Tuesday, February 23, 2010

Phase 5 - Content Development

Digital Experience
Collection, Statistics about ID Theft, The collection and simple stats about each check. (ie. The amount of money stolen)

Intro to the VoID
Often, you don't even know it's happened. You balance your check book and find 50 dollars missing, or perhaps you simply receive a call from your bank. Identity theft can happen without warning. Sean White made a life stealing from unsuspecting people. While he seemed like a nice guy, spending his life working to support his kids, he was, in fact, taking advantage of his position to collect checks from customers. The following collection are all the checks that Sean White collected, and a testament to how quickly and easily your information can be taken advantage of. Check fraud represents about 17% of identity theft.

Time Involved in Being a Victim
38-48% of victims find out about the identity theft within 3 months of it starting
9-18% of victims take 4 years or longer to discover that they are victims of identity theft
Victims spend from 3 to 5,840 hours repairing damage done by identity theft.
26-32% of victims spend a period of 4 to 6 months dealing with their case and 11-23% report dealing with their case for 7 months to a year.

Monetary Costs of Identity Theft

40% of business costs for individual cases of identity theft exceed $15,000. The Aberdeen Group has estimated that $221 billion a year is lost by businesses worldwide due to identity theft
Victims lose an average of $1,820 to $14, 340 in wages dealing with their cases
Victims spend an average of $851 to $1378 in expenses related to their case

Uses of Victim Information

More than one third of victims report that identity thieves committed cheque account fraud.
66% of victims' personal information is used to open a new credit account in their name
28% of victims' personal information is used to purchase cell phone service
12% of victims end up having warrants issued in their name for financial crimes committed by the identity thief

Imposter Characteristics and Relationships to the Victim
43% of victims believe they know the person who stole their identity
14-25% of victims believe the imposter is someone who is in a business that holds their personally identifying information

Logo as of . . . . 2/23/10


Tuesday, February 16, 2010

VOID ID Sketches

Sub Headings

Portfolio of Sean white
Identity Protection
Identity Self Defense
An Examination of Fraud
A Lesson in Fraud

Sketches

Tuesday, February 9, 2010

Monday, February 8, 2010

Development Process

Part 1 – Collector Type and Collection Descriptors
Determine your Collector Type/ Rationale. Next create your list of adjectives and descriptors for the collection, include as many as you can think of both physical and emotive. These words could determine how the visual language looks and feels. Decide why the collector might want to make it this collection public. This helps you determine your motivations as the designer of the collection.

                   souvenir/remembered
                   Organized
                   Meticulous
                   Low Tech
                   Proud/Braggart

ordered <-----> scattered                             playful <-----> serious
accurate <-----> distorted                             natural <-----> synthetic
heavy <-----> light                                           warm <-----> cool
transparent <-----> opaque                             reserved <-----> expressive
near <-----> far                                           passive <-----> active
machined <-----> hand-crafted               analytical <-----> intuitive
simple <-----> complex                             free <-----> controlled
balanced <-----> unstable                             melancholy <-----> joyful
flat <-----> dimensional                             masculine <-----> feminine
textured <-----> smooth                             loud <-----> quiet
geometric <-----> organic                             high tech <-----> low tech 
fast <-----> slow                                      controlling <-----> easy going        
manipulative <-----> naive                      outrageous <-----> magnificent    

The main approach of making this collection public would be pursued as the case against Sean White. As evidence in case, it is made public.

Sean White, the original collector, would never make this collection public. His collection is of personal significance to himself and isn't really something 

Part 2 – Visual Language Sketches
With some of the word generation from Part 1 as a starting point, sketch possible options based on the section “Visual Translations.” You will want to simply experiment in the beginning, keep everything you make. After you come up with some possibilities, develop some of the better options. Produce different directions for look and feel. The name might influence how your polish your visual language and vice versa.

Visual Translations
Consider how you might look at the different characteristics of the collection and collector psychology and how that translates into formal studies. Consider repetition, pattern, deconstructing the collected objects (taking it apart and looking at the different pieces), reconstructing it (reordering the parts), making arrangements of elements (ornamental), how are the forms affected by various media experiments (pen, ink, paint, toner transfers, etc.), look at processes of reproducing images (photograms, hand-drawn, rubbings, traced, stamped, etc.) and so on. You will present these studies as a series of sketches, media experiments, photographs or motion sketches. From these studies you will develop your visual system.

Part 3 – Name Generation
Description lists and name generation. Make sure to keep all your process for this. Generate a description list of 30+ words. Begin to evaluate what phrases, or words might be appropriate. A collection might be too vast to summarize in a single word, so try many options. Think about the possibility of using a sub-title as well. Come up with 10+ different name possibilities.
Name List
voID                                                        AvoID                                                                      Checked
Misappropriated                             OverCharged                                                        Purchased Echos
Simulated You                                          Fraudulence                                                        MisIDentification
Simulacrum                                             Financial                                                                Check IT
Steal                                                            Stolen                                                                    Fraud
The Art of Theft                                Deter/Detect/Defend                                                    Tenantless
Annexation                                                Empty                                                                   Deprivation
Coping                                                     Finance                                                               Identification Fraud

Approach to Visual System