Inspiration

Old School Text Adventure Games from when the Internet was young, and the first phosphorescent pixels seared letters across the screen . . .

What it does

A simple adventure starting in a used book store shows how information breaches in the physical world can cross over disastrously and grow into cyber threats.

How we built it

Using the TWINE Game Engine for text adventure creation, and basic Wikipedia definitions for back-up.

Challenges we ran into

Found out about the project at last call on May 5th -- 4 days from the deadline. Writing all day and night, and then trying to compress everything to the right file size for the contest final submission.

Accomplishments that we're proud of

Pulling together a coherent, player-choice-based, storyline in HTML that can be expanded and modified as cyber and physical world information threats change minute-by-minute.

What we learned

Keeping things mostly real-world plausible with a dash of adventure to make the game fun. Also (as the hero of the plot eventually discovers) for confidential and personal information to shred papers early and often lest they fall into the hands of internet scammers ...

What's next for CROSSOVER THREAT Information Security Text Adventure Game

More down-to-Earth scenarios. Royalty free music from "Shutterstock" for background ambience. Spell-check!!! (And more love from Aunt Cynthia with a Pawnshop scenario!!!!)

Built With

Share this project:

Updates