Tuesday, August 6, 2019
Identity Theft in Cyber Crime | Proposal
Identity Theft in Cyber Crime | Proposal A Research Proposal on Identity Theft Abstract In Todays competitive world identity theft is increasing throughout the world. The main purpose of this research is to make people aware of what identity theft is, how its happening, and what kind of technology has been used. How do you protect yourself from Identity theft? Introduction The main study of research is regarding identity theft in Cyber Crime. Well first and foremost, what is meant by the term identity theft? A very short and simple definition for identity theft is stealing other peoples personal details like Social security number, credit card details, Date of Birth etc. What are the criminals going to do with these details? Why they do that? What kind of technologies are they using to steal the other persons details? Is it becoming very dangerous nowadays? How is it possible to protect yourself from identity theft? In the UK, almost all of the people are using broadband services (BT Group Plc, 2006). The Internet is making everything easy for the consumer. Almost half of the population in the UK is using online banking, paying their bills, shopping and using the Internet to fulfil their day to day tasks. The Internet is a form of global communication throughout the world. Almost 60% percent of the people in the UK use online banking (BT Group Plc, 2006). It is quick, and reliable; however people are not aware of the threads in online banking. The majority of the people in the UK are becoming victims of online banking. Online business, internet auction, Phishing E-Mails, Trojans, and Man in the Middle attacks, Easy Password, Spyware, Adware, Payment system and cookies are the threads on the Internet (BT Group Plc, 2006). Besides the technology mentioned above, there is more technology that will indicate, at the time of execution, the research? However consumers can protect themselves from the above threads by using effective Anti-virus software, Spyware and Adware remover, Secured Wireless connection by using WAP or WEP, avoid unnecessary cookies, delete unwanted e-mails and never give out their identity in instant messaging. If the consumers follow these systems they could protect themselves from Identity theft. These cyber crimes become a global issue throughout the world (Shinder, 2002). The hackers are using up-to-the-minute technology to get the identity. Criminals are using technologies like liberate effective virus and Phishing e-mails to millions of Internet users to capture their personal details, social security number, credit card details, and date of birth. Therefore, recently, online fraud has greatly increased day by day. The news released by Metro in 2007 says that 9 out of 10 people are affected by identity theft. So what is the solution to solve this major problem and avoid not becoming a victim of identity theft? Why do I chosen Identity Theft in Cyber Crime? As stated earlier Identity theft in Cyber Crime is increasing throughout the world. The reason why that I selected this topic is to make aware of in depth knowledge of what is Identity theft? And make the Internet users aware of the tools, technology, and programs are available in the market to protect them from Identity theft in Cyber Crime. I am going make an animation website to guide the Internet users, how to use and install the tools, technology and programs to protect them from Identity theft. Background and Literature Review Overview of Identity Theft In the UK (BT Group Plc, 2006), the USA and some parts of Europe the Identity Theft is spreading like a virus. Its become one of the major problems throughout the world. Each and every day someone becomes a victim of identity theft. The Internet is a form global communication throughout the world as we all known very well. Every individual, companys, students, Solicitor, Banking and almost in the entire field, the Internet is the key form of communication to make their work quicker, easier, more reliable and effective. Why it is Significant? As we are seeing, nowadays, online business is booming each and every day, as shown by news released by Federal Trade Commission (Loza, 2001), online businesses reach up to à £3.2 trillion by 2004. However online fraud is also increasing along with the increase in online business. Well its quite weird how millions of people are becoming victims of identity theft. The majority of the people losing their personal details are losing them by using the internet. The news releases by the Federal Trade Commission about online business fraud are as follows In United States of America online business reach up to à £3.2 trillion by 2004 (Loza, 2001) The consumers are making online business around à £3.5 million each month (Loza, 2001). The estimated online payment was à £1.5 billion in 1999 and à £30 billion in 2005 (Loza, 2001) In the UK almost five Million people use broadband (BT Group Plc, 2006). In UK almost 62% of Internet users are not aware of the threads and vulnerability in online, furthermore 40% of users said that they are not even bothered whether they become a victim or not. Some users say they dont even mind to giving out their Personal details to the third parties. Internet crime is not only the regarding credit card details but also the online Identity theft, which is increasingly rapidly throughout the world, especially in developed countries like the UK, the USA and Canada. This online ID Theft is one of the fastest growing Internet crimes in the UK especially. More or less 8% of the UK PC users are falling victim to online fraud. 