Friday, April 5, 2019
Identity Theft in Cyber Crime | Proposal
identicalness operator larceny in Cyber law-breaking ProposalA Re look for Proposal on indistinguishability TheftAbstractIn To twenty-four hour periods competitive gentleman identity stealing is increasing through forth the world. The chief(prenominal) conception of this research is to look at race aw be of what identity theft is, how its happening, and what kind of engine room has been go ford. How do you cheer yourself from identity element theft?IntroductionThe main study of research is regarding identity theft in Cyber Crime. advantageously first and foremost, what is meant by the term identity theft? A very short and simple interpretation for identity theft is stealing different(a) peoples ad hominem details like Social surety number, reference add-in details, Date of Birth etc. What ar the criminals going to do with these details? Why they do that? What kind of technologies argon they apply to steal the other persons details? Is it becoming very dange rous present? How is it possible to cling to yourself from identity theft?In the UK, almost alto affirmher in all of the people ar apply broadband wait ons (BT Group Plc, 2006). The Internet is making everything easy for the consumer. Almost half of the population in the UK is utilize online banking, paying their bills, shopping and using the Internet to fulfil their day to day tasks. The Internet is a form of global communication throughout the world.Almost 60% percent of the people in the UK use online banking (BT Group Plc, 2006). It is quick, and reliable hitherto people be non aw ar of the thread in online banking. The legal age of the people in the UK argon becoming victims of online banking.Online stemma, internet auction, Phishing E-Mails, Trojans, and Man in the Middle flack catchers, Easy rallying cry, Spywargon, Adw ar, allowance system and cookies be the wander on the Internet (BT Group Plc, 2006). Besides the technology menti bingled in a higher place, in that location is to a greater extent technology that testament indicate, at the time of execution, the research?However consumers roll in the hay encourage themselves from the in a higher place threads by using effective Anti-virus softwargon, Spyw ar and Adware remover, Secured Wireless connection by using WAP or WEP, avoid unneeded cookies, delete unwanted e-mails and never give out their identity in instant messaging. If the consumers follow these systems they could protect themselves from indistinguishability theft.These cyber crimes release a global bother throughout the world (Shinder, 2002). The hackers are using up-to-the-minute technology to get the identity. Criminals are using technologies like liberate effective virus and Phishing e-mails to millions of Internet users to acquire their personal details, social security number, reference harbour card details, and date of birth. on that pointfore, recently, online fraud has greatly change magnitude da y by day. The news give onwardd by Metro in 2007 says that 9 out of 10 people are affected by identity theft. So what is the solution to solve this major problem and avoid non becoming a victim of identity theft?Why do I chosen personal identity Theft in Cyber Crime?As stated earlier Identity theft in Cyber Crime is increasing throughout the world. The cerebrate w presentfore that I selected this topic is to make aware of in skill knowledge of what is Identity theft? And make the Internet users aware of the tools, technology, and programs are obtainable in the commercialize to protect them from Identity theft in Cyber Crime. I am going make an animation website to glide by the Internet users, how to use and install the tools, technology and programs to protect them from Identity theft.Background and Literature ReviewOverview of Identity TheftIn the UK (BT Group Plc, 2006), the USA and some parts of Europe the Identity Theft is bedcover like a virus. Its be suffer unmatc hed of the major problems throughout the world. Each and every day psyche becomes a victim of identity theft. The Internet is a form global communication throughout the world as we all know very well. Every one-on-one, companys, students, Solicitor, Banking and almost in the entire field, the Internet is the advert form of communication to make their work quicker, easier, much than reliable and effective. Why it is Signifi butt endt?As we are look outing, now, online business is booming separately and every day, as depictn by news released by Federal batch Commission (Loza, 2001), online businesses reach up to 3.2 trillion by 2004. However online fraud is likewise increasing on with the increase in online business.Well its quite weird how millions of people are becoming victims of identity theft. The majority of the people losing their personal details are losing them by using the internet. The news releases by the Federal great deal Commission astir(predicate) online business fraud are as followsIn United States of America online business reach up to 3.2 trillion by 2004 (Loza, 2001)The consumers are making online business around 3.5 million each month (Loza, 2001).The estimated online payment was 1.5 billion in 1999 and 30 billion in 2005 (Loza, 2001)In the UK almost tail fin Million people use broadband (BT Group Plc, 2006). In UK almost 62% of Internet users are not aware of the threads and vulnerability in online, furthermore 40% of users said that they are not however bo thered whether they become a victim or not. or so users say they dont even head to giving out their Personal details to the third parties. Internet crime is not unaccompanied when the regarding credit card details but also the online Identity theft, which is increasingly rapidly throughout the world, especially in tangible countries like the UK, the USA and Canada. This online ID Theft is one of the fastest growing Internet crimes in the UK especially. more or less 8% of the UK PC users are falling victim to online fraud. 