{"id":36176,"date":"2017-09-19T16:57:27","date_gmt":"2017-09-19T14:57:27","guid":{"rendered":"https:\/\/www.hiig.de\/?p=36176\/"},"modified":"2017-09-20T09:28:14","modified_gmt":"2017-09-20T07:28:14","slug":"game-jam-implementing-privacy-and-security-by-design-through-serious-games","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/game-jam-implementing-privacy-and-security-by-design-through-serious-games\/","title":{"rendered":"Game Jam: Implementing privacy and security by design through serious games"},"content":{"rendered":"<ul>\n<li><b>HIIG organises <em>Game Jam \u2013 Unveil the privacy threat<\/em>, an innovative workshop to sensitise citizens and companies for privacy and security risks through serious games.<\/b><\/li>\n<li><strong>HIIG-project lead Max von Grafenstein: \u201cData-driven companies should finally be able to find effective measures to protect user data and estimate the risks of data usage.\u201d<\/strong><\/li>\n<\/ul>\n<p><b><i>Berlin, 19 September 2017<\/i><\/b><span style=\"font-weight: 400;\"> \u2013 Playing games can teach staff how to handle sensitive data and show citizens the security and privacy concerns that come along with it.\u00a0<em>Game Jam \u2013 Unveil the privacy threat<\/em>, an innovative workshop of the Alexander von Humboldt Institute for Internet and Society (HIIG), will be developing new methods on 7 and 8 October 2017 that follows up on the idea, that these present problems can only be solved through creativity and an interdisciplinary approach. During the workshop, game designers, visual artists, storytellers and privacy and security experts will be coming together to develop serious game methods to reveal urgent anonymity and privacy issues for citizens and companies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The workshop looks at the smart city as a use case and as an example of data usage: Parking lot sensors and surveillance cameras already collect data about how many pedestrians and cars move from one place to another. Anyone can easily find free parking lots by accessing open WiFi or look for public transportation, car and bike-sharing services in real time. Yet, traffic lights can be hacked and alert systems can be controlled via external signals. For service providers, data security and privacy continue to be key concerns. Especially for smart cities, the amount of collected data may potentially allow for a comprehensive surveillance of any citizen. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Private firms, governmental institutions and research institutes increasingly need to train their staff in dealing with large amounts of data. Whether they are developing data-driven products and services or forming new technology sections in traditional companies, a lack of data protection and data security constitutes a high risk for customers and companies alike. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Researchers at HIIG are dealing with the question of how these risks can be assessed and minimised in the long term. With <em>Game Jam \u2013 Unveil the privacy threat<\/em>, the institute is inviting game designers and experts to develop alternative ways of approaching these risks. Lead researcher in the <em>Privacy-by-design in smart cities<\/em> project Max von Grafenstein expects this exceptional format to help people find effective ways of dealing with those risks: \u201cThrough serious games, staff members and citizens are sensitised in intuitive and inspiring ways to the risks associated with data protection and data security. They\u2019ll be taught and trained in how to minimise those risks.\u201d The game mechanics could ultimately result in games that are either physical, digital, or a combination of both. The game mechanics will be showcased and given awards on Sunday evening.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">\u201cCisco is thrilled to partner with t<\/span><span class=\"s2\">he Alexander von Humboldt Institute for Internet and Society (HiiG) on this innovative Game Jam. We must create greater awareness and education for data protection and privacy along with secure design. Gaming is the vernacular of a new generation and requires agility, creativity and scenarios that require gamers to try again and again in new ways to secure a sometimes elusive target. Given the import of data in the future of the world economy and the many and diverse threats facing individuals in this new world, we cannot think of a more rich and fresh way to play, build and educate. \u00a0We plan<\/span><span class=\"s3\">\u00a0<\/span><span class=\"s4\">to have some serious fun with this as well&#8221;, <\/span><span class=\"s2\">said Michelle Dennedy, VP and chief privacy officer, Cisco.