15% know already that they have been targeted by an internet crook. The Internet crooks using technology to retrieve the personal information from the users, release Viruses, phishing e-mails and other effective technology. With this technology they can attack millions of Internet users very quickly. The identity theft has become a big hassle for Internet users (Atwood, 2007). Some Internet users might use E-Bay. It is the online website from which we can buy and sell whatever things that we need. It is a giant online shopping website. In this website we might need to exchange our card details to third parties, but the third party has more possibility to cheat us. This gives evidence that there are many threads and a users information is very vulnerable on the Internet. ID theft has developed online because the number of consumers surfing and shopping online has greatly increased (Insight Consulting, 2003) (Acxede, 2006). Unfortunately more from the personal information is derived from the electoral registration. Mainly we have started to use and exchange the credit card details with banks and other retailers. This projects main aims are to show the risks associated with e commerce and the Internet communication technologies. Further, discussion continues on personal ID theft As a result we are losing our privacy in the Internet (Burchell et al, 2004), for example, when we register for any subscriptions from a service from an online company or when downloads bring increased risk of giving away personal information. The main issue the world is facing now, when we submitting our personal data, is that the companies give this information to third parties. They behave dishonestly to us. Cookies, adware and web bugs are used to retrieve the personal information. As we all known, most of the Companies from the UK have their customer service in India (BT Group Plc, 2006). In lndia, Labour is cheap, thats why Almost 80% of the international call centres are located in India. Because of cheap labour in India, employees start selling the IDs to the third parties. BT (British Telecom) holds almost 90% of British peoples identity information, addresses and other security information, in the department of customer service for BT in India. Due to cheap labour they wont get panic to sell Personal Details. So no one is safe in UK. Fake ID There are some websites which sell fake ID cards and deliver the ID on the same day (FraudWatch International, 2003). The above ID is a Fake ID, so the crooks are not worried nowadays about making online fake ID. The fake ID will cost you only à £10 and the delivery charge is à £5. So there is a separate website for making fake passport, ID, National Insurance Number and Student ID card. Just for à £10. So any one could make one fake id and NI number and they can start working in the UK. Online Scam The online scam means sending fake web pages to your email from a well-known ISP (BT Group Plc, 2006) (Insight Consulting, 2003). This email will tell the addressee to update their ISP Billing information and it will direct them to click on the fake link. This is to turn the people to the bogus webpage. They are both similar in appearance. It contains the same company logo and all the other infrastructure of the website remains the same. The focal seek of the scam is to instruct to enter their credit cards details, social security number, Date of Birth and the security number. This information would be more than enough to earn thousands of pounds and dollars. In most peoples Curriculum Vitae personal information is mentioned, including Date of Birth. Millions of people register in famous jobs websites every day. In that case, many crooks will come across our personal information. If our personal information gets in to the hands of cyber criminals, then we will become the victims for identity theft. The main purpose of the research is to bring together the skills, experience, and research about the online Identity theft. It will examine what is online Identity theft is, how its happening, what technology has been used, and how to prevent the online identity theft. Methodology My methodology for this proposal is how people are losing their data, in what kind of way they are becoming gullible by the information supplied by the crook and how to protect them from this identity theft on the Internet. At the current situation, the modernised world is facing lot of tribulation from well educated crooks (Insight Consulting, 2003). As the technology develops along X -axis, they generate equal antagonist clout to overcome the security issues along Y-axis. My project mainly concerns identity theft in Cyber Crime. There are some effective technologies currently being used for online ID theft. Following, are the technologies that I recently found from my research from journals, books and online. (Shinder 2002) Network Intrusion and Attacks Password Cracking