15% know already that they adjudge been targeted by an internet turn of events.The Internet crooks using technology to retrieve the personal discipline from the users, release Viruses, phishing e-mails and other effective technology. With this technology they sack attack millions of Internet users very quickly.The identity theft has become a big hassle for Internet users (Atwood, 2007). Some Internet users might use E-Bay. It is the online website from which we can buy and merchandise whatsoever things that we need. It is a giant online shopping website. In this website we might need to exchange our card details to third parties, but the third party has more possibility to cheat us. This gives evidence that there are many threads and a users information is very vulnerable on the Internet.ID theft has developed online be sweat the number of consumers surfing and shopping online has greatly increased (Insight Consulting , 2003) (Acxede, 2006). Unfortunately more from the personal information is derived from the electoral registration. Mainly we admit started to use and exchange the credit card details with banks and other retailers. This projects main aims are to rise the risks associated with e commerce and the Internet communication technologies. Further, discussion continues on personal ID theftAs a result we are losing our privacy in the Internet (Burchell et al, 2004), for example, when we register for any subscriptions from a service from an online company or when d possessloads bring increased risk of giving away personal information. The main issue the world is facing now, when we submitting our personal data, is that the companies give this information to third parties. They be ingest dishonestly to us. Cookies, adware and web bugs are used to retrieve the personal information.As we all known, most of the Companies from the UK have their customer service in India (BT Group Plc, 2006). In lndia, Labour is affordable, thats why Almost 80% of the international call centres are efflorescenced(p) in India. Because of cheap labour in India, employees start selling the IDs to the third parties. BT (British Telecom) holds almost 90% of British peoples identity information, addresses and other security information, in the department of customer service for BT in India. Due to cheap labour they wont get panic to sell Personal Details. So no one is galosh in UK.Fake ID at that place are some websites which sell fake ID cards and de bonkr the ID on the same day (FraudWatch International, 2003).The above ID is a Fake ID, so the crooks are not worried nowadays round making online fake ID. The fake ID go forth cost you only 10 and the delivery weight down is 5. So there is a separate website for making fake passport, ID, National Insurance Number and educatee ID card. Just for 10. So any one could make one fake id and NI number and they can start working in the UK.Online ScamThe online scam means sending fake web pages to your e-mail from a well-known ISP (BT Group Plc, 2006) (Insight Consulting, 2003). This email go away tell the addressee to update their ISP Billing information and it will direct them to click on the fake link. This is to turn the people to the bogus webpage. They are both equal in appearance. It contains the same company logo and all the other infrastructure of the website remains the same. The focal look of the scam is to instruct to enter their credit cards details, social security number, Date of Birth and the security number. This information would be more than enough to earn thousands of pounds and dollars.In most peoples Curriculum Vitae personal information is mentioned, including Date of Birth. Millions of people register in famous jobs websites every day. In that case, many crooks will come across our personal information. If our personal information gets in to the hands of cyber criminals, thus(prenominal) we will become the victims for identity theft.The main purpose of the research is to bring together the skills, follow up, and research about the online Identity theft. It will understand what is online Identity theft is, how its happening, what technology has been used, and how to frustrate the online identity theft.MethodologyMy methodology for this proposal is how people are losing their data, in what kind of way they are becoming gullible by the information supplied by the crook and how to protect them from this identity theft on the Internet.At the current place, the modernised world is facing administer of tribulation from well educated crooks (Insight Consulting, 2003). As the technology develops along X -axis, they generate equal foe clout to overcome the security issues along Y-axis. My project mainly charges identity theft in