SlideShare a Scribd company logo
1 of 10
Noor Aqsa Syazwannie
     1081102469
    Cyberstalking
Stalker Brain Scanner
Abstract

Stalker Brain Scanner is an installation that explores inside the mind or thoughts of a stalker. The
installation consists of a hanging brain sculpture and equipped with an iPad. It is the brain
scanner, linking the innermost thoughts of a stalker to a video play. When user enter the
installation area and standing inside the brain sculpture, a short directed video about
cyberstalking will be played. The installation only can fit one user. The video is about a very
creepy and disturbing cyberstalker as he peruses victim's Facebook profile. The stalker will look at
the victim's information, photographs, recent status updates and friends list. Then he pulls up
Google Maps and finds directions to the target's home. The scene will end as he gets out of the
car, presumably to track down his target which can be you.
Introduction
Personal Context
• Cyberstalking behavior creates a paranoid feeling which is not comfortable with the
    surrounding. The victims will feel insecurity and hard to trust anyone around them. It can
    disrupt the life of the victim and leave them feeling very afraid and threatened.
• Experiencing the feeling of being stalked is personal. About one out of a thousand people
    may feel like they are being stalked. Be aware of the surrounding is very important.

Social Context
• As for social context, the behavior of a person is general. The society somehow will have the
    feeling to revenge, being obsessive and do any inappropriate behavior. In cyberstalking
    cases, the majority victims are women and most stalkers are usually men.

Cultural Context
• The trends and methods of cyberstalking behavior have become a culture. There are many
    methods used to stalk nowadays. Being stereotype is also a common attitude in the society.
Development
Techniques / Process

To build a brain sculpture, I used foam and jersey cloth. I cut the foam into small pieces and fill it
    into the cloth. I made a lot of them and place them onto the big semi-circle food cover. I
    used copper wire to place the foam cloth. The copper wire was twisted around the foam
    cloth and the food cover. The foam cloth was formed like a brain shape. After done with
    covering the food cover with the foam cloth, I sprayed the cloth with pink spray paint. Then I
    made the outline on the cloth using fabric paint.

I used iPad as the video display. Carefully hanging the iPad using copper wire inside the brain
     sculpture. The brain sculpture was hung with rope.

The video was directed by myself. The video shooting took limited space which is in a small room
    and in a car. I used Adobe After Effects to edit the video. Video trimming, color correction,
    transition and screen video capture are all used during video editing.
Development
Development
Development
Technical Diagram
Development
Floor Plan
Development
Problems & Future Planning

Time Management
    The project weeks allotted for completion sounds like a long time, but it goes by quickly.
   Especially during a short semester. Sometimes feel tempted to postpone work on the
   project because the due date seems so far off. So I make an implementation schedule that
   allocates reasonable amounts of work throughout the entire semester, then stick to that
   schedule.

Overachiever
    A common problem is selecting a topic that is far too ambitious for the allotted time. So I
   just need to remember that I have only a few weeks to finish the design, development and
   testing of my project. Besides, I need to update always and consult with the lecturer of what
   I am planning to do.

Cost Budget
    At first I want to build a cabin of brain sculpture. High cost is needed, so I have to change my
    idea on how to represent the brain in cheaper way. I decided to make the brain hanging,
    instead of building a cabin.
Conclusion
Cyberstalking is a real social problem that is fast spreading, therefore it is important
to be alert with the surroundings that addressed cyberstaking.

More Related Content

Similar to Cyberstalking Brain Scanner Installation Explores a Stalker's Thoughts

Planning booklet
Planning bookletPlanning booklet
Planning bookletMR_BU3
 
1.1 Initial Ideas + Context
1.1 Initial Ideas + Context1.1 Initial Ideas + Context
1.1 Initial Ideas + ContextMatthewEvans7662
 
Smart devices 2
Smart devices 2Smart devices 2
Smart devices 2Drew Loker
 
Stone Ward Brand Management March Meeting: Brainstorming Tech First
Stone Ward Brand Management March Meeting: Brainstorming Tech FirstStone Ward Brand Management March Meeting: Brainstorming Tech First
Stone Ward Brand Management March Meeting: Brainstorming Tech FirstEmily Reeves Dean
 
Community Service Initiative Journal
Community Service Initiative JournalCommunity Service Initiative Journal
Community Service Initiative JournalJoe Onn Lim
 
Planning booklet
Planning booklet Planning booklet
Planning booklet jeny_green
 
Digital scrapbooking in the classroom
Digital scrapbooking in the classroomDigital scrapbooking in the classroom
Digital scrapbooking in the classroomrsendejo
 
Critical thinking group project 350
Critical thinking  group project 350Critical thinking  group project 350
Critical thinking group project 350mackenzied11
 
Critical thinking
Critical thinking Critical thinking
Critical thinking e_finch10
 
Final evaluation presentation part 4
Final evaluation presentation part 4Final evaluation presentation part 4
Final evaluation presentation part 4sdh95
 
Dom Midgley | Planning Booklet
Dom Midgley | Planning BookletDom Midgley | Planning Booklet
Dom Midgley | Planning BookletDom Midgley
 
Sample Portfolio
Sample PortfolioSample Portfolio
Sample Portfoliocourir1227
 
Ilp power point
Ilp power pointIlp power point
Ilp power pointwolfey3113
 
Ict Image Strategies
Ict Image StrategiesIct Image Strategies
Ict Image Strategiescankiwi4
 
Designing Discreetness recap @ Thingscon
Designing Discreetness recap @ ThingsconDesigning Discreetness recap @ Thingscon
Designing Discreetness recap @ ThingsconSami Niemelä
 