Trojans Viruses Worms Phishing Man in middle attack Spyware The above mentioned points are responsible for ID theft and other kinds of crimes over the Internet (Shinder, 2002). Thus meaning, the cyber criminal cleverly hacks the personal details by using any one of the above mention points. So the criminals use the above technology, tools and programs to make a tragedy on the World Wide Web. Network Intrusion and Attacks The Network Intrusion and attack comes from all direction (Shinder 2002). It may come from external threads or from internal threads. The external threads mostly come from the Internet and the internal threads possibly from an inside job. Internal threads may come from Local Area Network (LAN) or some kind of physical access to attack the system. Nowadays the attackers dont need to have more skills, because there are some tools available to attack. Password Cracking There are more than 100 tools are there in the market to crack the password (Shinder 2002). As far as my secondary research is concerned, password cracking tools are available in the market to crack the password. To use this tool you need to be a computer literate. Its all users friendly as anyone who has the intention to do it can do so. This is one of the ways that crooks are using to steal identities through Cyber Crime. Trojans, Viruses and worms Trojans simply called as Trojan horse (Shinder 2002). The Trojan is a software program, which is mostly written by hackers to avoid a system security (BT Group Plc, 2006). If the Trojans are installed the hackers can utilize the security gap to gain the unauthorized access. If the program is installed in the system, hackers can have full authority to delete or modify the files and install other programs and viruses. So the Trojans are hazardous if any unwary user who installs it is an administrator and has the access to the system files. Virus is another program which is more dangerous (Shinder 2002). Viruses are installed without the users awareness and it executes actions that are very harmful. The viruses can come from anywhere; mostly they come from the Internet and network services such as the World Wide Web (WWW), E-Mail, instant messaging and file sharing systems. Worms is also a program that is able to pass through crossways over the network from one system to another system (Shinder 2002). The worm was used to illustrate the code that harms multiuser systems. These programs are mainly design for legitimate users to manage the multiple systems at the same time. Perhaps hackers use worms to perform some harmful actions. Phishing E-Mail One of the major concerns for Internet users is phishing E-Mail (BT Group Plc, 2006). The e-mail ids are available for sale on the Internet for a cheap price (Shinder 2002). The crooks take advantage of this opportunity to send bogus e-mails. The E-Mail claims to be from a bank, financial institute or other online fake website and asks the addressee to enter whatever information they required like personal details, username and password etc. This kind of technology is one of the major concerns for the internet users, because its quite weird to recognise which is the original website and that of the fake. Man in the middle man attack The man in the middle attack is able to read, insert and modify at desire, (BT Group Plc, 2006) the message between both the parties without either party significant in the knowledge that the connection among them has been compromised. Spyware The Spyware is software installed on the system without user knowledge; it is somewhat like Trojan horse. The spyware program can also collect also the information like personal details, username and password and the Internet history. This may lead to harmful disruption to your system. The Network Intrusion and Attack, Password Cracking, Trojan, Virus, Worms, Man in the middle man attack and spyware (Shinder, 2002) (BT Group Plc, 2006) are the responsible for the identity theft in Cyber Crime. However I am doing primary research about these technologies, tools and programs for my dissertation with the help of my supervisor. I hope my primary research will be very helpful for Internet users, government companies and private companies to protect, learn and become aware of the Identity theft in Cyber Crime. How to prevent yourself from cybercrime? Cyber crime is spreading like a virus throughout the world (BT Group Plc, 2006), how can you protect yourself from cybercrime? What should we do to avoid becoming a victim? Awareness of Network Security Concepts Awareness of Basic cryptography concepts Awareness firewalls Awareness of Phishing E-Mail. Awareness of Virus, Trojan and Worms. Awareness of Anti-Virus Software. Internet user, Government and Private concern should know the Awareness of Network Security, Password Cracking, firewalls, Phishing E-Mails, Trojans, Virus, Worms and Spyware to protect themselves from Identity Theft. My primary research will definitely help them to protect themselves from Identity theft in Cyber Crime. I am keenly performing primary research in awareness of the above tools, technology and program. I think that hopefully, my primary research would be more effective for the Internet user, Government and private concern. What would be my contribution for