Assessment 2 Part A | Project Plan | Page 4
4. Audience:
The project will run in Australia, Vietnam and Barcelona but for the first phase of this
project, we are targeting students and staff members in the Melbourne campuses to
determine the effectiveness of the project.
Demographic:
● Age: 18 - 30
● Gender: All types of genders
● RMIT students.
Geographic:
● Currently study in RMIT Melbourne Campuses.
Psychographic:
● They’re aware of the risks of having data stored online, and know that they’re
vulnerable, but have enough trust that nothing terrible will happen to them. (Alton
2017)
● They still concern about having other people looking or be able to access their
personal information, however, when it comes to a sale, exclusive coupon, they tend
to give their information (personal details, credit card details) easily. (Malcolm
2013).
Behaviour:
● They unknowingly save passwords on computers and re-use the same passwords
which makes them more vulnerable to being hacked.
● They may also unknowingly give out personal information to scams.
● They tend use a lot of technology and social media platforms, thus they may be
oblivious to threats that some platforms may possess.
5. Message:
Our campaign seeks to instil and confront students with the fear of being hacked through a
shocking and frightening approach. Instead of relying on students to find information
themselves, our campaign will interact with students in a way that is more memorable.
6. Objectives:
This campaign will be launched in semester 1 2019, from week 2 to week 12.
- Producing 1 to 2 ambient ad and launch it from week 2 to week 12 in city campus to
gain attention about our campaign.
- Producing a 30-60-second video and run it on social media and screens around
Melbourne’s campuses in semester 1 2019 to raise awareness among RMIT students
about cybersecurity.
- Producing 1 poster/digital poster and run it on social media and screens around
Melbourne’s campuses in semester 1 2019 to engage with RMIT students about
cybersecurity.
COMM2324 Assessment 2 Part A | Project Plan | Page 5
7. Stakeholders:
WHO WHY HOW
Office of the Chief
Information Security Officer
RMIT
They are the clients for our
project and we have to
consult with them when
making important decisions.
When they come in for
meetings, we can talk to
them face to face. We can
also arrange appointments
with them either directly
through email or through
Ella.
Students at RMIT They are our target
audience and thus, we need
to involve them and
approach in a way that is
interesting to them.
We can send out surveys
throughout RMIT to get a
variety of opinions. We can
communicate with them
through emails, our ambient
ads and videos
Staff members at RMIT We need to collaborate with
staff members to enable our
project to be effective and
let them know what is going
on.
We can email staff members
with permission of the client
and RMIT. We can
communicate with them
through emails, our ambient
ads and videos
Teaching team We need to discuss and
involve the teaching team in
order to receive feedback
on our project in order to
improve it and acknowledge
that it is going in the right
path.
We would have face-to-face
discussions with the
teaching team or contact
them through email during
after hours.
8. Challenges & Constraints:
Challenges and issues
Challenges Impact on the project Solution plan
Lack of technical skill and
knowledge (for examples:
Some ideas that we came up
with are impossible to carry
Understanding each other’s
strength and weakness.
COMM2324 Assessment 2 Part A | Project Plan | Page 6
app/ website coding, IT
skills, etc…)
out. For examples we
intended to have a hacking
experiment for students but
we do not have enough
know-how and time to
conduct.
Simplify our plan or seek
help from other friends.
Time limits We only have a short time to
carry out the campaign. In
the meantime, cybersecurity
is a very different and new
area for us so it takes lots of
time to understand as well as
to do research.
Dividing tasks among the
group, each person will
specialize in a specific area
to help each other
understand about the
terminologies and difficult
knowledge.
Constraints
Constraints Impact on the project Solution plan
Legal/ copyright issues When it comes to
cybersecurity, it’s hard for us
to obtain the legal right to
conduct some ideas for our
campaign such as hacking
mockup.
We have to ensure the
fulfilment of the plan while
complying with
cybersecurity rules.
Students not attending
school regularly at the city
campus
This habit of the millennials
will alter the effectiveness of
the campaign and may result
in false reflection and
statistics.
Never make assumptions
and always back up with
real statistics, surveys and
reliable information
sources.
Cybersecurity resource
limitations
Since cybersecurity involves
private and sensitive
information, we can not get
access to some resources
online.
Try to keep in touch with
our clients and seek for
their help or advice.
Low budget for the
campaign
Some ideas that we came up
with are impossible to carry
out.
Always come up with other
substitute plans that remain
soluble and creative. All the
ideas must be simple yet
original.
COMM2324 Assessment 2 Part A | Project Plan | Page 7
9. Point of Difference:
The education and awareness program that RMIT cybersecurity has set up proceeds to
spread awareness through websites, cybersecurity booklets, their social media accounts and
more. However, their ways of communicating has no immediate interaction with students
and relies on students to find the information themselves. For our ideas, we want to