Cyber Crime. in that location are some effective technologies currently being used for online ID theft. Following, are the technologies that I rece ntly nominate from my research from journals, books and online. (Shinder 2002)Network ravishment and AttacksPassword CrackingTrojansVirusesWormsPhishingMan in middle attackSpywareThe above mentioned points are responsible for ID theft and other kinds of crimes over the Internet (Shinder, 2002). Thus meaning, the cyber criminal cleverly hacks the personal details by using any one of the above mention points. So the criminals use the above technology, tools and programs to make a tragedy on the World Wide Web.Network Intrusion and AttacksThe Network Intrusion and attack comes from all direction (Shinder 2002). It may come from external threads or from internal threads. The external threads for the most part come from the Internet and the internal threads possibly from an inside job. Internal threads may come from Local Area Network (LAN) or some kind of somatic bother to attack the system. instantlyadays the attackers dont need to have more skills, because there are some tools available to attack.Password CrackingThere are more than 100 tools are there in the market to taint the password (Shinder 2002). As far as my secondary research is concerned, password cracking tools are available in the market to crack the password. To use this tool you need to be a computer literate. Its all users friendly as anyone who has the intention to do it can do so. This is one of the ship canal that crooks are using to steal identities through Cyber Crime.Trojans, Viruses and wormsTrojans simply called as Trojan horse (Shinder 2002). The Trojan is a software program, which is mostly written by hackers to avoid a system security (BT Group Plc, 2006). If the Trojans are installed the hackers can implement the security gap to put one over the unauthorized access. If the program is installed in the system, hackers can have full authorization to delete or modify the files and install other programs and viruses.So the Trojans are hazardous if any gullible user who installs it is an administrator and has the access to the system files.Virus is another program which is more dangerous (Shinder 2002). Viruses are installed without the users awareness and it executes actions that are very noisome. The viruses can come from anywhere mostly they come from the Internet and mesh services such as the World Wide Web (WWW), E-Mail, instant messaging and file communion systems.Worms is also a program that is able to pass through crossways over the network from one system to another system (Shinder 2002). The worm was used to illustrate the code that harms multiuser systems. These programs are mainly anatomy for legitimate users to manage the multiple systems at the same time. Perhaps hackers use worms to perform some harmful actions.Phishing E-MailOne of the major concerns for Internet users is phishing E-Mail (BT Group Plc, 2006). The e-mail ids are available for sales event on the Internet for a cheap price (Shinder 2002). The crooks take advantage of this hazard to send bogus e-mails. The E-Mail claims to be from a bank, financial institute or other online fake website and asks the addressee to enter whatever information they required like personal details, user shout out and password etc. This kind of technology is one of the major concerns for the internet users, because its quite weird to recognise which is the original website and that of the fake.Man in the middle man attackThe man in the middle attack is able to read, insert and modify at desire, (BT Group Plc, 2006) the heart betwixt both the parties without either party significant in the knowledge that the connection among them has been compromised.SpywareThe Spyware is software installed on the system without user knowledge it is somewhat like Trojan horse. The spyware program can also sop up also the information like personal details, username and password and the Internet hi bosh. This may lead to harmful happy chance to your system.The Network Intrusion and Attack, Password Cracking, Trojan, Virus, Worms, Man in the middle man attack and spyware (Shinder, 2002) (BT Group Plc, 2006) are the responsible for the identity theft in Cyber Crime. However I am doing primordial research about these technologies, tools and programs for my dissertation with the sustain of my supervisor. I hope my primary research will be very instrumental for Internet users, government companies and private companies to protect, learn and become aware of the Identity theft in Cyber Crime.How to prevent yourself from cybercrime? Cyber crime is spreading like a virus throughout the world (BT Group Plc, 2006), how can you protect yourself from cybercrime? What should we do to avoid becoming a victim?Awareness of Network Security ConceptsAwareness of staple fibre cryptography conceptsAwareness firewallsAwareness of Phishing E-Mail.Awareness of Virus, Trojan and Worms.Awareness of Anti-Virus Software.Internet user, Government and Private concern should know the Awareness of Network Security, Password Cracking, firewalls, Phishing E-Mails, Trojans, Virus, Worms and Spyware to protect themselves from Identity Theft. My primary research will unquestionably help them to protect themselves from Identity theft in Cyber Crime. I am keenly performing