Identity theft in Cyber Crime? As we all are aware of the Identity Theft in Cyber Crime, but why still 70% of the people are becoming a victim for Identity Theft? The reason is most of the people are not aware of the protocol and other technology, tools and programs that are available in the market. I am working towards creating awareness of the Identity Theft in Cyber Crime. I hopefully think that my research will be more effective for the Internet user to protect them from Identity theft and not to become a victim. Resources The maximum budget for my project will be approximately à £500. I will be visiting to research centres, and some companies to do primary research about tools and technology used by the crooks. The software requirement are Microsoft Office 2007 Adobe Photoshop CS3 HTML Adobe Premier Macromedia Flash Smart Draw AutoCAD Corel Draw 12 The System requirements. Processor Intel Pentium 4 / Duo core / Core to Duo Memory (RAM) Minimum 256MB Hard Disc Minimum 20 GB Operating System Windows Vista/ Windows XP CD-ROM Readable/ Rewritable USB Cable Keyboard Mouse. Planning The estimated time for my project will be around 4 months. During my project I plan to visit some companies and research centre to gain more knowledge about Identity Theft in Cyber Crime and also I will be doing surveys about Identity Theft with the public. Conclusion The migration of Identity Theft in Cyber Crime is not at all an easy task. It requires a huge effort, patience and understanding the fundamental architecture. This research will give a sound knowledge to Internet users, Government and private concern about what is Identity theft? How its happening? By whom its happening and how to protect yourself from identity theft? References Acxede (2006) Hack #12: Add a PayPal Button to your Office Live Basics Page [Online] http://www.acxede.net/hack_12_add_a_paypal_button_to_your_office_live_basics_page [Accessed: 29 April 2008] Atwood, J. (2007) Coding Horror: Phishing: The Forever Hack [Online] http://www.codinghorror.com/blog/archives/000852.html [Accessed: 29 April 2008] BT Group plc (2006) Security Report: Online Identity Theft [Online] http://www.btplc.com/onlineidtheft/onlineidtheft.pdf [Accessed: 28 April 2008] Burchell, D., Nielsen, D., and Sofield, S. (2004) PayPal Hacks. Sebastopol, CA, USA: OReilly Media Inc. FraudWatch International (2003) Types of Identity Theft [Online] http://www.fraudwatchinternational.com/identity-theft/idtheft-types/ [Accessed: 28 April 2008] Insight Consulting (2003) Identity Theft: Managing the Risk [Online] http://www.insight.co.uk/files/whitepapers/Identity%20Theft%20(White%20paper).pdf [Accessed: 30 April 2008] Loza, E. (2001) Internet Fraud: Federal Trade Commission Prosecutions of Online Conduct. In: Communications and the Law, Vol.23 Shinder, D. L. (2002) Scene of the Cybercrime: Computer Forensics Handbook. 1st Ed. London, UK: Syngress Publishing Greys Anatomy Vs Serendipity: Psychological Perspectives Greys Anatomy Vs Serendipity: Psychological Perspectives Greys Anatomy is a medical drama that follows group of surgical interns, residents, and the various physicians who serve as their mentors both in their professional and personal lives (Rhimes 2005). There are multiple story lines that have been or are being followed to go along with the variety of characters and plots that the series portrays. The series first aired in 2005 and was recently renewed for its seventh season. The target audience for this show is men and women of various races, cultures, sexual preferences, religions, and personalities from the ages of 18-34 years of age (Rhimes 2005). Enter the world of Seattle Grace Hospital, where residents and interns strive to become the best surgeons in the country, but first they must learn to navigate the murky waters of life, love and relationships. The series starts with a focus on Meredith Grey, a surgical resident trying to live up to the reputation of her famous mother, the brilliant Dr. Ellis Grey. Her Alzheimer-stricken mother eventually passes on and in the moment she dies finally gives Meredith the validation she has always wanted from her mother but was never able to. Meredith finally marries the brilliant neurosurgeon Dr. Derek Shepherd and is moving forward in a positive direction. As the show has progressed the focus has shifted from primarily Merediths point of view that of all of Merediths fellow interns, residents, and attending surgeons. Along with Meredith are four other interns that have started the program with her, Alex Karev, George OMalley, Izzie Stevens and Cristina Yang. They are mentored by Miranda Bailey, a general surgeon who eventually becomes the hospitals Chief Resident and later becomes an attending general surgeon as well as a number of other attending surgeons of various specialties. Dr. Addison Montgomery a highly specialized OB/GYN and neonatal surgeon, is Dereks wife who arrives in Seattle seeking reconciliation. Addison eventually leaves the show the show but continues to make occasional guest appearances through crossovers of the spin-off show Private Practice. Dr. Mark Sloan a talented plastic surgeon, is Dereks former best friend, who Derek caught sleeping with Addison. Callie Torres an orthopedic surgeon that was introduced as a love-interest