.

Wednesday, June 5, 2019

Identity Theft in Cyber Crime | Proposal

individuality Theft in Cyber Crime propositionA Research Proposal on identity TheftAbstractIn Todays competitive creative activity identity thievery is increasing through with(predicate) come in the serviceman. The main purpose of this research is to compensate the great unwashed mindful of what identity theft is, how its misfortune, and what win some(prenominal) of technology has been utilize. How do you cling to yourself from Identity theft?IntroductionThe main study of research is regarding identity theft in Cyber Crime. Well first and fore around, what is meant by the term identity theft? A very short and simple definition for identity theft is stealing otherwise(a) peoples private details like Social security number, credit card details, Date of Birth etc. What argon the criminals dismissal to do with these details? wherefore they do that? What kind of technologies be they using to steal the other soulfulnesss details? Is it becoming very dangerous nowad ays? How is it possible to protect yourself from identity theft?In the UK, almost al iodin(a) of the people ar using broadband renovations (BT Group Plc, 2006). The Internet is making everything easy for the consumer. around half of the population in the UK is using online banking, paying their bills, shopping and using the Internet to fulfil their day to day tasks. The Internet is a form of copeledge domain-wide communication through protrude the world.Almost 60% percent of the people in the UK use online banking (BT Group Plc, 2006). It is quick, and reli fit however people atomic number 18 not advised of the threads in online banking. The majority of the people in the UK are becoming victims of online banking.Online blood line, internet auction, Phishing E-Mails, Trojans, and Man in the Middle attacks, Easy Password, Spyware, Adware, Pay ment system and cookies are the threads on the Internet (BT Group Plc, 2006). Besides the technology bring uped above, in that r espect is much(prenominal) technology that provide indicate, at the age of execution, the research?However consumers bed protect themselves from the above threads by using effective Anti-virus software, Spyware and Adware remover, Secured Wire little connection by using WAP or WEP, avoid unnecessary cookies, delete unsought e-mails and never give out their identity in instant messaging. If the consumers follow these systems they could protect themselves from Identity theft.These cyber crimes become a global issue throughout the world (Shinder, 2002). The hackers are using up-to-the-minute technology to get the identity. Criminals are using technologies like liberate effective virus and Phishing e-mails to millions of Internet users to capture their someoneal details, mixer security number, credit card details, and date of birth. on that pointfore, recently, online fraud has greatly increased day by day. The news released by Metro in 2007 says that 9 out of 10 people are aff ected by identity theft. So what is the solution to solve this major problem and avoid not becoming a victim of identity theft?Why do I chosen Identity Theft in Cyber Crime?As stated earlier Identity theft in Cyber Crime is increasing throughout the world. The reason wherefore that I selected this topic is to make aware of in depth knowledge of what is Identity theft? And make the Internet users aware of the tools, technology, and computer programmes are available in the grocery store to protect them from Identity theft in Cyber Crime. I am exhalation make an animation website to guide the Internet users, how to use and inst in all the tools, technology and programs to protect them from Identity theft.Background and Literature Re observeOverview of Identity TheftIn the UK (BT Group Plc, 2006), the USA and some parts of Europe the Identity Theft is spreading like a virus. Its become one of the major problems throughout the world. individually and every day someone becomes a vict im of identity theft. The Internet is a form global communication throughout the world as we all known very well. Every individual, companys, students, Solicitor, Banking and almost in the entire field, the Internet is the key form of communication to make their civilize quicker, easier, more reliable and effective. Why it is Signifi supportt?As we are seeing, nowadays, online business is booming for all(prenominal) one and every day, as manifestn by news released by Federal Trade Commission (Loza, 2001), online businesses exit up to 3.2 trillion by 2004. However online fraud is also increasing along with the increase in online business.Well its quite weird how millions of people are becoming victims of identity theft. The majority of the people losing their personal details are losing them by using the internet. The news releases by the Federal Trade Commission just somewhat online business fraud are as followsIn United States of America online business reach up to 3.2 trill ion by 2004 (Loza, 2001)The consumers are making online business around 3.5 million each month (Loza, 2001).The estimated online payment was 1.5 billion in 1999 and 30 billion in 2005 (Loza, 2001)In the UK almost five Million people use broadband (BT Group Plc, 2006). In UK almost 62% of Internet users are not aware of the threads and vulnerability in online, furthermore 40% of users said that they are not even bo in that respectd whether they become a victim or not. Some users say they dont even mind to giving out their Personal details to the third parties. Internet crime is not besides the regarding credit card details but also the online Identity theft, which is increasingly promptly throughout the world, especially in developed countries like the UK, the USA and Canada. This online ID Theft is one of the fastest growing Internet crimes in the UK especially. More or less 8% of the UK PC users are falling victim to online fraud. 