SlideShare a Scribd company logo
Noor Aqsa Syazwannie
     1081102469
    Cyberstalking
Stalker Brain Scanner
Abstract

Stalker Brain Scanner is an installation that explores inside the mind or thoughts of a stalker. The
installation consists of a hanging brain sculpture and equipped with an iPad. It is the brain
scanner, linking the innermost thoughts of a stalker to a video play. When user enter the
installation area and standing inside the brain sculpture, a short directed video about
cyberstalking will be played. The installation only can fit one user. The video is about a very
creepy and disturbing cyberstalker as he peruses victim's Facebook profile. The stalker will look at
the victim's information, photographs, recent status updates and friends list. Then he pulls up
Google Maps and finds directions to the target's home. The scene will end as he gets out of the
car, presumably to track down his target which can be you.
Introduction
Personal Context
• Cyberstalking behavior creates a paranoid feeling which is not comfortable with the
    surrounding. The victims will feel insecurity and hard to trust anyone around them. It can
    disrupt the life of the victim and leave them feeling very afraid and threatened.
• Experiencing the feeling of being stalked is personal. About one out of a thousand people
    may feel like they are being stalked. Be aware of the surrounding is very important.

Social Context
• As for social context, the behavior of a person is general. The society somehow will have the
    feeling to revenge, being obsessive and do any inappropriate behavior. In cyberstalking
    cases, the majority victims are women and most stalkers are usually men.

Cultural Context
• The trends and methods of cyberstalking behavior have become a culture. There are many
    methods used to stalk nowadays. Being stereotype is also a common attitude in the society.
Development
Techniques / Process

To build a brain sculpture, I used foam and jersey cloth. I cut the foam into small pieces and fill it
    into the cloth. I made a lot of them and place them onto the big semi-circle food cover. I
    used copper wire to place the foam cloth. The copper wire was twisted around the foam
    cloth and the food cover. The foam cloth was formed like a brain shape. After done with
    covering the food cover with the foam cloth, I sprayed the cloth with pink spray paint. Then I
    made the outline on the cloth using fabric paint.

I used iPad as the video display. Carefully hanging the iPad using copper wire inside the brain
     sculpture. The brain sculpture was hung with rope.

The video was directed by myself. The video shooting took limited space which is in a small room
    and in a car. I used Adobe After Effects to edit the video. Video trimming, color correction,
    transition and screen video capture are all used during video editing.
Development
Development
Development
Technical Diagram
Development
Floor Plan
Development
Problems & Future Planning

Time Management
    The project weeks allotted for completion sounds like a long time, but it goes by quickly.
   Especially during a short semester. Sometimes feel tempted to postpone work on the
   project because the due date seems so far off. So I make an implementation schedule that
   allocates reasonable amounts of work throughout the entire semester, then stick to that
   schedule.

Overachiever
    A common problem is selecting a topic that is far too ambitious for the allotted time. So I
   just need to remember that I have only a few weeks to finish the design, development and
   testing of my project. Besides, I need to update always and consult with the lecturer of what
   I am planning to do.

Cost Budget
    At first I want to build a cabin of brain sculpture. High cost is needed, so I have to change my
    idea on how to represent the brain in cheaper way. I decided to make the brain hanging,
    instead of building a cabin.
Conclusion
Cyberstalking is a real social problem that is fast spreading, therefore it is important
to be alert with the surroundings that addressed cyberstaking.

More Related Content

Similar to FYP Final Presentation Slides

FMP Evaluation
FMP EvaluationFMP Evaluation
FMP Evaluation
DaisyPotter
 
Planning booklet
Planning bookletPlanning booklet
Planning booklet
Keira-Branton
 
Planning booklet. story book
Planning booklet. story bookPlanning booklet. story book
Planning booklet. story book
Robert Ryan
 
Planning booklet
Planning bookletPlanning booklet
Planning booklet
taygage
 
Planning booklet
Planning bookletPlanning booklet
Planning booklet
MR_BU3
 
1.1 Initial Ideas + Context
1.1 Initial Ideas + Context1.1 Initial Ideas + Context
1.1 Initial Ideas + Context
MatthewEvans7662
 
Smart devices 2
Smart devices 2Smart devices 2
Smart devices 2
Drew Loker
 
Planning Booklet
Planning BookletPlanning Booklet
Planning Booklet
Nicholas Aldous
 
Dt
Dt Dt
Stone Ward Brand Management March Meeting: Brainstorming Tech First
Stone Ward Brand Management March Meeting: Brainstorming Tech FirstStone Ward Brand Management March Meeting: Brainstorming Tech First
Stone Ward Brand Management March Meeting: Brainstorming Tech First
Emily Reeves Dean
 
Planning booklet
Planning bookletPlanning booklet
Planning booklet
Benedict Terry
 
Community Service Initiative Journal
Community Service Initiative JournalCommunity Service Initiative Journal
Community Service Initiative Journal
Joe Onn Lim
 
Evaluation
EvaluationEvaluation
Planning booklet
Planning booklet Planning booklet
Planning booklet
jeny_green
 
Digital scrapbooking in the classroom
Digital scrapbooking in the classroomDigital scrapbooking in the classroom
Digital scrapbooking in the classroom
rsendejo
 
Planning booklet
Planning bookletPlanning booklet
Planning booklet
jordan armytage
 
Critical thinking
Critical thinking Critical thinking
Critical thinking
e_finch10
 
Critical thinking group project 350
Critical thinking  group project 350Critical thinking  group project 350
Critical thinking group project 350
mackenzied11
 
