Video-animation – Privacy Flag tools – maximum 3-5 minutes
The purpose with the movie to reach out to citizens (crowds) and create awareness of three tools that can help to protect private information on the internet and among Internet of Things.
We want in a simple way create awareness of the tools that are offered by project Privacy Play.
The project Privacy Flag aims to protect citizens' privacy with user-friendly tools for interaction with websites, smartphone applications and the Internet of Things. The tools enable you to monitor and identify threats on your privacy when browsing on a website or using smartphone applications, or identifying threats in privacy in IoT deployments in your environment.
Through the Privacy Flag tools you are able to access a Knowledge database with the collected alerts, profiles and privacy risk level of applications and websites, created by the Privacy flag crowd.
It is important in the movie to show the icon of Privacy Flag:
And the visualization of some of the graphs when alerting the privacy information. Green, Red and Grey (Insert icons)
Red for privacy unfriendly apps/websites, and;
Green for privacy friendly apps/websites
Grey for not assessed
And in the end of the movie, the address for the project Privacy Flag: [url removed, login to view]
To make an animated movie that illustrates three scenarios that show when privacy information is shared, how this information is shared and how to prevent it from being shared by blocking certain webpages, applications.
The background of the scenarios is given below. Thus creative ideas are welcome in what should be illustrated and how.
Storyline - The movie will illustrate
1. Anna is a teenager that uses her Android phone to constantly check her social media accounts, play games, surf throughout the web and connect with her friends. Anna likes to install new applications all the time, to check them out and usually leaves them installed in her phone even if in the end she doesn’t use them a lot. Many of the applications she installs require her to create an account, login with her social media account and share information about her. Over the time, Anna starts being worried on the data she is sharing in the numerous applications.
2. Michael is a 30 year old person who likes to spend time browsing the Internet to get informed on financial and sport news. Michael is usually checking a lot of different sites to get his information but is really concerned on the data some of the sites are asking for, since many of them ask him to login with his social media account in order for him to be able to read the articles or ask for his e-mail to send him updates. Michael also is suspicious of many web sites with advertisements that seem to be very personalized (advertisements based on his interests and favourite teams) in sites that his has shared very limited information with. Michael would like to see if there is any way to be informed on suspicious websites.
3. Tom is a visitor in a city and he wants to use some application and services that collects data readings from his phone's sensors. He became concerned for his privacy when he suspected that some of applications offered unauthorized access to the data. Also one of the applications was storing financial information that is possibly shared with third-parties. Tom would like to see if there is any way to be informed and report on suspicious IoTs.
Possible manuscript (can be elaborated upon)
Storyteller: The web and the Internet is a wonderful thing, making possible things we could only dream of, just some years ago!
Is your personal privacy of importance to you?
Do you sometimes wonder who has access to your personal information?
Let us give you some examples:
Michael, sitting in front of a computer, browsing the Internet… Michael: I go crazy, now they’re asking for my personal information again – I don’t want to share it! It only leads to being spammed by advertisements. What on earth can I do to avoid this?
Anna, sitting in the sofa, in front of the television, while simultaneously using her mobile Anna: This new application looks interesting, I’ll try it! But again! Why do they ask for my social media account and all this information about me? This is really not relevant… I feel out of control – what personal information have I shared, and with whom?
Tom, searching for the nearest Metro station. He pick up his phone and start the app. Tom: Finally, I’m in Paris! Good thing I downloaded the apps that will help me get the most out of my visit. But, I wonder who else can get access to my private information, when I’m using this app? It bothers me that I don’t know who is collecting data about me and gain profit because of this!
Storyteller: Michael, Anna and Tom need the Privacy Flag service.
So, what can this Service offer?
A drop-down Michael now has the Privacy Flag browser add-on as a way to be informed on and assess the level of his privacy risk when visiting a website. The Privacy Flag browser add-on is visible as an icon. When Michael clicks it to check websites, he can see whether the site is safe, unsafe or not assessed by any user. This is indicated by green for safe, red for unsafe and grey for websites not yet assessed.
If safe, the site doesn’t ask for any type of data. Michael can also check the secondary menu where he gets a visualisation of the data collected from the site (i.e. trackers, collecting the digital trail of the user). The Privacy Flag browser add-on can also show whether the site gather a lot of information from him or not, based on how many 3rd party online tracking and analytics services that monitor and collect his digital trail, as well as if they come from very known sources.
If the site is unsafe, the browser add-on shows a notification, stemming from other users assessment of this site as not safe. Again, when checking the secondary menu, he can see that this specific page has a lot of third party trackers enabled. As he checks them out, he realizes that these come mainly from advertisement sites. From the Privacy Flag browser add-on menu he has the option to disable them and make his browsing in the site more secure.
Anna has installed the Privacy Flag smartphone application and she tries it in her phone. The application checks all the applications installed in her phone and compares it with the list of already assessed applications that are available in Privacy Flag database. From the list of the listed applications some are marked with green if they are considered safe, red if the opposite and grey if there is no input. When selecting one application, Anna can see more information about it as, for example, the number of evaluators, potential notes and information about the handling of data, data monetization as considered for this app, etc. From this point, Anna can also provide her own assessment for the application, provided she has logged in as a Privacy Flag user. From her profile dashboard, she can visualise all the information she has provided to Privacy Flag.
In Paris, Tom opens the Privacy Flag application and from a separate menu he accesses the assessment for IoT deployments in the area. From the list, Tom finds out that the specific deployment in the city is considered safe, but the one used by the metro line of the city is not.
Tom decides to use both systems in order to make up his own opinion. After testing the IoT deployment and exploring the city, Tom realizes that the IoT was sending his location all the time without his knowledge.
Based on this, Tom opens the Privacy Flag website to provide his own assessment which for both systems is negative.
28 freelancers are bidding on average $679 for this job
Hello sir, please check the link below of similar sample [url removed, login to view] have done more than 300 videos in [url removed, login to view] with (147+review).lets talk at private chat. [url removed, login to view] (Driveo explainer video) Mais
Our works: [url removed, login to view] [url removed, login to view] We are studio with 6 people. so we can do it fast and professionally Thank you for your trust and we are ready to answer all your question
Hello..! Kindly don't ignore our Bid. It would be our pleasure to work with [url removed, login to view] are a talented, experienced team of designers having high level expertise in [url removed, login to view] time we provide you fresh, unique,at Mais