interact with students and lay out the problem in front of them through videos played in
tutorials and appealing ambient ads that instill fear in them so that they will consider the
dangers of cyber breaches. It is unique because our way of approaching students is more
three dimensional and we want them to experience that fear and anxiety of being hacked in
order to take it more seriously.
10. Project Form:
What we are going to produce How we plan to achieve it
1. Ambient Ad
(our ideas are in order of the budget
required from highest to lowest)
Elevator
- There are several options for our
first idea of an ambient ad and it is
to be located in specific elevators in
RMIT.
- The first idea is to replace the
mirrors in the elevator with screens
that will be able to screen a video or
an interactive display that will
attract the attention of people.
- The reason we chose an elevator is
that it is fairly public however during
the short period of time in silence in
the elevator we will be able to
engage them with our message.
- The second idea is to have an
ambient ad on the elevator doors.
As our content and text have yet to
be finalised, it is definite that we will
be incorporating our symbol ‘the
eye’ that represents the threats of
being hacked. We plan for the
opening and closing of the doors to
signify the message of awareness
towards cybersecurity.
Webcam cover
COMM2324 Assessment 2 Part A | Project Plan | Page 8
- We will be creating samples of
webcam covers that we plan to
place on the computers around
RMIT. The design of the cover will
be half a solid sticker and the other
half will be ‘the eye’ symbol. The
cover will come with a leaflet that
contains information and resources
as to how we can prevent scams and
hacking.
Bathroom
- The bathroom is an enclosed space
in which an individual would feel as
though they have privacy, this will
represent the level of privacy which
is hard to achieve in the online
world.
- The way we plan to achieve this is to
place posters in strategic areas (eg.
on the back of a cubicle door,
mirror, along with the walls). The
posters will contain ‘the eye’ which
symbolises the eyes watching every
action made online.
2. Video - The content of this video will be
visual and informative of the behind
of the scenes and the real-life
experiences and circumstances of
not protecting your personal details
online. The video will consist of
screen recordings of daily
conversations revealing personal
information, scams that we
encounter and showing students the
COMM2324 Assessment 2 Part A | Project Plan | Page 9
consequences of not being cyber
aware.
- We intend for this video to be a fear
factor based, as we want students
and viewers to treat it as a wake-up
call.
- CCTV-liked footage will be made, to
signify ‘always being watched’. This
ties in with our symbol ‘the eye’ to
visually give the impression that
there is always someone watching.
- a back to back scene of two people
on their computer, complete
strangers doing their respective
things, however unaware that one
of them is a hacker.
3. Poster - The poster will be visual appealing
with simple and original copy that is
easy to remember and catchy. The
characteristic and graphic design
(The posters will contain ‘the eye’
which symbolises the eyes watching
every action made online) on the
poster will be similar to the ambient
ads so that all of the IMC tools are
linked, creating consistent identity
for the whole campaign.
- This poster will be a fear factor
based.
- We plan to distribute the digital
version of the poster by display it on
the screen around campus. We also
place the print version at common
space around campus including
library, toilet, dining hall, etc...
COMM2324 Assessment 2 Part A | Project Plan | Page 10
Appendix A: Production Plan:
Link:
https://docs.google.com/spreadsheets/d/1sPsHjDXCjMI8XwO956eL_jBeuBMx3d2capd5PJeL
jQg/edit?usp=sharing
Appendix B: Project Ideation:
Mind map
COMM2324 Assessment 2 Part A | Project Plan | Page 11
COMM2324 Assessment 2 Part A | Project Plan | Page 12
Additional research: Survey
COMM2324 Assessment 2 Part A | Project Plan | Page 13
COMM2324 Assessment 2 Part A | Project Plan | Page 14
COMM2324 Assessment 2 Part A | Project Plan | Page 15
References:
Alton L 2017, ‘How Millennials Think Differently About Online Security’, Forbes, viewed 20
August 2018, <https://www.forbes.com/sites/larryalton/2017/12/01/how-millennials-think-
differently-about-online-security/#756492e4705f>.
Astin G 2018, ‘How Australian universities can get better at cyber security’, University of
New South Wales, viewed 20 August 2018, <https://newsroom.unsw.edu.au/news/science-
tech/how-australian-universities-can-get-better-cyber-security>
Eastern Michigan University 2013, ‘Cyber Security Awareness’, Eastern Michigan University,
viewed 20 August 2018,
<https://www.emich.edu/it/security/initiatives/cybersac/cybersac.php>
Malcolm H 2013, ‘Millennials don’t worry about online privacy’, USA Today, viewed 20
August 2018, <https://www.usatoday.com/story/money/business/2013/04/21/millennials-
personal-info-online/2087989/>.
The University of Texas 2015, ‘UTSA raises $180 million in first-ever capital campaign,
exceeds goal by more than $60 million’, The University of Texas, viewed 20 August 2018,
<http://www.utsa.edu/today/2015/10/capitalcampaign.html>
UK parliament 2017, ‘Cyber Security’, UK parliament, viewed 20 August 2018,
<https://www.parliament.uk/mps-lords-and-offices/offices/bicameral/parliamentary-
digital-service/cyber-security/>

