Playing Data - Privacy Policies on the Harp: Difference between revisions

From Hackers & Designers
(Created page with "{{Event |Name=Playing Data - Privacy Policies on the Harp |Location=Het Wilde Weg |Date=202 |Web=No |Print=No }}")
 
No edit summary
Line 2: Line 2:
|Name=Playing Data - Privacy Policies on the Harp
|Name=Playing Data - Privacy Policies on the Harp
|Location=Het Wilde Weg
|Location=Het Wilde Weg
|Date=202
|Date=2024/07/16-2024/07/18
|Web=No
|Time=10:00—13:00
|PeopleOrganisations=Linden
|Type=HDSC2024
|Web=Yes
|Print=No
|Print=No
}}
}}
[[File:18 PlayingDataHarp.png|300px]]
For a while now I've been working on different strategies to make data privacy policies more accessible , especially to a younger and non tech-professional audience. The starting point for the workshop that I would like to give during the summer camp is an interactive installation work, for which I converted the Google data privacy policy to music sheet notation, specifically Veeh-harp notation. The latter was very important for the nature of the concept, since it is an instrument that can be played by people who can't read chords or traditional Western music sheets. Through playing this and other privacy policies, which written out are seemingly endless and often intentionally designed to be intransparent, I want to help people to engage with data privacy in a fun and playful manner. I am beyond curious about the participants realisations of my workshop idea and their perspectives .  I suggest that the children bring in their own cryptic messages, or generally texts or content from the internet that at first glance seemed intransparent or confusing. I am also planning on providing such material if nothing comes to mind. Lastly the participants can layout and individually decorate their music sheets, and in the end perform their generated musical pieces.
* duration:  around 1-2 hours, pretty flexible depending on how detailed and long the cryptified and converted text input is, there will be 2 sessions to accommodate more people.
* number of participants: ideally 5, since there will be five harps, but maximum 10 (2 people per instrument)
* materials / tools: 5 harps (will be sent and shipped back via mail),  printer that can print A3 !very important!,  laptops/PCs with good internet connection! and firefox installed  , min. five ideally if not possible less will do, pens, stickers maybe and drawing tools for decoration the music sheets, maybe stands for the instruments or something to safely lean them against
* what do participants need to prepare: bring their laptop if available and possible, with chrome or firefox, think about whether they've stumbled upon some data privacy policy that they've impatiently agreed to and be mindful about that-ideally bring this in, alternatively some other piece of text related to technology (manual, instruction, code, error) that they found hard to understand

Revision as of 19:03, 27 June 2024

Playing Data - Privacy Policies on the Harp
Name Playing Data - Privacy Policies on the Harp
Location Het Wilde Weg
Date 2024/07/16-2024/07/18
Time 10:00—13:00
PeopleOrganisations Linden
Type HDSC2024
Web Yes
Print No

18 PlayingDataHarp.png

For a while now I've been working on different strategies to make data privacy policies more accessible , especially to a younger and non tech-professional audience. The starting point for the workshop that I would like to give during the summer camp is an interactive installation work, for which I converted the Google data privacy policy to music sheet notation, specifically Veeh-harp notation. The latter was very important for the nature of the concept, since it is an instrument that can be played by people who can't read chords or traditional Western music sheets. Through playing this and other privacy policies, which written out are seemingly endless and often intentionally designed to be intransparent, I want to help people to engage with data privacy in a fun and playful manner. I am beyond curious about the participants realisations of my workshop idea and their perspectives . I suggest that the children bring in their own cryptic messages, or generally texts or content from the internet that at first glance seemed intransparent or confusing. I am also planning on providing such material if nothing comes to mind. Lastly the participants can layout and individually decorate their music sheets, and in the end perform their generated musical pieces.

  • duration: around 1-2 hours, pretty flexible depending on how detailed and long the cryptified and converted text input is, there will be 2 sessions to accommodate more people.
  • number of participants: ideally 5, since there will be five harps, but maximum 10 (2 people per instrument)
  • materials / tools: 5 harps (will be sent and shipped back via mail), printer that can print A3 !very important!, laptops/PCs with good internet connection! and firefox installed , min. five ideally if not possible less will do, pens, stickers maybe and drawing tools for decoration the music sheets, maybe stands for the instruments or something to safely lean them against
  • what do participants need to prepare: bring their laptop if available and possible, with chrome or firefox, think about whether they've stumbled upon some data privacy policy that they've impatiently agreed to and be mindful about that-ideally bring this in, alternatively some other piece of text related to technology (manual, instruction, code, error) that they found hard to understand