for George, whom she later marries, but ultimately divorces. Eventually there is a stunning addition to the cast when the interns that the show has foll owed become residents and are assigned their own interns one of which is Lexie Grey, Merediths half-sister on her fathers side. Trauma surgeon Owen Hunt and pediatric surgeon Arizona Robbins are introduced as love interests for Christina and Callie respectively. George dies a tragic heroic death, and Izzie leaves following the breakdown of her relationship with Alex that was preceded by a dramatic fight with cancer. Lexie and Mark have a fairly serious relationship for a while until Mark chooses his newly found daughter and unborn child over her. Now that Lexie is free from Mark and Alex is free from Izzie they start a fling to help each other get over their exes and it turns into a relationship. Attending Teddy Altman is introduced as a cardiothoracic surgeon from Owens military past. Finally as a reflection of the hard economic times residents Jackson Avery and April Kepner, transfer to Seattle Grace in a merger with Mercy West. Serendipity is a romantic comedy that is a story about faith, destiny, and timing (Fields 2001). It shows the how two people connected only for a night and had such an impact on each other that they eventually end up together years later after going a little bit crazy trying to follow the signs they think fate is showing them. The movie was shown in theaters in 2001 and has since been released on DVD and aired on television. The target audience is women 18-34 years of age. Sara and Jonathon meet in New York City during the Christmas season and both want to buy the same pair of black cashmere gloves in Bloomingdales. Jonathon graciously allows Sara to buy them and as a thank you she takes him to Serendipity 3 for a treat. Even though they are both dating other people they end up spending the evening together ice skating and talking. At the end of the night Jonathon asks Sara to at least exchange names and numbers incase life happens. Sara finally gives in and the paper with her name and number is blown out of her hand. Jonathan then pleads with her to write the information down again, and being superstitious by nature, Sara decides it was a sign that maybe this connection wasnt meant to be. Jonathon asks her if fate didnt want them to be together then why did they meet? This gives Sarah an idea. She has Jonathon write his name and number on a five dollar bill and uses it to buy a role of Certs. She promises to write her own name and number in the book L ove in the time of Cholera and sell it to a used bookstore. That would put their information out into the world and if they were destined to be together these items would find their way back to each other, and they would be able to contact each other. Life goes on and eventually they give up the idea of finding each other. Jonathon is engaged to Hallie, and Sara is engaged to Lars, but neither has forgotten about the other. As the wedding dates loom closer and closer Jonathon and Sara start to think more and more about the night they spent together. They both make one last effort to find each other. Jonathon does eventually find the book and Sara does eventually find the five dollar bill. They also eventually realize that if they are looking for one another then they shouldnt be marrying anyone else. They both break off their engagements and eventually find themselves back at the skating rink where it all began, each with their single black cashmere glove. Now they are both single and are free to pursue the attraction they feel. Viewers watch this television series and this type of movie for similar psychological reasons. Fischoff (n.d.) states that a person watching dramas is doing so to fill a social/ personality need and that watching comedies is done to make a person happy. Some people watch because they want the emotional rush they have experienced in the past from watching the same television show or similar movies. This emotional rush is what Potter (2008) classifies as a behavior effect called narcotizing. However, those are the things the average person seeks out almost subliminally where the need for entertainment and escape or distraction is obvious even to the viewer them self (Fischoff n.d.). People watching Greys Anatomy do so for the vicarious emotional rush they get from see their favorite characters lives unfold. In one episode there was a man in the hospital shooting people at random all in the hopes of getting to and killing the three doctors he blamed for his wifes death. There was a sense of suspense and terror as the audience realizes who was getting shot and who the shooter was actually going for. This suspense keeps the viewers watching the show with undivided attention which is what Potter (2008) calls behavioral attraction. People watching Serendipity are not going for the dramatic emotional rush but a romantic emotional rush. These people are looking for a short term escape into a world where fate and destiny explain why things happen the way that they do. Emotions are an integral part of a persons appreciation for television and movies. We experience emotions vicariously through the programs we choose to watch. What a person feels while watching or listening