Computer Software - , ,
Reality is highly malleable. Design can shape reality, and designers and technologists are responsible for doing so ethically. We consider identity, privacy, and security from an interdisciplinary and intersectional perspective. We investigate vulnerability and exploitation using cybersecurity, new media art, user experience design, and social psychology paradigms. Our current research involves the continued development of our ambient tactical deception model, experiments in malicious user experience design, and the exploration of creativity, critical technical practice.
Google Font API
Google Tag Manager
Amazon AWS