Pitt Cyber, the School of Computing and Information, GSPIA’s Ford Institute for Human Security, and Pitt Information Technology are hosting a new kind of hackathon—an intentionally transdisciplinary hackathon.
At Pitt, we believe that no one discipline has a lock on effective solutions to big problems. This is why we host Hacking4Humanity.
Each year, we pick seemingly intractable problems that call out for solutions from across disciplines and unleash students on them. Undergraduate and graduate students from across Pitt and other universities are invited to compete.
Last year students tackled human trafficking. This year’s problem – Digital Disinformation
Mass digital dissemination of disinformation is now regularly exploited by bad actors. The private and public sectors are struggling to prevent and recover from disinformation campaigns—and the threat is only growing.
Challenge scenarios, developed by GSPIA students, will be shared at the event to guide the contextual development of teams’ hacks.
Date: October 16-17 (held virtually)
For information on sponsorships, please contact Beth Schwanke at firstname.lastname@example.org.
Graduate and undergraduate students from Pitt are invited to compete, as are students from other universities. Feel free to come with a team or take advantage of team formation after the kickoff. Graduate and undergraduate students from Pitt are invited to compete, as are students from other universities. Feel free to come with a team or take advantage of team formation after the kickoff.
- Work only in the designated workspace. Be sure to maintain a clean hacking environment.
- Be respectful to all participants. Harassment and abuse will not be tolerated. If you believe this rule has been violated, please report it to an organizer.
- Teams should be no more than four members.
- Teams may not use or incorporate any inappropriate or unlawful content into hacks. If you have questions, consult with a hackathon organizer or mentor.
- All project components must be created during Hacking4Humanity. Third-party services, APIs open source projects, and frameworks are permitted to be utilized if credited during presentations.
- All projects must be submitted to DevPost by 5:00 pm on Saturday.
- Potential for Impact
- Consideration of Ethical Implications
- Technical Difficulty
- Originality and Creativity
- User Experience
Info to come!
Info to come!