to a television show or a movie is essential to the whole psychological experience. There are two main physiological components that effect emotion: the physiological and the cognitive (Harris 2009). We physiologically experience emotions via increased heart rates, facial expressions like smiling, or other physical reactions like tears. The key is to link these physical reactions with a specific feeling using cognitive appraisal. While watching that specific episode of Greys Anatomy, a person home alone may physically start crying when a well known character is shot, their pulse may increase as the suspense builds, they might even gasp, scream, or yell at the TV when someone is actually shot. A person observing a viewer can see what the viewer is watching observe that the viewer is not smiling and not sneezing. These are the cognitive clues an observer uses to know if the tears being observed are those of sadness rather than happiness or possibly allergies. While watching Serendipity in a movie theater surrounded by other people viewers are more likely to hold their emotions in only showing an occasional smile or becoming misty-eyed when Jonathan and Sara find each other at the end. An observer here would have a harder time making cognitive connections between physiological representations and the feelings expressed because the expressions are being suppressed out of concern for how other people will think. It is important to remember when going to see a movie in a movie theater a persons sensory experiences are heightened because the situation is new or special and so your body tries to take in and remember as much as it can (Forrester 2000). In the physical context of being at home alone while watching a TV show, however, people are more comfortable and familiar with their surroundings this takes away from the need for heightened senses because there is no one else to relate to or unfamiliar smells to take in and the feel of the furniture is well known (Forrester 2000). Cinematographic techniques such as the choice of shot, and camera movement, can greatly influence the structure and meaning of a film or television show. Greys Anatomy uses a wide variety of different shots and camera movement to portray different things. For example when the shooter was going by a room with people in it you can see it from their terrified point of view of peaking through the blinds. Another example would be seeing an overview shot of an entire scene where people are scrambling everywhere and the shooter isnt in focus, but the chaos that he created by shooting into the crowd is. Serendipity uses the basic popular shots of those who are talking and specific points of importance like when Sara finds the five dollar bill or when Jonathan is given the book with Saras information in it as a traditional grooms gift. Music is used in many ways in both the movie and the television series. There is sad music to queue sad feelings and upbeat music to trigger happy moods (Potter 2008). Music is used to build-up and round off various scenes by using dramatic flaring of the music and an increase volume and complexity of the music fading into a softer simpler version of the same continual piece (Fischoff 2005). These musical techniques are used to suck the audience into the world of the movie and to help focus attention on specific emotions at certain times. Greys Anatomy goes one step beyond the traditional music queues that Serendipity exhibits by having absolute silence at the moment of tragic climax. There was silence when Meredith looked out into the hall way after removing a bomb from some guys chest only to see the man who had taken the bomb from her explode with half the already evacuated surgical floor. There was also complete silence when Derek was shot by the shooter roaming the hospital. Thi s silence from music is more dramatic then the build up of music traditionally used because it is unfamiliar in this series not to have music or noise in the background and complete silence is an enormous difference. An editor uses timing and sequencing to create the spacing of events through time and develop the direction of how the movie or television show will unfold (Chandler, 1994) (Bordwell, Thompson 1993). Heim, et. al. (2004) explains how editors are the secret weapons behind the psychological believability and emotional connection the audience will have with the movie or television show. The editing for a movie is different that that for a television series. With a movie like Serendipity there is only one shot to captivate the audience and there is only an hour and a half to tell the whole story. This is why movies follow one central story and sequencing like two people have totally separate lives who meet once, and then find each other again when their lives are more compatible. There are also key timing points in the movie where Jonathan and Sara just miss running into each other or are show in the same place but a different times creating a sense destiny is aware of their connection and that they will meet again when the time is right. With a television series like Greys Anatomy, however, there are multiple chances to get a persons interest and for this television series there are about twenty hours worth of show time over the