More Related Content

What's hot

Robert_Monegro-Cover_Letter-Sum_Oct_2016 Hostos 2
Robert_Monegro-Cover_Letter-Sum_Oct_2016 Hostos 2Robert_Monegro-Cover_Letter-Sum_Oct_2016 Hostos 2
Robert_Monegro-Cover_Letter-Sum_Oct_2016 Hostos 2Robert Monegro
 
A PANDEMIC STUDY ON INFORMATION AND COMMUNICATION TECHNOLOGY(ICT) IN HIGHER E...
A PANDEMIC STUDY ON INFORMATION AND COMMUNICATION TECHNOLOGY(ICT) IN HIGHER E...A PANDEMIC STUDY ON INFORMATION AND COMMUNICATION TECHNOLOGY(ICT) IN HIGHER E...
A PANDEMIC STUDY ON INFORMATION AND COMMUNICATION TECHNOLOGY(ICT) IN HIGHER E...Thiagarajar College of Preceptors (Aided)
 
Web-based Learning In Periods of Crisis: Reflections on the Impact of Covid-19
Web-based Learning In Periods of Crisis: Reflections on the Impact of Covid-19Web-based Learning In Periods of Crisis: Reflections on the Impact of Covid-19
Web-based Learning In Periods of Crisis: Reflections on the Impact of Covid-19AIRCC Publishing Corporation
 
Digital Technologies Report_Nov2015
Digital Technologies Report_Nov2015Digital Technologies Report_Nov2015
Digital Technologies Report_Nov2015Andrew Tui
 
Social Media is a CTE Necessity
Social Media is a CTE NecessitySocial Media is a CTE Necessity
Social Media is a CTE NecessityRachel Mezzatesta
 
Katrina Tinambacan
Katrina TinambacanKatrina Tinambacan
Katrina TinambacanRose Yanna
 

What's hot (6)

Robert_Monegro-Cover_Letter-Sum_Oct_2016 Hostos 2
Robert_Monegro-Cover_Letter-Sum_Oct_2016 Hostos 2Robert_Monegro-Cover_Letter-Sum_Oct_2016 Hostos 2
Robert_Monegro-Cover_Letter-Sum_Oct_2016 Hostos 2
 
A PANDEMIC STUDY ON INFORMATION AND COMMUNICATION TECHNOLOGY(ICT) IN HIGHER E...
A PANDEMIC STUDY ON INFORMATION AND COMMUNICATION TECHNOLOGY(ICT) IN HIGHER E...A PANDEMIC STUDY ON INFORMATION AND COMMUNICATION TECHNOLOGY(ICT) IN HIGHER E...
A PANDEMIC STUDY ON INFORMATION AND COMMUNICATION TECHNOLOGY(ICT) IN HIGHER E...
 