15% know already that they rescue been targeted by an internet crook.The Internet crooks using technology to call back the personal information from the users, release Viruses, phishing e-mails and other effective technology. With this technology they can attack millions of Internet users very quickly.The identity theft has become a striking hassle for Internet users (Atwood, 2007). Some Internet users mightiness use E-Bay. It is the online website from which we can buy and sell whatever things that we need. It is a giant online shopping website. In this website we might need to exchange our card details to third parties, but the third party has more possibility to cheat us. This gives evidence that at that place are many another(prenominal) threads and a users information is very vulnerable on the Internet.ID theft has developed online because the number of consumers surfing and shopping online has greatly increased (Insight Consulting, 2003) (Acxede, 2006). Unfortunately more from the personal information is derived from t he electoral registration. Mainly we have blended to use and exchange the credit card details with banks and other retailers. This projects main aims are to show the risks associated with e commerce and the Internet communication technologies. Further, discussion continues on personal ID theftAs a result we are losing our privacy in the Internet (Burchell et al, 2004), for example, when we register for any subscriptions from a service from an online company or when downloads bring increased risk of giving away personal information. The main issue the world is lining now, when we submitting our personal data, is that the companies give this information to third parties. They behave dishonestly to us. Cookies, adware and web bugs are used to retrieve the personal information.As we all known, most of the Companies from the UK have their customer service in India (BT Group Plc, 2006). In lndia, Labour is twopenny-halfpenny, thats why Almost 80% of the international call centres are located in India. Because of cheap labour in India, employees start selling the IDs to the third parties. BT (British Telecom) holds almost 90% of British peoples identity information, addresses and other security information, in the department of customer service for BT in India. Due to cheap labour they wont get panic to sell Personal Details. So no one is safe in UK. phoney ID on that point are some websites which sell mould ID cards and deliver the ID on the same day (FraudWatch multinational, 2003).The above ID is a Fake ID, so the crooks are not worried nowadays some making online fake ID. The fake ID go forth cost you only 10 and the delivery charge is 5. So there is a separate website for making fake passport, ID, National Insurance Number and Student ID card. Just for 10. So any one could make one fake id and NI number and they can start working in the UK.Online ScamThe online scam means sending fake web pages to your email from a known ISP (BT Group Plc, 2006) (Insigh t Consulting, 2003). This email allow tell the addressee to update their ISP Billing information and it will direct them to click on the fake link. This is to turn the people to the imitative webpage. They are some(prenominal) similar in appearance. It contains the same company logo and all the other infrastructure of the website remains the same. The focal seek of the scam is to see to enter their credit cards details, social security number, Date of Birth and the security number. This information would be more than enough to earn thousands of pounds and dollars.In most peoples Curriculum Vitae personal information is mentioned, including Date of Birth. Millions of people register in illustrious jobs websites every day. In that case, many crooks will come across our personal information. If our personal information gets in to the hands of cyber criminals, then we will become the victims for identity theft.The main purpose of the research is to bring in concert the skills, expe rience, and research about the online Identity theft. It will examine what is online Identity theft is, how its happening, what technology has been used, and how to prevent the online identity theft.MethodologyMy methodology for this proposal is how people are losing their data, in what kind of way they are becoming gullible by the information supplied by the crook and how to protect them from this identity theft on the Internet.At the watercourse situation, the develop world is facing lot of tribulation from well educated crooks (Insight Consulting, 2003). As the technology develops along X -axis, they generate equal antagonist clout to surmount the security issues along Y-axis. My project mainly concerns identity theft in Cyber Crime. There are