already aired six seasons. This gives the editor more time to create and focus on the bonding of the viewers with multiple main characters and various plot lines. Putting together the right sequence of shots with proper timing is very important to keep a seamless transition from one characters story to the next and make all these individual stories a whole. Agenda setting, priming, and framing theories all appear to work subconsciously and have long lasting effects (Bargh, Chen, Burrows 1996), because of these effects these theories leave people susceptible to being misled. Agenda Setting is used to manipulate the amount of coverage a topic will get, what information is given on the topic, and the manner in which the information is given (McCombs, and Shaw 1972). Agenda setting is a cognitive effect used to point the audience in the direction of what the creators think is important (Potter 2008). Priming is when a person is shown something that prepares them for the future of the show or movie (Tulving, Schacter, Stark 1982). Framing is how people file and build on what they know from experience to (Plous, 1993). Agenda setting, priming, and framing are both general and episode focused. In general the agenda of the Greys Anatomy is to show the work and private lives of a group of interns, residents, and mentoring doctors and that is the focus of the series. Each show also has its own agenda like abortion, sexually transmitted diseases, various religious conflicts, death of loved ones, mistakes that as doctors have cause a patient to die, and many more. At the beginning of every episode there is prologue in an audio format spoken over a montage of scenes that prepares the audience for what is going to happen in that specific episode. There is also an epilog at the end of each episode that is a continuation of the prolog, in that it summarizes the theme of the episode and gives the viewers closure. The series its self can alter how people think about emergency room doctors and what they have gone through to get there. Each specific episode has an opportunity to change how a person feels about t he specific agenda presented. The agenda in Serendipity is that of destiny and romance and the whole movie is focused on it. The whole first ten minutes of the movie prime the audience for what is coming throughout the rest of the movie. The audience knows that there will be a search to find each other using the book and the five dollar bill and that the pair of gloves will eventually be brought back together. When all of Jonathan and Saras best efforts to find each other are thwarted and they finally give up looking for each other, the book is given to Jonathan as a grooms gift and the five dollar bill is given as change for movie head phones in front of Sara on the plane home to England. This may change a persons framework to believe that destiny does exist and that what is meant to happen will happen when it is supposed to happen. Normative Focus Theory (Baron, Branscombe, Byrne 2009) explains why people only change according normal influences on their behavior when they can see it has relevance to their own lives. This theory can explain, for example, why an individual who is having a hard time finding love would watch Serendipity and choose to alter their framework to believe that destiny will help them find the right person. Propaganda is the manipulation of ideas, images, and symbols to persuade a large group of people to think a certain way. Propaganda can be defined in a variety of ways, according to an individuals ideology and perception of the world. Change a persons framework. Greys Anatomy persuades people to think about emergency room doctors and what their lives are like at work and in private. Serendipity tries to persuade people to believe in destiny and fate. The one thing that both this movie and this television series have in common is the focus on how incredibly important good friends are. They focus on friends who will go through anything and everything with each other and still be there for each other no matter how foolish one of them may act, Serendipity, or how much one might try to push the other away, Greys Anatomy. The amount of covert, or hidden, advertising versus overt, or obvious, advertising is very different between movies and television series. When people see a product that they use and automatically feel happy it creates a reinforced relationship with the product. This is what Potter (2008) calls an immediate reinforcement effect and is often connected with overt advertising. Activation is a behavioral effect from covert advertising (Potter 2008). Television shows are able to have more covert advertising because they are designed to have periodic breaks that for overt advertising called commercials. Movies dont have that opportunity so there is a greater need to include advertising in the actual movie itself. For example Greys Anatomy has a few covert advertisements like the use of Bic pens, Fuji water, and Motorola and Blackberry cell phones. Most of its covert advertising, however, comes from an unlikely place. The songs sung by various famous artists have been used in the series to express various emotions and the sales of these songs have increased greatly after they aired on the series (Rhimes 2005). In Serendipity there are overt advertisements for Prada, the Waldorf Astoria, Serendipity 3, Bloomingdales, and Certs along with covert advertising for Coke, Love in the time of Cholera, Snickers, the movies Cool Hand Luke, the New York Times, and Hermes ties. Positive portrayals of a relatable cultural group can make an individual feel better and not alone. Negative portrayals of a cultural group that an individual can relate to is likely to anger that person and not only cause them not to watch the television show but they may even convince other individuals not to watch also. There are so many different cultural groups that individuals can relate to in Greys Anatomy that it would be hard to list them all. There are characters who are Korean, African American, Caucasian, Irish, Jewish, Christian, married, single, heterosexual, homosexual, powerful men, powerful women, underdog men, and underdog women from various social classes. These are only some of the groups that the regular cast of characters can appeal to. There are additional groups that are portrayed by in specific episodes that open up the world of cultural diversity even further. This was actually a goal of Rhimes (2005) while creating the show. She wanted the show to be as div erse as possible. Serendipity, however, is much simpler. It is basically focused and relatable to Caucasian middle-class. The key psychological effects that celebrities have they can get individuals to watch a movie or television show just by being in it. Because of a celebritys symbolic social influence people will follow their favorite celebrities careers, watching movies and television shows they may not have watched otherwise (Baron, Branscombe, Byrne 2009). However, if celebrity watching turns into an intense personal obsession or pathological fantasy then it becomes unhealthy and dangerous (Maltby et. al. 2006). Examples of this are usually reported as celebrity stalking. This is not a regular occurrence but can happen when a person gets what Maltby et. al. (2006) calls celebrity worship syndrome, aka CWS. Movies usually profit from having already known celebrities in the cast. As far as celebrities go Serendipity may have benefited from followers of Jon Cusack, Kate Beckinsale, John Corbett, and Eugene Levy. Television series like Greys Anatomy can benefit from starting with some well known actors and if the series is popular it may then turn other actors into celebrities. In the beginning viewers may have recognized Patrick Dempsy, Sandra Oh , and Katherine Heigl from their work outside the series. Now because of the series people would recognize Ellen Pompeo, Justin Chambers, Chandra Wilson, T.R. Night and many others if they were to work outside the series. Showing how a television series not only uses existing celebrities but creates them as well. Harris (2009) explains how professions presented in a positive manner greatly increase the number of people entering that field. The scary thing is that according to Potter (2008) 12.1% of professionals on television are represented as medical workers where only .9% of people are in the medical profession in real life. If you think about it, we show a higher number of doctors making fewer mistakes and giving more individualized attention in Greys Anatomy than there are in real life. If people arent careful and thinking critically they may expect these sorts of unrealistic actions in real life. In the movie Serendipity various professions are portrayed but they are really not take seriously or focused on; they are sort of poked fun at and used to create ironic twists. There is an infuriating rule following sales clerk, a obituary writer for the New York Times, an indifferent sports caster, a holistic store owner who doesnt believe in the product she sells, a psychologist who doesnt be lieve her own advice about there not being soul mates, and a goofy self-absorbed musician. If an individual were to watch this movie and focus on how the various professions are shown there could be some negative reactions, however since they are used as character enhancements and not focused on as professions it had the desired mood lightening effect movies viewers need to connect with the characters personalities. The amount of time a person spends with a specific show or type of movie is usually because of affection for its characters. The more exposure an individual has the greater an influence the exposure has on what is applied to our everyday lives. Characters can become familiar providing comfort and interesting plots provide a means of escape (Rutlege 2009). This can be healthy and relaxing as long as there is no blurring of the line between fantasy and reality (Potter 2008). With critical thinking applied to realize the dramatic license that the creators of the movies and television shows, a person can discern between unrealistic aspects and aspects of the shows or movies that may contain a gem of truth or a valuable lesson. Watching movies like Serendipity on a regular basis can cause people to have unrealistic expectations of their current or future relationships. They want the romantic emotional rush the feel from the movie in real life, which is not realistic.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.