SlideShare ist ein Scribd-Unternehmen logo
1 von 10
My Idea Pitch
     1
Narrative of advert

A 20 year old man goes into passport control
  and hands his passport to the woman but the
  picture is blank she shows it to him, then it
  flashes back and he didn’t remember to log
  out of his Facebook and someone has his
  identity and someone else is living his life. It
  rewinds and then his conscience reminds him
  to log out of shared computers.
Key Message
• The message is that be careful and make sure
  you remember to log out of all accounts. Eg
  Facebook, Email, Twitter and Tumblr
Locations
• In an airport near passport control and in a
  library
               Technology
   • HD Camera
   • Tripod
   • Final cut
My Idea Pitch
     2
Narrative
• A 16 years old female tries to go into college and gets stop by
  a member of staff. The member of staff doesn’t recognise
  them, so ask to see their student ID. The photo is blank. She's
  Confused. We then cut to a shot of someone on a Facebook
  account.
• The teacher challenges the student and ask her questions
  about her name, age and what lessons she has, the student
  goes to answer but suddenly cant remember.
• Then we cut to a person on the girls Facebook deleting the
  information. The more the person changes on her Facebook is
  the less she knows about herself. Consequently The teacher
  asks her to leave.
Key Message
• The message is that be careful and make sure
  you remember to log out of all accounts. Eg
  Facebook, Email, Twitter and Tumblr
Locations
• Library where there is shared computers and
  the school entrance security box.
               Technology
   •   HD Camera
   •   Tripod
   •   Final cut
   •   Dolly
Audience
My target audience is young people that use
social networking sites and go college or
university. My age range is from 17-20, that
are both genders and that are of all ethnic
groups. They might have part-time jobs while
still in full education so they might have an
income, some of there hobbies and interest
might be listening to music going partying,
relaxing with friends, using blackberry
messenger or using other social networking
site to communicate.
How does both ideas appeal to my
  target audience and which lines of
         appeals have I used?
• My ideas appeals to my target audience
  because I am going to use actors that are of
  the same age so that then the audience can
  relate with the actors and the lines of appeal
  that I have used for my first idea is solution to
  problem and fear and for my second idea the
  lines of appeal that I have used are solution to
  problem, fear and insecurities.

Weitere ähnliche Inhalte

Was ist angesagt?

What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentationSally Garza
 
Cyber bullying for Elementary
Cyber bullying for ElementaryCyber bullying for Elementary
Cyber bullying for Elementaryshannonmf
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpscl
 
Cyberbulling presentation
Cyberbulling presentationCyberbulling presentation
Cyberbulling presentationpaulinariba
 
Technology Presentation
Technology PresentationTechnology Presentation
Technology PresentationTatiDenai
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
S1 internet safety-chattingonline
S1 internet safety-chattingonlineS1 internet safety-chattingonline
S1 internet safety-chattingonlinemissstevenson01
 
EDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT Delhi
EDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT DelhiEDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT Delhi
EDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT DelhiEduexcellence
 

Was ist angesagt? (15)

What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentation
 
Cyber bullying for Elementary
Cyber bullying for ElementaryCyber bullying for Elementary
Cyber bullying for Elementary
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Ethics and cyber bullying
Ethics and cyber bullyingEthics and cyber bullying
Ethics and cyber bullying
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Media film ideas
Media film ideasMedia film ideas
Media film ideas
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbulling presentation
Cyberbulling presentationCyberbulling presentation
Cyberbulling presentation
 
Technology Presentation
Technology PresentationTechnology Presentation
Technology Presentation
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
S1 internet safety-chattingonline
S1 internet safety-chattingonlineS1 internet safety-chattingonline
S1 internet safety-chattingonline
 
EDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT Delhi
EDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT DelhiEDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT