Inspiration
Old School Text Adventure Games from when the Internet was young, and the first phosphorescent pixels seared letters across the screen . . .
What it does
A simple adventure starting in a used book store shows how information breaches in the physical world can cross over disastrously and grow into cyber threats.
How we built it
Using the TWINE Game Engine for text adventure creation, and basic Wikipedia definitions for back-up.
Challenges we ran into
Found out about the project at last call on May 5th -- 4 days from the deadline. Writing all day and night, and then trying to compress everything to the right file size for the contest final submission.
Accomplishments that we're proud of
Pulling together a coherent, player-choice-based, storyline in HTML that can be expanded and modified as cyber and physical world information threats change minute-by-minute.
What we learned
Keeping things mostly real-world plausible with a dash of adventure to make the game fun. Also (as the hero of the plot eventually discovers) for confidential and personal information to shred papers early and often lest they fall into the hands of internet scammers ...
What's next for CROSSOVER THREAT Information Security Text Adventure Game
More down-to-Earth scenarios. Royalty free music from "Shutterstock" for background ambience. Spell-check!!! (And more love from Aunt Cynthia with a Pawnshop scenario!!!!)

Log in or sign up for Devpost to join the conversation.