<\/span><\/p>\n<p class=\"p2\"><span style=\"font-weight: 400;\">The Game Jam is being organized by the Alexander von Humboldt Institute for Internet and Society, in collaboration with INNOVATION AND LAW, i.Rights.Law and Booster Space, with support from Cisco. \u00a0<\/span><\/p>\n<p><b>Further information:<\/b><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Research project: <a href=\"https:\/\/www.hiig.de\/en\/project\/gameathon\/\">Privacy by design in smart cities<\/a><\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Event: \u00a0<a href=\"https:\/\/www.hiig.de\/en\/events\/game-jam-unveil-the-privacy-threat\/\">Game Jam \u2013 Unveil the privacy threat<\/a><\/span><\/p>\n<p><b>Press contact:<\/b> <span style=\"font-weight: 400;\">Florian L\u00fcdtke | phone: +49\u00a030\u00a0200 760 82 | <\/span><a href=\"mailto:presse@hiig.de\"><span style=\"font-weight: 400;\">presse@hiig.de\u00a0<\/span><\/a><\/p>\n<p><b><i>About the HIIG<\/i><\/b><\/p>\n<p><i><span style=\"font-weight: 400;\">The Alexander von Humboldt Institute for Internet and Society (HIIG) explores the dynamic interplay between the internet and society in the digital age, including the increasing interactions \u00a0between digital infrastructures and various domains of everyday life. Its goal is to understand the interplay of socio-cultural, legal, economic and technical norms in the process of digitisation. It serves as a forum for researchers on internet and society and encourages the collaborative development of projects, applications and research networks on the national and international level. <\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">The HIIG was founded in 2011 by the Humboldt-Universit\u00e4t zu Berlin, the University of the Arts Berlin and the Social Science Research Center Berlin, in alliance with the Hans-Bredow Institute for Media Research in Hamburg as an integrated co-operation partner. The research directors of the institute are <\/span><\/i><a href=\"https:\/\/www.hiig.de\/staff\/prof-dr-jeanette-hofmann\/\"><i><span style=\"font-weight: 400;\">Prof. Dr. Jeanette Hofmann<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">, \u00a0<\/span><\/i><a href=\"https:\/\/www.hiig.de\/staff\/prof-dr-dr-ingolf-pernice-3\/\"><i><span style=\"font-weight: 400;\">Prof. Dr. Dr. h.c. Ingolf Pernice<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">, <\/span><\/i><a href=\"https:\/\/www.hiig.de\/staff\/prof-dr-dr-thomas-schildhauer-3\/\"><i><span style=\"font-weight: 400;\">Prof. Dr. Dr.\u00a0Thomas Schildhauer<\/span><\/i><\/a><i><span style=\"font-weight: 400;\"> and <\/span><\/i><a href=\"https:\/\/www.hiig.de\/staff\/prof-dr-wolfgang-schulz-3\/\"><i><span style=\"font-weight: 400;\">Prof. Dr. Wolfgang Schulz<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.<\/span><\/i><\/p>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Fgame-jam-implementing-privacy-and-security-by-design-through-serious-games%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=Game%20Jam%3A%20Implementing%20privacy%20and%20security%20by%20design%20through%20serious%20games https%3A%2F%2Fwww.hiig.de%2Fen%2Fgame-jam-implementing-privacy-and-security-by-design-through-serious-games%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Fgame-jam-implementing-privacy-and-security-by-design-through-serious-games%2F&subject=Game%20Jam%3A%20Implementing%20privacy%20and%20security%20by%20design%20through%20serious%20games\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>HIIG organises Game Jam \u2013 Unveil the privacy threat, an innovative workshop to sensitise citizens and companies for privacy and security risks through serious games. HIIG-project lead Max von Grafenstein: \u201cData-driven companies should finally be able to find effective measures to protect user data and estimate the risks of data usage.\u201d Berlin, 19 September 2017&hellip;<\/p>\n","protected":false},"author":99,"featured_media":36171,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[120],"tags":[170],"class_list":["post-36176","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-press_release","tag-home-hidden-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Game Jam: Implementing privacy and security by design through serious games &#8211; Digital Society Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/game-jam-implementing-privacy-and-security-by-design-through-serious-games\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Game Jam: Implementing privacy and security by design through serious games &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"HIIG organises Game Jam \u2013 Unveil the privacy threat, an innovative workshop to sensitise citizens and companies for privacy and security risks through serious games. HIIG-project lead Max von Grafenstein: \u201cData-driven companies should finally be able to find effective measures to protect user data and estimate the risks of data usage.\u201d Berlin, 19 September 2017&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/game-jam-implementing-privacy-and-security-by-design-through-serious-games\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-19T14:57:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-09-20T07:28:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/09\/GameJam_16-9-Verkehr.