Final evaluation presentation part 4
Final evaluation presentation part 4Final evaluation presentation part 4
Final evaluation presentation part 4
sdh95
 
Dom Midgley | Planning Booklet
Dom Midgley | Planning BookletDom Midgley | Planning Booklet
Dom Midgley | Planning Booklet
Dom Midgley
 

Similar to FYP Final Presentation Slides (20)

FMP Evaluation
FMP EvaluationFMP Evaluation
FMP Evaluation
 
Planning booklet
Planning bookletPlanning booklet
Planning booklet
 
Planning booklet. story book
Planning booklet. story bookPlanning booklet. story book
Planning booklet. story book
 
Planning booklet
Planning bookletPlanning booklet
Planning booklet
 
Planning booklet
Planning bookletPlanning booklet
Planning booklet
 
1.1 Initial Ideas + Context
1.1 Initial Ideas + Context1.1 Initial Ideas + Context
1.1 Initial Ideas + Context
 
Smart devices 2
Smart devices 2Smart devices 2
Smart devices 2
 
Planning Booklet
Planning BookletPlanning Booklet
Planning Booklet
 
Dt
Dt Dt
Dt
 
Stone Ward Brand Management March Meeting: Brainstorming Tech First
Stone Ward Brand Management March Meeting: Brainstorming Tech FirstStone Ward Brand Management March Meeting: Brainstorming Tech First
Stone Ward Brand Management March Meeting: Brainstorming Tech First
 
Planning booklet
Planning bookletPlanning booklet
Planning booklet
 
Community Service Initiative Journal
Community Service Initiative JournalCommunity Service Initiative Journal
Community Service Initiative Journal
 
Evaluation
EvaluationEvaluation
Evaluation
 
Planning booklet
Planning booklet Planning booklet
Planning booklet
 
Digital scrapbooking in the classroom
Digital scrapbooking in the classroomDigital scrapbooking in the classroom
Digital scrapbooking in the classroom
 
Planning booklet
Planning bookletPlanning booklet
Planning booklet
 
Critical thinking
Critical thinking Critical thinking
Critical thinking
 
Critical thinking group project 350
Critical thinking  group project 350Critical thinking  group project 350
Critical thinking group project 350
 
Final evaluation presentation part 4
Final evaluation presentation part 4Final evaluation presentation part 4
Final evaluation presentation part 4
 
Dom Midgley | Planning Booklet
Dom Midgley | Planning BookletDom Midgley | Planning Booklet
Dom Midgley | Planning Booklet
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 

FYP Final Presentation Slides

  • 1. Noor Aqsa Syazwannie 1081102469 Cyberstalking Stalker Brain Scanner
  • 2. Abstract Stalker Brain Scanner is an installation that explores inside the mind or thoughts of a stalker. The installation consists of a hanging brain sculpture and equipped with an iPad. It is the brain scanner, linking the innermost thoughts of a stalker to a video play. When user enter the installation area and standing inside the brain sculpture, a short directed video about cyberstalking will be played. The installation only can fit one user. The video is about a very creepy and disturbing cyberstalker as he peruses victim's Facebook profile. The stalker will look at the victim's information, photographs, recent status updates and friends list. Then he pulls up Google Maps and finds directions to the target's home. The scene will end as he gets out of the car, presumably to track down his target which can be you.
  • 3. Introduction Personal Context • Cyberstalking behavior creates a paranoid feeling which is not comfortable with the surrounding. The victims will feel insecurity and hard to trust anyone around them. It can disrupt the life of the victim and leave them feeling very afraid and threatened. • Experiencing the feeling of being stalked is personal. About one out of a thousand people may feel like they are being stalked. Be aware of the surrounding is very important. Social Context • As for social context, the behavior of a person is general. The society somehow will have the feeling to revenge, being obsessive and do any inappropriate behavior. In cyberstalking cases, the majority victims are women and most stalkers are usually men. Cultural Context • The trends and methods of cyberstalking behavior have become a culture. There are many methods used to stalk nowadays. Being stereotype is also a common attitude in the society.
  • 4. Development Techniques / Process To build a brain sculpture, I used foam and jersey cloth. I cut the foam into small pieces and fill it into the cloth. I made a lot of them and place them onto the big semi-circle food cover. I used copper wire to place the foam cloth. The copper wire was twisted around the foam cloth and the food cover. The foam cloth was formed like a brain shape. After done with covering the food cover with the foam cloth, I sprayed the cloth with pink spray paint. Then I made the outline on the cloth using fabric paint. I used iPad as the video display. Carefully hanging the iPad using copper wire inside the brain sculpture. The brain sculpture was hung with rope. The video was directed by myself. The video shooting took limited space which is in a small room and in a car. I used Adobe After Effects to edit the video. Video trimming, color correction, transition and screen video capture are all used during video editing.
  • 9. Development Problems & Future Planning Time Management The project weeks allotted for completion sounds like a long time, but it goes by quickly. Especially during a short semester. Sometimes feel tempted to postpone work on the project because the due date seems so far off. So I make an implementation schedule that allocates reasonable amounts of work throughout the entire semester, then stick to that schedule. Overachiever A common problem is selecting a topic that is far too ambitious for the allotted time. So I just need to remember that I have only a few weeks to finish the design, development and testing of my project. Besides, I need to update always and consult with the lecturer of what I am planning to do. Cost Budget At first I want to build a cabin of brain sculpture. High cost is needed, so I have to change my idea on how to represent the brain in cheaper way. I decided to make the brain hanging, instead of building a cabin.
  • 10. Conclusion Cyberstalking is a real social problem that is fast spreading, therefore it is important to be alert with the surroundings that addressed cyberstaking.