Example Ideas


Examples for new hackathon

For this event, we are going to give you any examples. Because we believe that you can creat your hacks to solve.

Examples for previous hackathon

Example #1 - Privacy

What are we trying to do?
Build a tool that evaluates privacy risk for smartphone apps by applying machine learning to look for, identify, and score risks based on an apps privacy policy and/or end user license agreement.

What are the benefits (why?)
It would be great to have a tool that quickly tells you the privacy risk score in installing an app without having to read a lot of documentation and understand all the confusing terms.

Who cares and what difference will it make? (Customer/Value)
Parents trying to protect their children’s privacy online is difficult when apps over collect personal data. Anyone concerned with an apps’ privacy policies, practices, and uses of their data can benefit. Consumers get better protection and informed choice. Companies can improve their privacy practice and policies to enhance privacy.

Join the Discussion!

Email dheiser@mentorproject.org or patrick.kelley@criticalpathsecurity.com for access.

Example #2 - Work from home health

Problem we are solving:
Our bodies and minds can get unhealthy from too much time behind a screen and not being active in our own health and relationships with other people.

How we might solve it:
Wouldn’t it be great to have an app for that? One that integrates with your calendar schedule to send notifications and reminders to get up/move around/stretch or exercises … customizable to the preferences to some degree. Built in intelligence to ‘like’ and suggest other related activities or messages. Offer a guided meditation, as an add-on. Tracking for progress. Could even grab steps data as a goal to move about. Maybe even wellness reminders or goal setting like ‘reach out to a friend’ … feed the birds, ‘plant a flower box’, etc.

Example #3 - Live from Anywhere (LFA) -
Better connections in a more virtual world

Problem we are solving:
Using AI for EQ — using it to help us better connect with others in a more virtual world. Without the personal interaction, our social skills can decline. Improving our ability to ‘see’ and understand the more subtle body language and micro-expressions we give.

However, this is potentially a huge privacy concern. Opportunity might also be in obtaining better, more diverse training data sets with less bias for AI systems. One extension is if my computer would recognize that my stress levels are elevated and send a signal for a puff of lavender oil to be dispersed in the air…. or a whole range of home controls from music, lighting, etc. Perhaps there is space in treatment of pstd or other areas of wellness. Down side is having a machine watching us like lab rats. If anything, this is the thinking through of the cobra effects / revenge effects that come from technologies and the consequences of our creations.

Example #4 - Counter Active AI-Based Malicious Threats In CyberSpace

Problem we are solving:

The use of Artificial Intelligence and mined either data, previously leaked or through active campaigns, to reverse engineer employees and customers of large organizations will be leveraged in the hopes of creating dissension. Using the lessons learned from cyberattacks and psychological warfare against elections, we will see those strategies implemented in new attacks.The attacks will leverage persistent engagement through the use of IoT, subliminal messaging through advertisements, and targeted points of social engagement.

The focus of the attacks will be used to aid deliberate acts of espionage and sabotage. Many of these campaigns will leverage noteworthy social movements, such as Black Lives Matter.

Nation-states will continue to spread misinformation through social media platforms to dissuade select groups of individuals from accepting available vaccines and treatments for the pandemic. This will lead to further mistrust in the government and the potential loss of life. Eventually, driving towards the weakening of entire countries and the continual compromise of hosted organizations.

Technology has and will continue to evolve far faster than the human species. The attacks will evolve, as well.

Solution: Use AI to ingest social media traffic and make decisions based on unsupervised learning models to quickly tag malicious content before it is presented to readers.