some effective technologies currently world used for online ID theft. Following, are the technologies that I recently found from my research from journals, books and online. (Shinder 2002)Network rape and AttacksPassword CrackingTrojans VirusesWormsPhishingMan in middle attackSpywareThe above mentioned points are responsible for(p) for ID theft and other kinds of crimes over the Internet (Shinder, 2002). Thus means, the cyber criminal cleverly hacks the personal details by using any one of the above mention points. So the criminals use the above technology, tools and programs to make a tragedy on the World Wide Web.Network Intrusion and AttacksThe Network Intrusion and attack comes from all direction (Shinder 2002). It may come from external threads or from internal threads. The external threads for the most part come from the Internet and the internal threads by chance from an inside job. Internal threads may come from Local Area Network (LAN) or some kind of physical access to attack the system. straightaway the attackers dont need to have more skills, because there are some tools available to attack.Password CrackingThere are more than 100 tools are there in the market to crack the password (Shinder 2002). As far as my secondary research is concerned, password cracking tools are available in the market to crack the password. To use this tool you need to be a computer literate. Its all users friendly as anyone who has the intention to do it can do so. This is one of the ways that crooks are using to steal identities through Cyber Crime.Trojans, Viruses and wormsTrojans simply called as Trojan horse (Shinder 2002). The Trojan is a software program, which is mostly written by hackers to avoid a system security (BT Group Plc, 2006). If the Trojans are installed the hackers can utilize the security gap to gain the unauthorized access. If the program is installed in the system, hackers can have full authority to delete or modify the files and install other programs and viruses.So the Trojans are hazardous if any unwary user who installs it is an executive director and has the access to the system files.Virus is another program which is more dangerous (Shinder 2002). Viruses are installed w ithout the users awareness and it executes actions that are very harmful. The viruses can come from anywhere mostly they come from the Internet and network services such as the World Wide Web (WWW), E-Mail, instant messaging and file sharing systems.Worms is also a program that is able to pass through crossways over the network from one system to another system (Shinder 2002). The worm was used to illustrate the command that harms multiuser systems. These programs are mainly design for legitimate users to manage the multiple systems at the same time. Perhaps hackers use worms to perform some harmful actions.Phishing E-Mail unity of the major concerns for Internet users is phishing E-Mail (BT Group Plc, 2006). The e-mail ids are available for sale on the Internet for a cheap price (Shinder 2002). The crooks take emolument of this opportunity to send bogus e-mails. The E-Mail claims to be from a bank, financial institute or other online fake website and asks the addressee to enter w hatever information they essential like personal details, user scream and password etc. This kind of technology is one of the major concerns for the internet users, because its quite weird to recognise which is the original website and that of the fake.Man in the middle man attackThe man in the middle attack is able to read, insert and modify at desire, (BT Group Plc, 2006) the message between some(prenominal)(prenominal) the parties without either party significant in the knowledge that the connection among them has been compromised.SpywareThe Spyware is software installed on the system without user knowledge it is somewhat like Trojan horse. The spyware program can also collect also the information like personal details, username and password and the Internet history. This may lead to harmful disruption to your system.The Network Intrusion and Attack, Password Cracking, Trojan, Virus, Worms, Man in the middle man attack and spyware (Shinder, 2002) (BT Group Plc, 2006) are the r esponsible for the identity theft in Cyber Crime. However I am doing master(a) research about these technologies, tools and programs for my dissertation with the help of my supervisor. I hope my primary research will be very helpful for Internet users, disposal companies and private companies to protect, check up on and become aware of the Identity theft in Cyber Crime.How to prevent yourself from cybercrime? Cyber crime is spreading like a virus throughout the world (BT Group Plc, 2006), how can you protect yourself from cybercrime? What should we do to avoid becoming a victim? consciousness of Network Security ConceptsAwareness of Basic cryptography conceptsAwareness firewallsAwareness of Phishing E-Mail.Awareness of Virus, Trojan and Worms.Awareness of Anti-Virus Software.Internet user, Government and Private concern should know the Awareness of Network Security, Password Cracking, firewalls, Phishing E-Mails, Trojans, Virus, Worms and Spyware to protect themselves from Identi ty Theft. My primary research will definitely help them to protect themselves from Identity theft in Cyber Crime. I am keenly performing primary