Web-based Learning In Periods of Crisis: Reflections on the Impact of Covid-19
Web-based Learning In Periods of Crisis: Reflections on the Impact of Covid-19Web-based Learning In Periods of Crisis: Reflections on the Impact of Covid-19
Web-based Learning In Periods of Crisis: Reflections on the Impact of Covid-19
 
Digital Technologies Report_Nov2015
Digital Technologies Report_Nov2015Digital Technologies Report_Nov2015
Digital Technologies Report_Nov2015
 
Social Media is a CTE Necessity
Social Media is a CTE NecessitySocial Media is a CTE Necessity
Social Media is a CTE Necessity
 
Katrina Tinambacan
Katrina TinambacanKatrina Tinambacan
Katrina Tinambacan
 

Similar to Icp assignment 2 a_group 11_project plan

IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...IRJET Journal
 
Digital Citizenship in Education Visioning Safety and Responsibilities in Dig...
Digital Citizenship in Education Visioning Safety and Responsibilities in Dig...Digital Citizenship in Education Visioning Safety and Responsibilities in Dig...
Digital Citizenship in Education Visioning Safety and Responsibilities in Dig...ijtsrd
 
UOW Faculty Of Arts Student Engagement &amp; Communication Review (Spring 2...
UOW Faculty Of Arts   Student Engagement &amp; Communication Review (Spring 2...UOW Faculty Of Arts   Student Engagement &amp; Communication Review (Spring 2...
UOW Faculty Of Arts Student Engagement &amp; Communication Review (Spring 2...Dane Cutler
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdfmeetsolanki44
 
Mobile marketing.social media international students
Mobile marketing.social media international studentsMobile marketing.social media international students
Mobile marketing.social media international studentsNational University
 
Mobile marketing.social media international studentsr1
Mobile marketing.social media international studentsr1Mobile marketing.social media international studentsr1
Mobile marketing.social media international studentsr1National University
 
IRJET- Prospects of Online Advertising and its Implications on Children
IRJET-  	  Prospects of Online Advertising and its Implications on ChildrenIRJET-  	  Prospects of Online Advertising and its Implications on Children
IRJET- Prospects of Online Advertising and its Implications on ChildrenIRJET Journal
 
The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...
The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...
The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...BIJFMCF Journal
 
Cyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network securityCyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network securityIJICTJOURNAL
 
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...Keiko Tanaka
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your schoolJune Wall
 
NMC Strategic Brief - Digital Literacy in Higher Education
NMC Strategic Brief - Digital Literacy in Higher EducationNMC Strategic Brief - Digital Literacy in Higher Education
NMC Strategic Brief - Digital Literacy in Higher EducationCourtney Miller
 
The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...
The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...
The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...FinancialMarketCorpo
 
A different perspective on university IT
A different perspective on university ITA different perspective on university IT
A different perspective on university ITsarahmusselbrook
 
Learning Experience Design (ATD 2016 ICE W316)
Learning Experience Design (ATD 2016 ICE W316)Learning Experience Design (ATD 2016 ICE W316)
Learning Experience Design (ATD 2016 ICE W316)Chan Lee
 
Mobile Marketing and Social Media MBA specialization at NU
Mobile Marketing and Social Media MBA specialization at NUMobile Marketing and Social Media MBA specialization at NU
Mobile Marketing and Social Media MBA specialization at NUNational University
 
The Academic Performance and the Computer Programming Anxiety of BSIT Student...
The Academic Performance and the Computer Programming Anxiety of BSIT Student...The Academic Performance and the Computer Programming Anxiety of BSIT Student...
The Academic Performance and the Computer Programming Anxiety of BSIT Student...IJAEMSJORNAL
 

Similar to Icp assignment 2 a_group 11_project plan (20)

Doc handout
Doc handoutDoc handout
Doc handout
 
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
 
Digital Citizenship in Education Visioning Safety and Responsibilities in Dig...
Digital Citizenship in Education Visioning Safety and Responsibilities in Dig...Digital Citizenship in Education Visioning Safety and Responsibilities in Dig...
Digital Citizenship in Education Visioning Safety and Responsibilities in Dig...
 