primary research in awareness of the above tools, technology and program. I view that hopefully, my primary research would be more effective for the Internet user, Government and private concern.What would be my contribution for Identity theft in Cyber Crime?As we all are aware of the Identity Theft in Cyber Crime, but why still 70% of the people are becoming a victim for Identity Theft? The reason is most of the people are not aware of the protocol and other technology, tools and programs that are available in the market.I am working towards creating awareness of the Identity Theft in Cyber Crime.I hopefully think that my research will be more effective for the Internet user to protect them from Identity the ft and not to become a victim.Resources The maximum budget for my project will be approximately 500. I will be visiting to research centres, and some companies to do primary research about tools and technology used by the crooks. The software requirement areMicrosoft Office 2007Adobe Photoshop CS3HTMLAdobe premierMacromedia FlashSmart DrawAutoCADCorel Draw 12 The System requirements.ProcessorIntel Pentium 4 / Duo aggregate / Core to DuoMemory (RAM)Minimum 256MBHard DiscMinimum 20 GB run SystemWindows Vista/ Windows XPCD-ROM Readable/ RewritableUSB CableKeyboardMouse.PlanningThe estimated time for my project will be around 4 months. During my project I plan to visit some companies and research centre to gain more knowledge about Identity Theft in Cyber Crime and also I will be doing surveys about Identity Theft with the public.ConclusionThe migration of Identity Theft in Cyber Crime is not at all an easy task. It requires a huge effort, patience and understanding the fundamental ar chitecture. This research will give a sound knowledge to Internet users, Government and private concern about what is Identity theft? How its happening? By whom its happening and how to protect yourself from identity theft?ReferencesAcxede (2006) Hack 12 come a PayPal Button to your Office Live Basics Page Online http//www.acxede.net/hack_12_add_a_paypal_button_to_your_office_live_basics_page Accessed 29 April 2008Atwood, J. (2007) Coding Horror Phishing The perpetually Hack Online http//www.codinghorror.com/blog/archives/000852.html Accessed 29 April 2008BT Group plc (2006) Security Report Online Identity Theft Online http//www.btplc.com/onlineidtheft/onlineidtheft.pdf Accessed 28 April 2008Burchell, D., Nielsen, D., and Sofield, S. (2004) PayPal Hacks. Sebastopol, CA, USA OReilly Media Inc.FraudWatch International (2003) Types of Identity Theft Online http//www.fraud expectinternational.com/identity-theft/idtheft-types/ Accessed 28 April 2008Insight Consulting (2003) Identity Th eft Managing the Risk Online http//www.insight.co.uk/files/whitepapers/Identity%20Theft%20(White%20paper).pdf Accessed 30 April 2008Loza, E. (2001) Internet Fraud Federal Trade Commission Prosecutions of Online Conduct. In Communications and the Law, Vol.23Shinder, D. L. (2002) Scene of the Cybercrime computer Forensics Handbook. 1st Ed. London, UK Syngress PublishingGreys Anatomy Vs Serendipity Psychological PerspectivesGreys Anatomy Vs Serendipity Psychological PerspectivesGreys Anatomy is a medical manoeuvre that follows group of surgical interns, residents, and the various physicians who serve as their mentors both in their traffical and personal lives (Rhimes 2005). There are multiple story lines that have been or are being followed to go along with the chassis of characters and plots that the serial portrays. The serial first aired in 2005 and was recently renewed for its seventh season. The target hearing for this immortalize is men and women of various races, cultur es, sexual preferences, religions, and personalities from the ages of 18-34 historic period of age (Rhimes 2005).Enter the world of Seattle Grace Hospital, where residents and interns separate out to become the best operating operating operating surgeons in the coun supply, but first they must learn to navigate the murky waters of life, love and relationships. The series starts with a focus on Meredith Grey, a surgical resident trying to live up to the reputation of her famous mother, the brilliant Dr. Ellis Grey. Her Alzheimer-stricken mother ultimately passes on and in the moment she dies at last gives Meredith the validation she has always wanted from her mother but was never able to. Meredith finally marries the brilliant neurosurgeon Dr. Derek Shepherd and is moving forward in a positive direction. As the show has progressed the focus has shifted from in the first place Merediths point of view that of all of Merediths fellow interns, residents, and attention surgeons .Along with Meredith are four other interns that have started the program with her, Alex Karev, George OMalley, Izzie Stevens and Cristina Yang. They are mentored by Miranda Bailey, a general surgeon who finally becomes the hospitals Chief Resident and posterior becomes an attending general surgeon as well as a number of other attending surgeons of various specialties. Dr. Addison Montgomery a highly specialized OB/GYN and neonatal surgeon, is Dereks wife who arrives in Seattle seek reconciliation. Addison eventually leaves the show the show but continues to make passing(a) guest appearances through crossovers of the spin-off show Private Practice. Dr. Mark Sloan a talented