research in awareness of the above tools, technology and program. I think that hopefully, my primary research would be more effective for the Internet user, Government and private concern.What would be my function for Identity theft in Cyber Crime?As we all are aware of the Identity Theft in Cyber Crime, but why still 70% of the people are becoming a victim for Identity Theft? The reason is most of the people are not aware of the protocol and other technology, tools and programs that are available in the market.I am working towards creating awareness of the Identity Theft in Cyber Crime.I hopefully think that my research will be more effective for the Internet user to protect them from Identity theft and not to become a victim.Resources The maximum budget for my project will be approximately 500. I will be visiting to research centres, and some companies to do primary research about tools and technology used by the crooks. The software requirement areMicrosoft Office 2007Adobe Photoshop CS3HTMLAdobe PremierMacromedia FlashSmart DrawAutoCADCorel Draw 12 The System requirements.central processing unitIntel Pentium 4 / Duo core / Core to DuoMemory (RAM)Minimum 256MBHard DiscMinimum 20 GBOperating SystemWindows tantrum/ Windows XPCD-ROM Readable/ RewritableUSB CableKeyboardMouse.PlanningThe estimated time for my project will be around 4 months. During my project I plan to visit some companies and research centre to gain more knowledge about Identity Theft in Cyber Crime and also I will be doing surveys about Identity Theft with the public.ConclusionThe migration of Identity Theft in Cyber Crime is not at all an easy task. It requires a huge effort, patience and judgment the fundamental architecture. This research will give a sound knowledge to Internet users, Government and private concern about what is Identity theft? How its happening? By whom its happening and how to protect yourself from identity theft?ReferencesAcxede (2006) Hack 12 Add a PayPal Button to your Office Live Basics Page Online http//www.acxede.net/hack_12_add_a_paypal_button_to_your_office_live_basics_page Accessed 29 April 2008Atwood, J. (2007) Coding Horror Phishing The Forever Hack Online http//www.codinghorror.com/blog/archives/000852.html Accessed 29 April 2008BT Group plc (2006) Security Report Online Identity Theft Online http//www.btplc.com/onlineidtheft/onlineidtheft.pdf Accessed 28 April 2008Burchell, D., Nielsen, D., and Sofield, S. (2004) PayPal Hacks. Sebastopol, CA, USA OReilly Media Inc.FraudWatch International (2003) Types of Identity Theft Online http//www.fraud arrestinternational.com/identity-theft/idtheft-types/ Accessed 28 April 2008Insight Consulting (2003) Identity Theft Managing the Risk Online http//www.insight.co.uk/files/whitepapers/Identity%20Theft%20(White%20paper).pdf Accessed 30 April 2008Loza, E. (2001) Internet Fraud Federal Trade Commission Prosecutions of Online Conduct. In Communications and the Law, Vol.23Shinder, D. L. (2002) Scene of the Cybercrime Computer Forensics Handbook. 1st Ed. London, UK Syngress PublishingGreys skeleton Vs Serendipity Psychological PerspectivesGreys Anatomy Vs Serendipity Psychological PerspectivesGreys Anatomy is a medical drama that follows group of operative interns, residents, and the unhomogeneous physicians who serve as their mentors both in their professional and personal lives (Rhimes 2005). There are multiple story lines that have been or are being followed to go along with the variety of characters and plots that the series portrays. The series first aired in 2005 and was recently renewed for its seventh season. The target audience for this show is men and women of various races, cultures, sexual preferences, religions, and personalities from the ages of 18-34 years of age (Rhimes 2005).Enter the world of Seattle Grace Hospital, where residents and interns strive to become the best surgeons in the country, but first they must learn to navigate the murky waters of life, love and relationships. The series starts with a focus on Meredith Grey, a surgical resident trying to live up to the paper of her famous mother, the brilliant Dr. Ellis Grey. Her Alzheimer-stricken mother ultimately passes on and in the moment she dies finally gives Meredith the validation she has always unavoidablenessed from her mother but was never able to. Meredith finally marries the brilliant neurosurgeon Dr. Derek Shepherd and is moving forward in a positive direction. As the show has progressed the focus has shifted from primarily Merediths point of view that of all of Merediths fellow interns, residents, and attending surgeons.Along with Meredith are four other interns that have started the program with her, Alex Karev, George OMalley, Izzie Stevens and Cristina Yang. They are mentored by Miranda Bailey, a general surgeon who eve ntually becomes the hospitals Chief Resident and later becomes an attending general surgeon as well as a number of other attending surgeons of various specialties. Dr. Addison capital of Alabama a highly specialized OB/GYN and neonatal surgeon, is Dereks wife who arrives in Seattle seeking reconciliation. Addison eventually leaves the show the show but continues to make occasional customer appearances through crossovers of the spin-off show Private Practice. Dr. Mark Sloan a talented plastic surgeon, is Dereks former best