UOW Faculty Of Arts Student Engagement &amp; Communication Review (Spring 2...
UOW Faculty Of Arts   Student Engagement &amp; Communication Review (Spring 2...UOW Faculty Of Arts   Student Engagement &amp; Communication Review (Spring 2...
UOW Faculty Of Arts Student Engagement &amp; Communication Review (Spring 2...
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
 
Mobile marketing.social media international students
Mobile marketing.social media international studentsMobile marketing.social media international students
Mobile marketing.social media international students
 
Mobile marketing.social media international studentsr1
Mobile marketing.social media international studentsr1Mobile marketing.social media international studentsr1
Mobile marketing.social media international studentsr1
 
IRJET- Prospects of Online Advertising and its Implications on Children
IRJET-  	  Prospects of Online Advertising and its Implications on ChildrenIRJET-  	  Prospects of Online Advertising and its Implications on Children
IRJET- Prospects of Online Advertising and its Implications on Children
 
The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...
The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...
The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...
 
The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...
The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...
The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...
 
Cyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network securityCyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network security
 
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your school
 
NMC Strategic Brief - Digital Literacy in Higher Education
NMC Strategic Brief - Digital Literacy in Higher EducationNMC Strategic Brief - Digital Literacy in Higher Education
NMC Strategic Brief - Digital Literacy in Higher Education
 
The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...
The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...
The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...
 
A different perspective on university IT
A different perspective on university ITA different perspective on university IT
A different perspective on university IT
 
Learning Experience Design (ATD 2016 ICE W316)
Learning Experience Design (ATD 2016 ICE W316)Learning Experience Design (ATD 2016 ICE W316)
Learning Experience Design (ATD 2016 ICE W316)
 
The Infleunce of digital literacy and Financial self Efficy.pdf
The Infleunce of digital literacy and Financial self Efficy.pdfThe Infleunce of digital literacy and Financial self Efficy.pdf
The Infleunce of digital literacy and Financial self Efficy.pdf
 
Mobile Marketing and Social Media MBA specialization at NU
Mobile Marketing and Social Media MBA specialization at NUMobile Marketing and Social Media MBA specialization at NU
Mobile Marketing and Social Media MBA specialization at NU
 
The Academic Performance and the Computer Programming Anxiety of BSIT Student...
The Academic Performance and the Computer Programming Anxiety of BSIT Student...The Academic Performance and the Computer Programming Anxiety of BSIT Student...
The Academic Performance and the Computer Programming Anxiety of BSIT Student...
 