plastic surgeon, is Dereks former best friend, who Derek caught sleeping with Addison. Callie Torres an orthopedic surgeon that was introduced as a love-interest for George, whom she later marries, but ultimately divorces. howevertually there is a stunning entree to the cast when the interns that the show h as followed become residents and are assigned their own interns one of which is Lexie Grey, Merediths half-sister on her fathers side. Trauma surgeon Owen Hunt and pediatric surgeon Arizona Robbins are introduced as love interests for Christina and Callie respectively. George dies a tragic sumptuous death, and Izzie leaves following the breakdown of her relationship with Alex that was preceded by a dramatic fight with cancer. Lexie and Mark have a fairly serious relationship for a mend until Mark adopts his newly found daughter and unhatched child over her. Now that Lexie is free from Mark and Alex is free from Izzie they start a fling to help each other get over their exes and it turns into a relationship. Attending Teddy Altman is introduced as a cardiothoracic surgeon from Owens military past. Finally as a reflection of the disfranchised economic times residents Jackson Avery and April Kepner, move to Seattle Grace in a merger with Mercy West.Serendipity is a romantic comed y that is a story about faith, destiny, and quantify (Fields 2001). It shows the how two people connected only for a night and had such an affect on each other that they eventually end up together years later later going a little bit crazy trying to follow the signs they think fate is cover them. The video was shown in theaters in 2001 and has since been released on DVD and aired on video. The target reference is women 18-34 years of age.Sara and Jonathon meet in New York City during the Christmas season and both want to buy the same orthodontic braces of black cashmere gloves in Bloomingdales. Jonathon graciously allows Sara to buy them and as a thank you she takes him to Serendipity 3 for a treat. Even though they are both dating other people they end up spending the eventide together ice skating and talking. At the end of the night Jonathon asks Sara to at least exchange name and numbers incase life happens. Sara finally gives in and the paper with her name and number i s blown out of her hand. Jonathan then pleads with her to drop a line the information down again, and being superstitious by nature, Sara decides it was a sign that possibly this connection wasnt meant to be. Jonathon asks her if fate didnt want them to be together then why did they meet? This gives Sarah an idea. She has Jonathon write his name and number on a five dollar bill and uses it to buy a role of Certs. She promises to write her own name and number in the book Love in the time of Cholera and sell it to a used bookstore. That would put their information out into the world and if they were destined to be together these items would convalesce their way back to each other, and they would be able to contact each other.Life goes on and eventually they give up the idea of finding each other. Jonathon is engaged to Hallie, and Sara is engaged to Lars, but neither has bury about the other. As the wedding dates loom closer and closer Jonathon and Sara start to think more and mor e about the night they spent together. They both make one last effort to find each other. Jonathon does eventually find the book and Sara does eventually find the five dollar bill. They also eventually pick up that if they are looking for one another then they shouldnt be marrying anyone else. They both break off their engagements and eventually find themselves back at the skating rink where it all began, each with their single black cashmere glove. Now they are both single and are free to pursue the attraction they flavour.Viewers watch this video recording series and this type of image for similar psychological reasons. Fischoff (n.d.) states that a person watching dramas is doing so to drive a social/ personality need and that watching comedies is done to make a person happy. Some people watch because they want the emotional rush they have experienced in the past from watching the same telly show or similar ikons. This emotional rush is what Potter (2008) classifies as a behavior effect called narcotizing. However, those are the things the average person seeks out almost subliminally where the need for entertainment and consort or distraction is obvious even to the viewer them self (Fischoff n.d.).People watching Greys Anatomy do so for the vicarious emotional rush they get from see their favorite characters lives unfold. In one occurrence there was a man in the hospital shooting people at random all in the hopes of getting to and killing the three doctors he blamed for his wifes death. There was a sentience of incredulity and terror as the auditory sense realizes who was getting shot and who the hitman was actually going for. This suspense keeps the viewing reference watching the show with undivided attention which is what Potter (2008) calls behavioral attraction.People watching Serendipity are not going for the dramatic emotional rush but a romantic emotional rush. These people are looking for a short term escape into a world where fate a nd destiny excuse why things happen the way that they do.Emotions are an integral part of a persons appreciation for tv