friend, who Derek caught sleeping with Addison. Callie Torres an orthopedic surgeon that was introduced as a love- evoke for George, whom she later marries, but ultimately divorces. Eventually there is a stunning addition to the cast when the interns that the show has followed become residents and are assigned their own interns one of which is Lexie Grey, Merediths half-sister on her fathers side. Trauma surgeon Owen Hunt and pediatric surgeon Arizona Robbins are introduced as love interests for Christina and Callie respectively. George dies a tragic heroic death, and Izzie leaves following the sectionalization of her relationship with Alex that was preceded by a striking fight with cancer. Lexie and Mark have a fairly serious relationship for a while until Mark chooses his new found daughter and unborn child over her. Now that Lexie is free from Mark and Alex is free from Izzie they start a fling to help each other get over their exes and it turns into a relationship. Attending Teddy Altman is introduced as a cardiothoracic surgeon from Owens military past. Finally as a reflection of the hard frugal times residents Jackson Avery and April Kepner, transfer to Seattle Grace in a merger with Mercy West.Serendipity is a romantic comedy that is a story about faith, destiny, and clock (Fields 2001). It shows the how two people connected only for a night and had such an impact on each other that they eventually end up together years later afte r going a little bit crazy trying to follow the signs they think fate is showing them. The exposure was shown in spheres in 2001 and has since been released on DVD and aired on television. The target audience is women 18-34 years of age.Sara and Jonathon meet in New York City during the Christmas season and both want to buy the same pair of black cashmere gloves in Bloomingdales. Jonathon graciously allows Sara to buy them and as a thank you she takes him to Serendipity 3 for a treat. Even though they are both dating other people they end up spending the evening together ice skating and talking. At the end of the night Jonathon asks Sara to at least exchange names and numbers incase life happens. Sara finally gives in and the paper with her name and number is blown out of her hand. Jonathan then pleads with her to economise the information down again, and being superstitious by nature, Sara decides it was a sign that maybe this connection wasnt meant to be. Jonathon asks her if f ate didnt want them to be together then why did they meet? This gives Sarah an idea. She has Jonathon write his name and number on a five dollar bill and uses it to buy a role of Certs. She promises to write her own name and number in the book Love in the time of Cholera and sell it to a used bookstore. That would put their information out into the world and if they were destined to be together these items would happen upon their way back to each other, and they would be able to contact each other.Life goes on and eventually they give up the idea of governing each other. Jonathon is engaged to Hallie, and Sara is engaged to Lars, but neither has forgotten about the other. As the wedding dates loom closer and closer Jonathon and Sara start to think more and more about the night they spent together. They both make one last effort to find each other. Jonathon does eventually find the book and Sara does eventually find the five dollar bill. They also eventually acceptedize that if t hey are looking for one another then they shouldnt be marrying anyone else. They both break off their engagements and eventually find themselves back at the skating rink where it all began, each with their single black cashmere glove. Now they are both single and are free to pursue the attraction they feel.Viewers watch this television series and this type of film for similar psychological reasons. Fischoff (n.d.) states that a person reflexion dramas is doing so to fill a social/ personality need and that watching comedies is done to make a person happy. Some people watch because they want the emotional knock they have experienced in the past from watching the same television show or similar movies. This emotional rush is what Potter (2008) classifies as a behavior effect called narcotizing. However, those are the things the average person seeks out almost subliminally where the need for entertainment and escape or disturbance is obvious even to the viewer them self (Fischoff n .d.).People watching Greys Anatomy do so for the vicarious emotional rush they get from see their favourite characters lives unfold. In one sequence there was a man in the hospital shooting people at random all in the hopes of acquiring to and killing the three doctors he blamed for his wifes death. There was a sense of suspense and terror as the audience put one overs who was getting shot and who the hitman was in reality going for. This suspense keeps the viewers watching the show with undivided attention which is what Potter (2008) calls behavioural attraction.People watching Serendipity are not going for the dramatic emotional rush but a romantic emotional rush. These people are looking for a short term escape into a world where fate and destiny explain why things happen the way that they do.Emotions are an integral part of a persons appreciation for television and movies. We experience emotions