Recently uploaded

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 

Recently uploaded (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 

Icp assignment 2 a_group 11_project plan

  • 1. COMM2324 Assessment 2 Part A | Project Plan | Page 1 COMM2324 Interdisciplinary CommunicationProject Project Plan Team Name:MV Project:Cybersecurity Tutorial: Wednesday, 2:30 pm Contents 1. Purpose 2 2. Aim 2 3. Context 2 4. Audience 4 5. Message 4 6. Objectives 4 7. Stakeholders 5 8. Challenges & Constraints 5 9. Point of Difference 7 10. Project Form 7 Appendix A: Production Plan 10 Appendix B: Project Ideation 10 11. References: 14
  • 2. COMM2324 Assessment 2 Part A | Project Plan | Page 2 1. Purpose: The purpose of our marketing schemes is to raise a greater awareness on the dangers of cyber breaches around campus and inform students of their individual responsibility and input in maintaining the cyber safety of the university. We are doing this because knowledge on cybersecurity is an important factor in keeping the personal information of both the university and students safe from hackers. 2. Aim: Our aim is to raise enough awareness and help students understand the dangers of cyber breaches and their vulnerability to it. We want students to be accountable in being cyber aware at RMIT and outside of university and be responsible in keeping the university safe from cyber breaches. We want them to respond to cyber threats, such as scams, immediately and report any suspicious activity to the university. Therefore, we want to find more interactive and interesting ways to reach out to students in order for them to take cybersecurity seriously. 3. Context: University networks are the source of important intellectual property data as well as student personal information and sensitive business or political documents. Hence, cybersecurity practice plays a central role in daily university management. Recently, it is in the spotlight after Australian National University was reported to be the target of a serious cyber attack. According to McMurdie C “Universities are a top target for cybercriminals” and yet this issue has not been solved thoroughly. Overall, cybersecurity breaches have almost doubled in the last five years – and the financial impact of these breaches is expected to exceed A$10.1 trillion over the next five years (WEF Global Risk Report 2018). Since cybersecurity is a socio-technical problem, it calls for all participants not only the technology department (Astin G 2018). According to the data from RMIT’s Office of the Chief Information Security Officer (CISO), even though RMIT has not yet been impacted by a major cyber attack, the university is exposed to great cyber-threats on a daily basis due to very big number of users accessing the RMIT network and about 500 000 emails are managed via the servers everyday. We conducted a survey to examine the level of cyber-awareness within city campus as well as their reaction to the previous campaign of CISO. This survey reveals many noticeable understandings of student cyber habits and their attitude towards this subject. Most of the students heard about this term and all of them aware of its importance. They also think that they are vulnerable to hacking in the future. However, 94,1% of responses showed that students tend to give personal information when asked on the internet such as their email accounts or birthday though all of them never pay attention to spam emails. The number of students having tendency to give their details to a stranger is dominant over the rest. From the survey, their habit of setting their password is also addressed. There is a big number of students using the same password and their personal information for every account even though most of them try to make their password complex. We also combine the survey
  • 3. COMM2324 Assessment 2 Part A | Project Plan | Page 3 result from CISO which indicates that students primary use non-RMIT issued devices to access RMIT networks which are harder to regulate using technology. This survey result also shows that about half of university software online downloaded by students is from non- trusted stores. Besides, only two in three students have security software on their mobile phones and laptops. However, 22% of them avoid updating their mobile device regularly. The research from CISO also pointed out in 2017, around 41% of students did not have their devices scanned before opening documents, due to perceived time constraints or deeming this step unnecessary. Noticeably, a third of students store passwords on their computer or write them down, with around the same number admitting to using the same password for work and personal accounts. The survey also indicated a negative result for student reaction to previous campaigns of CISO. To conclude from both surveys, RMIT students are well informed of this issue but the level of security awareness within the student body is still low. They do not fully understand the potential risks behind their common internet practices and tend to ignore the cybersecurity messages since they think it is boring and too common. For this phase of the campaign, the first challenge to be faced is the wide area of RMIT city campus. In addition to that, the campus is fragmented in terms of location and the community is not closed so it is hard to capture students’ attention at once. Moreover, this disperse and diverse audience spends less time on campus than previous student generations, and are bombarded with internal and external messages every day so that they tend to ignore any traditional ads on their way. As such, it intrigues us to create a campaign that is original and get to the target audience’s top of mind in the most natural, fastest and unexpected way. The second obstacle that we encountered is the limited budget from our client. Taking an awareness campaign to the next level on a zero budget requires us to exploit every useable channel and simplify the project idea to maximize the capacity we have. In addition to its expansive digital