and movies. We experience emotions vicariously through the programs we choose to watch. What a person feels while watching or listening to a television show or a movie is essential to the whole psychological experience. There are two main physiological components that effect emotion the physiological and the cognitive (Harris 2009). We physiologically experience emotions via increased heart rates, facial expressions like smiling, or other physical reactions like tears. The get word is to link these physical reactions with a proper(postnominal) feeling using cognitive appraisal.While watching that specific episode of Greys Anatomy, a person home alone may physically start crying when a well known character is shot, their pulse may increase as the suspense builds, they might even gasp, scream, or anticipate at the TV when someone is actually shot. A person observ ing a viewer can see what the viewer is watching observe that the viewer is not smiling and not sneezing. These are the cognitive clues an observer uses to know if the tears being observed are those of sadness rather than happiness or possibly allergies.While watching Serendipity in a movie theater surrounded by other people viewers are more likely to hold their emotions in only showing an occasional smile or becoming misty-eyed when Jonathan and Sara find each other at the end. An observer here would have a harder time making cognitive connections mingled with physiological representations and the feelings expressed because the expressions are being suppressed out of concern for how other people will think.It is master(prenominal) to remember when going to see a movie in a movie theater a persons sensory experiences are heightened because the situation is new or special and so your body tries to take in and remember as much(prenominal) as it can (Forrester 2000). In the physical context of being at home alone while watching a TV show, however, people are more powderpuffable and familiar with their surroundings this takes away from the need for heightened senses because there is no one else to relate to or unfamiliar smells to take in and the feel of the furniture is well known (Forrester 2000).Cinematographic techniques such as the choice of shot, and camera movement, can greatly define the structure and meaning of a film or television show. Greys Anatomy uses a wide pastiche of different shots and camera movement to portray different things. For example when the shooter was going by a room with people in it you can see it from their terrified point of view of peaking through the blinds. another(prenominal) example would be seeing an overview shot of an entire scene where people are scrambling everywhere and the shooter isnt in focus, but the chaos that he created by shooting into the crowd is. Serendipity uses the basic popular shots of those who are t alking and specific points of importance like when Sara finds the five dollar bill or when Jonathan is given the book with Saras information in it as a traditional grooms talent.Music is used in many ways in both the movie and the television series. There is sad music to queue sad feelings and wellbeing music to trigger happy snappishnesss (Potter 2008). Music is used to build-up and round off various scenes by using dramatic flaring of the music and an increase volume and complexity of the music fading into a softer simpler recital of the same continual piece (Fischoff 2005). These musical techniques are used to suck the audience into the world of the movie and to help focus attention on specific emotions at certain times. Greys Anatomy goes one beat beyond the traditional music queues that Serendipity exhibits by having absolute silence at the moment of tragic climax. There was silence when Meredith looked out into the hall way after removing a bomb from some guys chest only t o see the man who had taken the bomb from her explode with half the already evacuated surgical floor. There was also complete silence when Derek was shot by the shooter roaming the hospital. This silence from music is more dramatic then the build up of music traditionally used because it is unfamiliar in this series not to have music or noise in the background and complete silence is an enormous difference.An editor uses timing and sequencing to create the spacing of events through time and develop the direction of how the movie or television show will unfold (Chandler, 1994) (Bordwell, Thompson 1993). Heim, et. al. (2004) explains how editors are the secret weapons behind the psychological believability and emotional connection the audience will have with the movie or television show.The editing for a movie is different that that for a television series. With a movie like Serendipity there is only one shot to captivate the audience and there is only an hour and a half to tell the whole story. This is why movies follow one central story and sequencing like two people have totally separate lives who meet once, and then find each other again when their lives are more compatible. There are also key timing points in the movie where Jonathan and Sara just miss running into each other or are show in the same place but a different times creating a sense destiny is aware of their connection and that they will meet again when the time is right. With a television series like Greys Anatomy, however, there