Use these resources to support your participation in this Challenge

Additional Resources & Links - Empowering Caregivers in Immunization Innovation

Amid burbling espresso machines and towering stacks of cups, six teams in the NextGen Circular Business Accelerator are taking waste-free cup solutions to the next level. Venturing back of house at restaurants and into the world of waste management, see how teams use five design thinking practices to advance solutions for a more circular future.

We will continue to update these resources throughout the Challenge!

Community Fellows -Distributed Support from across the world

GAVI Demand Generation Overview

WHO 2018 Assessment Report of the Global Vaccine Action Plan

Smart Investments that Improve Immunization Equity

Demand for Health Services Fieldguide

Caregiver Journey Map

Caregiver Ecosystem Map

How to Submit an Idea

What to Do After Submission

Prototyping Toolkit

User Experience and User Feedback Toolkit

Storytelling Toolkit

Understanding Cybersecurity

Watch
  1. Cybersecurity and Crime: Google Security Princess Parisa Tabriz and Jenny Martin from Symantec introduce the most common types of cybercrime in this video.
  2. Cybersecurity: How it Works: A 5 min IBM video on how cybersecurity works.
  3. Cybersecurity in Under 3 Minutes: Learning about CyberSimplicity in under 3 min. 
  4. DEFCON Hacking Challenge: A 6 min hacking experiment at Defcon.
  5. Cybersecurity Crash Course: This video gives a crash course on the basics of cybersecurity.

Read
  1. Can news coverage of cyber issues get past hacks and attacks?: Hewlett Foundation commissioned a study from George Washington University Professor Sean Aday to analyze news coverage from 2014 to 2017 in major news media outlets. Sean Aday, discusses the report’s key findings and their implications.
  2. Comics with a Serious Message: The Rise of Cartoons for Teaching Cybersecurity: Article investigating the use of comics for serious topics on cybersecurity.
  3. Shall I Compare Thee to a Cyber Attack?: A U.S. Army cybersecurity analyst offers a lesson in explaining the impact of a cyber attack: use better metaphors.
  4. Delete Yourself: Television’s conflicted, heroic hackers: An article talking about Hollywood’s reductive portrayal of Hackers.
  5. Can news coverage of cyber issues get past hacks and attacks?: An article on news coverage of cybersecurity, and an invitation to dive into policy.
  6. Covering Cyber: Media coverage of cyber issues since 2014: Media coverage of cybersecurity since 2014.
  7. Tech Privacy: The Funniest Hacker Stock Photos 4.0: The Future of Hacking: An overview in pictures of hacker pictures, all looking very similar.
  8. War on the Rocks: Cyber Officials Need Help But Are Experts Up to the Task: Article on cybersecurity policy and the gap between academics government.
  9. Why the U.S. Needs More Cyber Translators: A case study at the intersection between government and tech experts known as “cyber translation.”
  10. Musicians May be the Key to the CyberSecurity Shortage: A read on finding creative talent for the cybersecurity industry.
  11. Art Show at Chicago’s THOTCON 0x9 Hacker Conference: When Art intersects with Cybersecurity.
  12. Innovation of Diversity in CyberSecurity: An article highlighting the diversity problem in Cybersecurity: Women are always minorities.
  13. How Design Thinking Can Change Cybersecurity: Design Thinking solving the Cybersecurity challenges.
  14. Foreign Policy: In Cyber War, There are No Rules: An article outlining the need for conventions and rules in the cybersecurity world.
  15. The Role of Instructional Design in Persuasion:A Comics Approach for Improving Cyber Security: This article highlights comics’ role in persuading users to practice good computer security.
  16. Hackers Are the Real Obstacle for Self-Driving Vehicles: Case study studying the effect of hackers on self-driving cars.
Listen
  1. Juan Andrés Guerrero-Saade, Principal Security Researcher, Recorded Future: Podcast featuring CyberSecurity Conversations.
  2. Ivan Arce on Hacking in Culture in Argentina: Podcast episode about the concentration of hacking talent in Argentina, and Ivan's focus on security problems in the Android ecosystem.
  3. Aanchal Gupta on Societal Change: Aanchal shares her story and provides guidance for young women struggling to overcome societal obstacles.
  4. How we know Russia did it, the FBI using Best Buy, an IBM study on ransomware, and more: A podcast on political hacking from Daniel Miessler, a cybersecurity expert and author of The Real Internet of Things.
  5. The IoT You Got for Christmas: A podcast discussing the finer points of the internet of things.
  6. Targeted Threats from Facts to Fiction: A discussion on advanced threats in cybersecurity.
  7. Security Awareness Deep Dive: Podcast on why you shouldn’t train employees for security awareness.
  8. Prove to me you are Human: Discussions on authentication issues, network security, airplane security, AI, and Minecraft.

The promise of the Food System Vision Prize is to light the way–to be the North Star–for populations across the globe to realize a more promising, nourishing, and healthy future.