footprint, RMIT University is embarking on a digital transformation journey to improve the experience, effectiveness, and quality of its teaching and learning for students and staff. Cybersecurity is crucial to the enablement of this event and the secure transformation will become increasingly more important as the university increases its digital presence and student base. From the finding, most of RMIT’s cyber breaches come from inadvertent data breaches, carelessness and insider attacks. Hence, it is important to encourage a cyber-aware culture to reduce and manage these risks as well as prepare for external threats. There are many successful cybersecurity campaigns around the globe such as Cyber Security November 2017 Awareness campaign from UK parliament (UK parliament 2017), UTSA Capital Campaign: Cybersecurity Initiatives from The University of Texas (The University of Texas 2015), Cyber Security Awareness Campaign from Eastern Michigan University (Eastern Michigan University 2013)
  • 4. COMM2324 Assessment 2 Part A | Project Plan | Page 4 4. Audience: The project will run in Australia, Vietnam and Barcelona but for the first phase of this project, we are targeting students and staff members in the Melbourne campuses to determine the effectiveness of the project. Demographic: ● Age: 18 - 30 ● Gender: All types of genders ● RMIT students. Geographic: ● Currently study in RMIT Melbourne Campuses. Psychographic: ● They’re aware of the risks of having data stored online, and know that they’re vulnerable, but have enough trust that nothing terrible will happen to them. (Alton 2017) ● They still concern about having other people looking or be able to access their personal information, however, when it comes to a sale, exclusive coupon, they tend to give their information (personal details, credit card details) easily. (Malcolm 2013). Behaviour: ● They unknowingly save passwords on computers and re-use the same passwords which makes them more vulnerable to being hacked. ● They may also unknowingly give out personal information to scams. ● They tend use a lot of technology and social media platforms, thus they may be oblivious to threats that some platforms may possess. 5. Message: Our campaign seeks to instil and confront students with the fear of being hacked through a shocking and frightening approach. Instead of relying on students to find information themselves, our campaign will interact with students in a way that is more memorable. 6. Objectives: This campaign will be launched in semester 1 2019, from week 2 to week 12. - Producing 1 to 2 ambient ad and launch it from week 2 to week 12 in city campus to gain attention about our campaign. - Producing a 30-60-second video and run it on social media and screens around Melbourne’s campuses in semester 1 2019 to raise awareness among RMIT students about cybersecurity. - Producing 1 poster/digital poster and run it on social media and screens around Melbourne’s campuses in semester 1 2019 to engage with RMIT students about cybersecurity.
  • 5. COMM2324 Assessment 2 Part A | Project Plan | Page 5 7. Stakeholders: WHO WHY HOW Office of the Chief Information Security Officer RMIT They are the clients for our project and we have to consult with them when making important decisions. When they come in for meetings, we can talk to them face to face. We can also arrange appointments with them either directly through email or through Ella. Students at RMIT They are our target audience and thus, we need to involve them and approach in a way that is interesting to them. We can send out surveys throughout RMIT to get a variety of opinions. We can communicate with them through emails, our ambient ads and videos Staff members at RMIT We need to collaborate with staff members to enable our project to be effective and let them know what is going on. We can email staff members with permission of the client and RMIT. We can communicate with them through emails, our ambient ads and videos Teaching team We need to discuss and involve the teaching team in order to receive feedback on our project in order to improve it and acknowledge that it is going in the right path. We would have face-to-face discussions with the teaching team or contact them through email during after hours. 8. Challenges & Constraints: Challenges and issues Challenges Impact on the project Solution plan Lack of technical skill and knowledge (for examples: Some ideas that we came up with are impossible to carry Understanding each other’s strength and weakness.
  • 6. COMM2324 Assessment 2 Part A | Project Plan | Page 6 app/ website coding, IT skills, etc…) out. For examples we intended to have a hacking experiment for students but we do not have enough know-how and time to conduct. Simplify our plan or seek help from other friends. Time limits We only have a short time to carry out the campaign. In the meantime, cybersecurity is a very different and new area for us so it takes lots of time to understand as well as to do research. Dividing tasks among the group, each person will specialize in a specific area to help each other understand about the terminologies and difficult knowledge. Constraints Constraints Impact on the project Solution plan Legal/ copyright issues When it comes to cybersecurity, it’s hard for us to obtain the legal right to conduct some ideas for our campaign such as hacking mockup. We have to ensure the fulfilment of the plan while complying with cybersecurity rules. Students not attending school regularly at the city campus This habit of the millennials will alter the effectiveness of the campaign and may result in false reflection and statistics. Never make assumptions and always back up with real statistics, surveys and reliable information sources. Cybersecurity resource limitations Since cybersecurity involves private and sensitive information, we can not get access to some resources online. Try to keep in touch with our clients and seek for their help or advice. Low budget for the campaign Some ideas that we came up with are impossible to carry out. Always come up with other substitute plans that remain soluble and creative. All the ideas must be simple yet original.