are multiple chances to get a persons interest and for this television series there are about twenty hours worth of show time over the already aired 6 seasons. This gives the editor more time to create and focus on the bonding of the viewers with multiple main characters and various plot lines. Putting together the right sequence of shots with proper timing is very important to keep a seamless transition from one characters story to the next and make all these idiosy ncratic stories a whole. order of business setting, priming, and framing theories all appear to work subconsciously and have long stable effects (Bargh, Chen, Burrows 1996), because of these effects these theories leave people susceptible to being misled. Agenda Setting is used to see the amount of coverage a topic will get, what information is given on the topic, and the manner in which the information is given (McCombs, and Shaw 1972). Agenda setting is a cognitive effect used to point the audience in the direction of what the creators think is important (Potter 2008). Priming is when a person is shown something that prepares them for the future of the show or movie (Tulving, Schacter, Stark 1982). Framing is how people file and build on what they know from experience to (Plous, 1993).Agenda setting, priming, and framing are both general and episode focused. In general the schedule of the Greys Anatomy is to show the work and private lives of a group of interns, residents, and mentoring doctors and that is the focus of the series. Each show also has its own agenda like abortion, sexually transmitted diseases, various religious conflicts, death of loved ones, mistakes that as doctors have cause a patient to die, and many more. At the beginning of every episode there is prologue in an auditory sensation format spoken over a montage of scenes that prepares the audience for what is going to happen in that specific episode. There is also an epilog at the end of each episode that is a continuation of the prolog, in that it summarizes the theme of the episode and gives the viewers closure. The series its self can alter how people think about emergency room doctors and what they have gone through to get there. Each specific episode has an chance to change how a person feels about the specific agenda presented.The agenda in Serendipity is that of destiny and mash and the whole movie is focused on it. The whole first ten minutes of the movie prime the audience for what is coming throughout the rest of the movie. The audience knows that there will be a search to find each other using the book and the five dollar bill and that the pair of gloves will eventually be brought back together. When all of Jonathan and Saras best efforts to find each other are disappointed and they finally give up looking for each other, the book is given to Jonathan as a grooms gift and the five dollar bill is given as change for movie head phones in antecedent of Sara on the plane home to England. This may change a persons framework to believe that destiny does live on and that what is meant to happen will happen when it is supposed to happen.Normative Focus Theory (Baron, Branscombe, Byrne 2009) explains why people only change according normal influences on their behavior when they can see it has relevance to their own lives. This scheme can explain, for example, why an individual who is having a hard time finding love would watch Serendipity and choose to alter their framework to believe that destiny will help them find the right person.Propaganda is the manipulation of ideas, images, and symbols to curve a large group of people to think a certain way. Propaganda can be be in a variety of ways, according to an individuals ideology and perception of the world. Change a persons framework. Greys Anatomy biass people to think about emergency room doctors and what their lives are like at work and in private. Serendipity tries to persuade people to believe in destiny and fate. The one thing that both this movie and this television series have in common is the focus on how incredibly important good friends are. They focus on friends who will go through anything and everything with each other and still be there for each other no matter how foolish one of them may act, Serendipity, or how much one might try to push the other away, Greys Anatomy.The amount of covert, or hidden, advertising versus overt, or obvious, advertising is very diffe rent between movies and television series. When people see a product that they use and automatically feel happy it creates a reinforced relationship with the product. This is what Potter (2008) calls an immediate reinforcement effect and is often connected with overt advertising. activating is a behavioral effect from covert advertising (Potter 2008). Television shows are able to have more covert advertising because they are designed to have periodic breaks that for overt advertising called commercials. Movies dont have that opportunity so there is a greater need to include advertising in the actual movie itself. For example Greys Anatomy has a few covert advertisements like the use of Bic pens, Fuji water, and Motorola and Blackberry electric cell phones. Most of its covert advertising, however, comes from an unlikely place. The songs sung by various famous artists have been used in the series to express various emotions