vicariously through the programs we choose to watch. What a person feels while w atching or listening to a television show or a movie is essential to the consentient psychological experience. There are two main physiologic components that effect emotion the physiological and the cognitive (Harris 2009). We physiologically experience emotions via increased heart rates, facial expressions like smiling, or other physical reactions like tears. The key is to link these physical reactions with a specific feeling using cognitive appraisal.While watching that specific episode of Greys Anatomy, a person home alone may physically start crying when a well known character is shot, their pulsation may increase as the suspense builds, they might even gasp, scream, or yell at the TV when someone is actually shot. A person law-abiding a viewer can see what the viewer is watching observe that the viewer is not smiling and not sneezing. These are the cognitive clues an observer uses to know if the tears being observed are those of sadness rather than happiness or possibly alle rgies.While watching Serendipity in a movie theater surrounded by other people viewers are more liable(predicate) to hold their emotions in only showing an occasional smile or becoming misty-eyed when Jonathan and Sara find each other at the end. An observer here would have a harder time making cognitive connections between physiological representations and the feelings expressed because the expressions are being suppressed out of concern for how other people will think.It is important to remember when going to see a movie in a movie theater a persons sensory experiences are heightened because the situation is new or special and so your body tries to take in and remember as much as it can (Forrester 2000). In the physical context of being at home alone while watching a TV show, however, people are more comfortable and familiar with their surroundings this takes away from the need for heightened senses because there is no one else to relate to or unacquainted(predicate) smells to t ake in and the feel of the furniture is well known (Forrester 2000).Cinematographic techniques such as the choice of shot, and camera movement, can greatly find the structure and meaning of a film or television show. Greys Anatomy uses a wide variety of different shots and camera movement to portray different things. For example when the shooter was going by a room with people in it you can see it from their terrified point of view of peaking through the blinds. Another example would be seeing an overview shot of an entire scene where people are scrambling everywhere and the shooter isnt in focus, but the chaos that he created by shooting into the clustering is. Serendipity uses the basic popular shots of those who are talking and specific points of importance like when Sara finds the five dollar bill or when Jonathan is disposed the book with Saras information in it as a traditional grooms gift.Music is used in many ways in both the movie and the television series. There is sad unison to queue sad feelings and upbeat music to trigger happy moods (Potter 2008). Music is used to build-up and round off various scenes by using dramatic combust of the music and an increase volume and complexity of the music fading into a softer simpler version of the same continual piece (Fischoff 2005). These musical techniques are used to ball up the audience into the world of the movie and to help focus attention on specific emotions at certain times. Greys Anatomy goes one step beyond the traditional music queues that Serendipity exhibits by having absolute button up at the moment of tragic climax. There was silence when Meredith looked out into the hall way after removing a bomb from some guys chest only to see the man who had taken the bomb from her explode with half the already evacuated surgical floor. There was also complete silence when Derek was shot by the shooter roaming the hospital. This silence from music is more dramatic then the build up of music traditio nally used because it is unfamiliar in this series not to have music or noise in the background and complete silence is an enormous difference.An editor uses timing and sequencing to create the spatial arrangement of events through time and develop the direction of how the movie or television show will unfold (Chandler, 1994) (Bordwell, Thompson 1993). Heim, et. al. (2004) explains how editors are the secret weapons behind the psychological believability and emotional connection the audience will have with the movie or television show.The editing for a movie is different that that for a television series. With a movie like Serendipity there is only one shot to captivate the audience and there is only an hour and a half to tell the intact story. This is why movies follow one central story and sequencing like two people have totally separate lives who meet once, and then find each other again when their lives are more compatible. There are also key timing points in the movie where J onathan and Sara just miss running into each other or are show in the same place but a different times creating a sense destiny is aware of their connection and that they will meet again when the time is right. With a television series like Greys Anatomy, however, there are multiple chances to get a persons