  • 7. COMM2324 Assessment 2 Part A | Project Plan | Page 7 9. Point of Difference: The education and awareness program that RMIT cybersecurity has set up proceeds to spread awareness through websites, cybersecurity booklets, their social media accounts and more. However, their ways of communicating has no immediate interaction with students and relies on students to find the information themselves. For our ideas, we want to interact with students and lay out the problem in front of them through videos played in tutorials and appealing ambient ads that instill fear in them so that they will consider the dangers of cyber breaches. It is unique because our way of approaching students is more three dimensional and we want them to experience that fear and anxiety of being hacked in order to take it more seriously. 10. Project Form: What we are going to produce How we plan to achieve it 1. Ambient Ad (our ideas are in order of the budget required from highest to lowest) Elevator - There are several options for our first idea of an ambient ad and it is to be located in specific elevators in RMIT. - The first idea is to replace the mirrors in the elevator with screens that will be able to screen a video or an interactive display that will attract the attention of people. - The reason we chose an elevator is that it is fairly public however during the short period of time in silence in the elevator we will be able to engage them with our message. - The second idea is to have an ambient ad on the elevator doors. As our content and text have yet to be finalised, it is definite that we will be incorporating our symbol ‘the eye’ that represents the threats of being hacked. We plan for the opening and closing of the doors to signify the message of awareness towards cybersecurity. Webcam cover
  • 8. COMM2324 Assessment 2 Part A | Project Plan | Page 8 - We will be creating samples of webcam covers that we plan to place on the computers around RMIT. The design of the cover will be half a solid sticker and the other half will be ‘the eye’ symbol. The cover will come with a leaflet that contains information and resources as to how we can prevent scams and hacking. Bathroom - The bathroom is an enclosed space in which an individual would feel as though they have privacy, this will represent the level of privacy which is hard to achieve in the online world. - The way we plan to achieve this is to place posters in strategic areas (eg. on the back of a cubicle door, mirror, along with the walls). The posters will contain ‘the eye’ which symbolises the eyes watching every action made online. 2. Video - The content of this video will be visual and informative of the behind of the scenes and the real-life experiences and circumstances of not protecting your personal details online. The video will consist of screen recordings of daily conversations revealing personal information, scams that we encounter and showing students the
  • 9. COMM2324 Assessment 2 Part A | Project Plan | Page 9 consequences of not being cyber aware. - We intend for this video to be a fear factor based, as we want students and viewers to treat it as a wake-up call. - CCTV-liked footage will be made, to signify ‘always being watched’. This ties in with our symbol ‘the eye’ to visually give the impression that there is always someone watching. - a back to back scene of two people on their computer, complete strangers doing their respective things, however unaware that one of them is a hacker. 3. Poster - The poster will be visual appealing with simple and original copy that is easy to remember and catchy. The characteristic and graphic design (The posters will contain ‘the eye’ which symbolises the eyes watching every action made online) on the poster will be similar to the ambient ads so that all of the IMC tools are linked, creating consistent identity for the whole campaign. - This poster will be a fear factor based. - We plan to distribute the digital version of the poster by display it on the screen around campus. We also place the print version at common space around campus including library, toilet, dining hall, etc...
  • 10. COMM2324 Assessment 2 Part A | Project Plan | Page 10 Appendix A: Production Plan: Link: https://docs.google.com/spreadsheets/d/1sPsHjDXCjMI8XwO956eL_jBeuBMx3d2capd5PJeL jQg/edit?usp=sharing Appendix B: Project Ideation: Mind map
  • 11. COMM2324 Assessment 2 Part A | Project Plan | Page 11
  • 12. COMM2324 Assessment 2 Part A | Project Plan | Page 12 Additional research: Survey
  • 13. COMM2324 Assessment 2 Part A | Project Plan | Page 13
  • 14. COMM2324 Assessment 2 Part A | Project Plan | Page 14
  • 15. COMM2324 Assessment 2 Part A | Project Plan | Page 15 References: Alton L 2017, ‘How Millennials Think Differently About Online Security’, Forbes, viewed 20 August 2018, <https://www.forbes.com/sites/larryalton/2017/12/01/how-millennials-think- differently-about-online-security/#756492e4705f>. Astin G 2018, ‘How Australian universities can get better at cyber security’, University of New South Wales, viewed 20 August 2018, <https://newsroom.unsw.edu.au/news/science- tech/how-australian-universities-can-get-better-cyber-security> Eastern Michigan University 2013, ‘Cyber Security Awareness’, Eastern Michigan University, viewed 20 August 2018, <https://www.emich.edu/it/security/initiatives/cybersac/cybersac.php> Malcolm H 2013, ‘Millennials don’t worry about online privacy’, USA Today, viewed 20 August 2018, <https://www.usatoday.com/story/money/business/2013/04/21/millennials- personal-info-online/2087989/>. The University of Texas 2015, ‘UTSA raises $180 million in first-ever capital campaign, exceeds goal by more than $60 million’, The University of Texas, viewed 20 August 2018, <http://www.utsa.edu/today/2015/10/capitalcampaign.html> UK parliament 2017, ‘Cyber Security’, UK parliament, viewed 20 August 2018, <https://www.parliament.uk/mps-lords-and-offices/offices/bicameral/parliamentary- digital-service/cyber-security/>