top of page
Screenshot 2022-02-04 at 7.58.36 PM.png

Experimental Design

Group Project

Hypothesise - Test - Repeat
 

Jasper Mallinson

Hunaid Nagaria

Henry Parkin

Sachin Mehra

​

Keywords

Practical Decay, Data, and Security. 

​​

Prompt:

Design experiments using the given keywords in a manner you see fit. 

​

Result:

Developing a visual tool to aid decoding of privacy policies online.

Phase 1

Exploring practical decay, data and security. 

We designed experiments around personal data hoarding, behaviours towards data generation, and visual encryption methods. Main insights: 

 

  • Individuals generate and hoard a lot more waste data than they are aware of,

  • Individuals are protective of data generated by them despite acknowledging it as worthless,

  • Visual cues aid in understanding cryptic patterns

Screenshot 2022-02-04 at 2.09_edited.jpg

Phase 2

Why we do what we do?

Based on insights from the previous phase, we wished to explore why so much data was generated, why individuals hoarded them, and where else did volumes of data pose an issue. Main insights: 

 

  • It is hard to comprehend and sort data after it crosses a certain volume, that threshold being extremely low. 

  • One avoids dealing with large volumes of data for the risk of unintended consequences due to the lack of comprehension.

  • The behaviour of avoiding sifting through data hoards was also reflected in individuals’ usage of the internet, for eg. While going through privacy policies on a daily basis. ​

IMG_2664 2.jpg

Phase 3

Decoding privacy policies

A major insight revealed the lack of comprehension of privacy policies due to their extremely lengthy and complicated nature. This resulted in unaware individuals consenting to usage of their data in unwanted manners. And also unaware refusal of consent where it might have benefitted them. 

 

Thus we sought to explore visual tools for decoding these lengthy policies into bite size snippets. We categorised data fetched by privacy policies into categories and explored multiple forms and methods of this visual communication.

Please view in full screen.

Final Hypothesis

We proposed a method of decoding privacy policies using superimposed patterns revealing the intersections and differences of ones personal data preferences and privacy policies’ data asks. An individual fills their preferences based on categories of websites once and uses their personal data preference pattern to understand privacy policies.

Screenshot 2022-02-04 at 7.58.36 PM.png
bottom of page