interest and for this television series there are about twenty hours worth of show time over the already aired six seasons. This gives the editor more time to create and focus on the bonding of the viewers with multiple main characters and various plot lines. Putting together the right sequence of shots with correct timing is very important to keep a seamless transition from one characters story to the next and make all these individual stories a whole. agendum setting, priming, and framing theories all appear to work subconsciously and have long lasting effect (Bargh, Chen, Burrows 1996), because of these effects these theories leave people susceptible to being misled. agenda Setting is used to manipulate the amount of coverage a topic will get, what information is disposed(p) on the topic, and the manner in which the information is given (McCombs, and Shaw 1972). Agenda setting is a cognitive effect used to point the audience in the direction of what the creators think is important (Potter 2008). Priming is when a person is shown something that prepares them for the future of the show or movie (Tulving, Schacter, Stark 1982). Framing is how people file and build on what they know from experience to (Plous, 1993).Agenda setting, priming, and framing are both general and episode focused. In general the agenda of the Greys Anatomy is to show the work and private lives of a group of interns, residents, and mentoring doctors and that is the focus of the series. for each one show also has its own agenda like abortion, sexually transmitted diseases, various religious conflicts, death of loved ones, mistakes that as doctors have cause a affected role to die , and many more. At the beginning of every episode there is prologue in an audio format spoken over a montage of scenes that prepares the audience for what is going to happen in that specific episode. There is also an epilog at the end of each episode that is a continuation of the prolog, in that it summarizes the theme of the episode and gives the viewers closure. The series its self can alter how people think about emergency room doctors and what they have gone through to get there. Each specific episode has an opportunity to change how a person feels about the specific agenda presented.The agenda in Serendipity is that of destiny and romance and the whole movie is focused on it. The whole first ten minutes of the movie prime the audience for what is coming throughout the rest of the movie. The audience knows that there will be a search to find each other using the book and the five dollar bill and that the pair of gloves will eventually be brought back together. When all of Jonat han and Saras best efforts to find each other are thwarted and they finally give up looking for each other, the book is given to Jonathan as a grooms gift and the five dollar bill is given as change for movie head phones in front of Sara on the rake home to England. This may change a persons framework to believe that destiny does exist and that what is meant to happen will happen when it is supposed to happen.Normative Focus opening (Baron, Branscombe, Byrne 2009) explains why people only change jibe normal influences on their behavior when they can see it has relevance to their own lives. This theory can explain, for example, why an individual who is having a hard time finding love would watch Serendipity and choose to alter their framework to believe that destiny will help them find the right person.Propaganda is the manipulation of ideas, images, and symbols to persuade a large group of people to think a certain way. Propaganda can be defined in a variety of ways, according t o an individuals ideology and perception of the world. Change a persons framework. Greys Anatomy persuades people to think about emergency room doctors and what their lives are like at work and in private. Serendipity tries to persuade people to believe in destiny and fate. The one thing that both this movie and this television series have in common is the focus on how incredibly important good friends are. They focus on friends who will go through anything and everything with each other and still be there for each other no matter how foolish one of them may act, Serendipity, or how much one might try to push the other away, Greys Anatomy.The amount of c heart-to-heart, or hidden, advertising versus overt, or obvious, advertising is very different between movies and television series. When people see a product that they use and automatically feel happy it creates a reinforced relationship with the product. This is what Potter (2008) calls an immediate reinforcement effect and is of ten connected with overt advertising. Activation is a behavioral effect from covert advertising (Potter 2008). Television shows are able to have more covert advertising because they are designed to have periodic breaks that for overt advertising called commercials. Movies dont have that opportunity so there is a greater need to include advertising in the actual movie itself. For example Greys Anatomy has a few covert advertisements like the use of Bic pens, Fuji water, and Motorola and Blackberry cell phones. Most of its covert advertising, however, comes from an unlikely place. The songs sung by various famous artists have been used in the series to express various emotions and the