and the sales of these songs have increased greatly after th ey aired on the series (Rhimes 2005). In Serendipity there are overt advertisements for Prada, the Waldorf Astoria, Serendipity 3, Bloomingdales, and Certs along with covert advertising for Coke, Love in the time of Cholera, Snickers, the movies Cool Hand Luke, the New York Times, and Hermes ties.Positive portrayals of a relatable cultural group can make an individual feel better and not alone. Negative portrayals of a cultural group that an individual can relate to is likely to anger that person and not only cause them not to watch the television show but they may even convince other individuals not to watch also. There are so many different cultural groups that individuals can relate to in Greys Anatomy that it would be hard to list them all. There are characters who are Korean, African American, Caucasian, Irish, Jewish, Christian, married, single, heterosexual, homosexual, powerful men, powerful women, underdog men, and underdog women from various social classes. These are only some of the groups that the regular cast of characters can appeal to. There are additional groups that are portrayed by in specific episodes that open up the world of cultural diversity even further. This was actually a goal of Rhimes (2005) while creating the show. She wanted the show to be as diverse as possible. Serendipity, however, is much simpler. It is basically focused and relatable to Caucasian middle-class.The key psychological effects that celebrities have they can get individuals to watch a movie or television show just by being in it. Because of a renowns symbolic social influence people will follow their favorite celebrities careers, watching movies and television shows they may not have watched otherwise (Baron, Branscombe, Byrne 2009). However, if celebrity watching turns into an intense personal obsession or pathological fantasy then it becomes unhealthy and dangerous (Maltby et. al. 2006). Examples of this are usually reported as celebrity stalking. This is not a regular occurrence but can happen when a person gets what Maltby et. al. (2006) calls celebrity worship syndrome, aka CWS.Movies usually profit from having already known celebrities in the cast. As far as celebrities go Serendipity may have returnsed from followers of Jon Cusack, Kate Beckinsale, John Corbett, and Eugene Levy. Television series like Greys Anatomy can benefit from starting with some well known actors and if the series is popular it may then turn other actors into celebrities. In the beginning viewers may have recognized Patrick Dempsy, Sandra Oh , and Katherine Heigl from their work outside the series. Now because of the series people would recognize Ellen Pompeo, Justin Chambers, Chandra Wilson, T.R. Night and many others if they were to work outside the series. Showing how a television series not only uses existing celebrities but creates them as well.Harris (2009) explains how professions presented in a positive manner greatly increase the number of people ente ring that field. The scary thing is that according to Potter (2008) 12.1% of professionals on television are represented as medical workers where only .9% of people are in the medical profession in real life. If you think about it, we show a higher number of doctors making few mistakes and giving more individualized attention in Greys Anatomy than there are in real life. If people arent careful and idea critically they may expect these sorts of unrealistic actions in real life. In the movie Serendipity various professions are portrayed but they are really not take staidly or focused on they are sort of poked fun at and used to create wry twists. There is an infuriating rule following sales clerk, a obituary writer for the New York Times, an deaf(p) sports caster, a holistic store owner who doesnt believe in the product she sells, a psychologist who doesnt believe her own advice about there not being soul mates, and a goofy self-absorbed musician. If an individual were to watch this movie and focus on how the various professions are shown there could be some negative reactions, however since they are used as character enhancements and not focused on as professions it had the desired mood lightening effect movies viewers need to connect with the characters personalities.The amount of time a person spends with a specific show or type of movie is usually because of affection for its characters. The more exposure an individual has the greater an influence the exposure has on what is applied to our everyday lives. Characters can become familiar providing comfort and interesting plots provide a means of escape (Rutlege 2009). This can be healthy and relaxing as long as there is no blurring of the line between fantasy and reality (Potter 2008). With critical thinking applied to realize the dramatic license that the creators of the movies and television shows, a person can discern between unrealistic aspects and aspects of the shows or movies that may contain a ge m of truth or a semiprecious lesson.Watching movies like Serendipity on a regular basis can cause people to have unrealistic expectations of their current or future relationships. They want the romantic emotional rush the feel from the movie in real life, which is not realistic.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment