Issuu on Google+

Powers of Persuasion Christopher Wu April 21st, 2010 DAI 300 | Design Process Professor Martin Linder San Francisco State University


Powers of Persuasion Table of Contents

p. 3 - Existing Persuasive Artwork p. 4 - Position Statement p. 5 - Image Map/ Symbol Composition p. 6 - Early Concept p. 7~10 - Revisions and Iterations p. 11 - Final Prototype

2

DAI 300 | Design Process


Powers of Persuasion Existing Persuasive Artwork

This is a foldout poster ad from a magazine. I don’t know what exactly makes this ad so powerful to me, but I remember seeing it once as a child never forgotten it. Whenever somebody would bring up the biggest direct competive attack in video game wars, I would always think of this poster as the big one. Looking at it in detail now, I guess there’s a number of factors. First is the “Genesis does what Nintendon’t” in bold font, black and white, high contrast. Then comes the games that were only on the Sega Genesis. I remember the feeling I had back then when I saw this ad; it almost made me regret I only had a Nintendo and not a Genesis. (Could be the child thinking factor though.)

3

DAI 300 | Design Process


Powers of Persuasion Position Statement

Protect your infomation The thing I am passionate about is not exactly that big of a deal when compared to the “causes” that other people are into, but to me it is something that I always think about. The thing I am referring to is personal information security, particularly when dealing with the internet. Quite a few people do very little to ensure that their personal information is kept safe, and they run the risk of having their passwords to important accounts stolen. The consequences can be as little as pranks being played on the person (such as email deletion of their stolen e-mail accounts,) or as severe as having their identity stolen. Once somebody’s identity is stolen, it is very hard to get good credit, apply for anything, and to even reastablish the person’s hold on his/her identity. It can completely ruin somebody’s life trying to get everything straighten out. I really wish for everybody to be better aware of the dangers of letting their information roam free in such a vast network, especially when it comes to the social networking sites.

4

DAI 300 | Design Process


Powers of Persuasion Image Map/ Symbol Composition

Leaving computer on, and unattended can lead to unauthorized access to personal data.

Same with having personal information publicly displayed on social networking sites.

Identity thieves can use the data to compromise accounts.

After one account is hacked into, many will follow...

... and eventually leading to bank accounts being accessed without permission.

5

DAI 300 | Design Process


Powers of Persuasion Early Concept

6

DAI 300 | Design Process


Powers of Persuasion Revisions and Iterations

7

DAI 300 | Design Process


Powers of Persuasion

8

DAI 300 | Design Process


Powers of Persuasion

9

DAI 300 | Design Process


Powers of Persuasion

10

DAI 300 | Design Process


Powers of Persuasion Final Prototype

11

DAI 300 | Design Process


Powers of Persuasion