Similar to Cyberstalking Brain Scanner Installation Explores a Stalker's Thoughts (20)

Planning booklet
Planning bookletPlanning booklet
Planning booklet
 
1.1 Initial Ideas + Context
1.1 Initial Ideas + Context1.1 Initial Ideas + Context
1.1 Initial Ideas + Context
 
Smart devices 2
Smart devices 2Smart devices 2
Smart devices 2
 
Planning Booklet
Planning BookletPlanning Booklet
Planning Booklet
 
Dt
Dt Dt
Dt
 
Stone Ward Brand Management March Meeting: Brainstorming Tech First
Stone Ward Brand Management March Meeting: Brainstorming Tech FirstStone Ward Brand Management March Meeting: Brainstorming Tech First
Stone Ward Brand Management March Meeting: Brainstorming Tech First
 
Planning booklet
Planning bookletPlanning booklet
Planning booklet
 
Community Service Initiative Journal
Community Service Initiative JournalCommunity Service Initiative Journal
Community Service Initiative Journal
 
Evaluation
EvaluationEvaluation
Evaluation
 
Planning booklet
Planning booklet Planning booklet
Planning booklet
 
Digital scrapbooking in the classroom
Digital scrapbooking in the classroomDigital scrapbooking in the classroom
Digital scrapbooking in the classroom
 
Planning booklet
Planning bookletPlanning booklet
Planning booklet
 
Critical thinking group project 350
Critical thinking  group project 350Critical thinking  group project 350
Critical thinking group project 350
 
Critical thinking
Critical thinking Critical thinking
Critical thinking
 
Final evaluation presentation part 4
Final evaluation presentation part 4Final evaluation presentation part 4
Final evaluation presentation part 4
 
Dom Midgley | Planning Booklet
Dom Midgley | Planning BookletDom Midgley | Planning Booklet
Dom Midgley | Planning Booklet
 
Sample Portfolio
Sample PortfolioSample Portfolio
Sample Portfolio
 
Ilp power point
Ilp power pointIlp power point
Ilp power point
 
Ict Image Strategies
Ict Image StrategiesIct Image Strategies
Ict Image Strategies
 
Designing Discreetness recap @ Thingscon
Designing Discreetness recap @ ThingsconDesigning Discreetness recap @ Thingscon
Designing Discreetness recap @ Thingscon
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Cyberstalking Brain Scanner Installation Explores a Stalker's Thoughts

  • 1. Noor Aqsa Syazwannie 1081102469 Cyberstalking Stalker Brain Scanner
  • 2. Abstract Stalker Brain Scanner is an installation that explores inside the mind or thoughts of a stalker. The installation consists of a hanging brain sculpture and equipped with an iPad. It is the brain scanner, linking the innermost thoughts of a stalker to a video play. When user enter the installation area and standing inside the brain sculpture, a short directed video about cyberstalking will be played. The installation only can fit one user. The video is about a very creepy and disturbing cyberstalker as he peruses victim's Facebook profile. The stalker will look at the victim's information, photographs, recent status updates and friends list. Then he pulls up Google Maps and finds directions to the target's home. The scene will end as he gets out of the car, presumably to track down his target which can be you.
  • 3. Introduction Personal Context • Cyberstalking behavior creates a paranoid feeling which is not comfortable with the surrounding. The victims will feel insecurity and hard to trust anyone around them. It can disrupt the life of the victim and leave them feeling very afraid and threatened. • Experiencing the feeling of being stalked is personal. About one out of a thousand people may feel like they are being stalked. Be aware of the surrounding is very important. Social Context • As for social context, the behavior of a person is general. The society somehow will have the feeling to revenge, being obsessive and do any inappropriate behavior. In cyberstalking cases, the majority victims are women and most stalkers are usually men. Cultural Context • The trends and methods of cyberstalking behavior have become a culture. There are many methods used to stalk nowadays. Being stereotype is also a common attitude in the society.
  • 4. Development Techniques / Process To build a brain sculpture, I used foam and jersey cloth. I cut the foam into small pieces and fill it into the cloth. I made a lot of them and place them onto the big semi-circle food cover. I used copper wire to place the foam cloth. The copper wire was twisted around the foam cloth and the food cover. The foam cloth was formed like a brain shape. After done with covering the food cover with the foam cloth, I sprayed the cloth with pink spray paint. Then I made the outline on the cloth using fabric paint. I used iPad as the video display. Carefully hanging the iPad using copper wire inside the brain sculpture. The brain sculpture was hung with rope. The video was directed by myself. The video shooting took limited space which is in a small room and in a car. I used Adobe After Effects to edit the video. Video trimming, color correction, transition and screen video capture are all used during video editing.
  • 9. Development Problems & Future Planning Time Management The project weeks allotted for completion sounds like a long time, but it goes by quickly. Especially during a short semester. Sometimes feel tempted to postpone work on the project because the due date seems so far off. So I make an implementation schedule that allocates reasonable amounts of work throughout the entire semester, then stick to that schedule. Overachiever A common problem is selecting a topic that is far too ambitious for the allotted time. So I just need to remember that I have only a few weeks to finish the design, development and testing of my project. Besides, I need to update always and consult with the lecturer of what I am planning to do. Cost Budget At first I want to build a cabin of brain sculpture. High cost is needed, so I have to change my idea on how to represent the brain in cheaper way. I decided to make the brain hanging, instead of building a cabin.
  • 10. Conclusion Cyberstalking is a real social problem that is fast spreading, therefore it is important to be alert with the surroundings that addressed cyberstaking.