sales of these songs have increased greatly after they aired on the series (Rhimes 2005). In Serendipity there are overt advertisements for Prada, the Waldorf Astoria, Serendipity 3, Bloomingdales, and Certs along with covert advertising for Coke, Love in the time of Cholera, Snickers, the movies Cool Ha nd Luke, the New York Times, and Hermes ties.Positive portrayals of a relatable heathen group can make an individual feel better and not alone. Negative portrayals of a cultural group that an individual can relate to is likely to anger that person and not only cause them not to watch the television show but they may even convince other individuals not to watch also. There are so many different cultural groups that individuals can relate to in Greys Anatomy that it would be hard to list them all. There are characters who are Korean, African American, Caucasian, Irish, Jewish, Christian, married, single, heterosexual, homosexual, powerful men, powerful women, underdog men, and underdog women from various social classes. These are only some of the groups that the regular cast of characters can appeal to. There are additional groups that are portrayed by in specific episodes that open up the world of cultural diversity even further. This was actually a goal of Rhimes (2005) while creat ing the show. She wanted the show to be as diverse as possible. Serendipity, however, is much simpler. It is basically focused and relatable to Caucasian middle-class.The key psychological effects that celebrities have they can get individuals to watch a movie or television show just by being in it. Because of a celebritys symbolic social influence people will follow their favorite celebrities careers, watching movies and television shows they may not have watched otherwise (Baron, Branscombe, Byrne 2009). However, if celebrity watching turns into an fierce personal obsession or pathological fantasy then it becomes unhealthy and dangerous (Maltby et. al. 2006). Examples of this are usually reported as celebrity stalking. This is not a regular occurrence but can happen when a person gets what Maltby et. al. (2006) calls celebrity worship syndrome, aka CWS.Movies usually profit from having already known celebrities in the cast. As far as celebrities go Serendipity may have benefite d from followers of Jon Cusack, Kate Beckinsale, John Corbett, and Eugene Levy. Television series like Greys Anatomy can benefit from starting with some well known actors and if the series is popular it may then turn other actors into celebrities. In the beginning viewers may have recognized Patrick Dempsy, Sandra Oh , and Katherine Heigl from their work outside the series. Now because of the series people would recognize Ellen Pompeo, Justin Chambers, Chandra Wilson, T.R. Night and many others if they were to work outside the series. Showing how a television series not only uses existing celebrities but creates them as well.Harris (2009) explains how professions presented in a positive manner greatly increase the number of people entering that field. The scary thing is that according to Potter (2008) 12.1% of professionals on television are represented as medical workers where only .9% of people are in the medical profession in real life. If you think about it, we show a higher num ber of doctors making fewer mistakes and giving more individualized attention in Greys Anatomy than there are in real life. If people arent careful and thinking critically they may expect these sorts of unrealistic actions in real life. In the movie Serendipity various professions are portrayed but they are really not take seriously or focused on they are sort of poked fun at and used to create ironic twists. There is an infuriating rule following sales clerk, a obituary writer for the New York Times, an indifferent sports caster, a holistic store owner who doesnt believe in the product she sells, a psychologist who doesnt believe her own advice about there not being soul mates, and a punch-drunk self-absorbed musician. If an individual were to watch this movie and focus on how the various professions are shown there could be some negative reactions, however since they are used as character enhancements and not focused on as professions it had the desired mood lightening effect mov ies viewers need to connect with the characters personalities.The amount of time a person spends with a specific show or type of movie is usually because of affection for its characters. The more exposure an individual has the greater an influence the exposure has on what is applied to our everyday lives. Characters can become familiar providing comfort and interesting plots provide a means of escape (Rutlege 2009). This can be healthy and relaxing as long as there is no blurring of the line between fantasy and reality (Potter 2008). With critical thinking applied to realize the dramatic license that the creators of the movies and television shows, a person can discern between unrealistic aspects and aspects of the shows or movies that may contain a gem of honor or a valuable lesson.Watching movies like Serendipity on a regular basis can cause people to have unrealistic expectations of their current or future relationships. They want the romantic emotional rush the feel from the mo vie in real life, which is not realistic.

No comments:

Post a Comment