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Florian L\u00fcdtke\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Florian L\u00fcdtke\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Game Jam: Implementing privacy and security by design through serious games &#8211; Digital Society Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/game-jam-implementing-privacy-and-security-by-design-through-serious-games\/","og_locale":"en_US","og_type":"article","og_title":"Game Jam: Implementing privacy and security by design through serious games &#8211; Digital Society Blog","og_description":"HIIG organises Game Jam \u2013 Unveil the privacy threat, an innovative workshop to sensitise citizens and companies for privacy and security risks through serious games. HIIG-project lead Max von Grafenstein: \u201cData-driven companies should finally be able to find effective measures to protect user data and estimate the risks of data usage.\u201d Berlin, 19 September 2017&hellip;","og_url":"https:\/\/www.hiig.de\/en\/game-jam-implementing-privacy-and-security-by-design-through-serious-games\/","og_site_name":"HIIG","article_published_time":"2017-09-19T14:57:27+00:00","article_modified_time":"2017-09-20T07:28:14+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/09\/GameJam_16-9-Verkehr.png","type":"image\/png"}],"author":"Florian L\u00fcdtke","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Florian L\u00fcdtke","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/en\/game-jam-implementing-privacy-and-security-by-design-through-serious-games\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/en\/game-jam-implementing-privacy-and-security-by-design-through-serious-games\/"},"author":{"name":"Florian L\u00fcdtke","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/c6560f58baccba120eaf5b23f1e48a0b"},"headline":"Game Jam: Implementing privacy and security by design through serious games","datePublished":"2017-09-19T14:57:27+00:00","dateModified":"2017-09-20T07:28:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/en\/game-jam-implementing-privacy-and-security-by-design-through-serious-games\/"},"wordCount":805,"commentCount":0,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/en\/game-jam-implementing-privacy-and-security-by-design-through-serious-games\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","keywords":["home-hidden @en"],"articleSection":["Press release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hiig.de\/en\/game-jam-implementing-privacy-and-security-by-design-through-serious-games\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/game-jam-implementing-privacy-and-security-by-design-through-serious-games\/","url":"https:\/\/www.hiig.de\/en\/game-jam-implementing-privacy-and-security-by-design-through-serious-games\/","name":"Game Jam: Implementing privacy and security by design through serious games &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/en\/game-jam-implementing-privacy-and-security-by-design-through-serious-games\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/en\/game-jam-implementing-privacy-and-security-by-design-through-serious-games\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","datePublished":"2017-09-19T14:57:27+00:00","dateModified":"2017-09-20T07:28:14+00:00","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/game-jam-implementing-privacy-and-security-by-design-through-serious-games\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/game-jam-implementing-privacy-and-security-by-design-through-serious-games\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/en\/game-jam-implementing-privacy-and-security-by-design-through-serious-games\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/game-jam-implementing-privacy-and-security-by-design-through-serious-games\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"Game Jam: Implementing privacy and security by design through serious games"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/c6560f58baccba120eaf5b23f1e48a0b","name":"Florian L\u00fcdtke","sameAs":["https:\/\/www.hiig.de"]}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/36176","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/99"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=36176"}],"version-history":[{"count":8,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/36176\/revisions"}],"predecessor-version":[{"id":36191,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/36176\/revisions\/36191"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/36171"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=36176"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=36176"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=36176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}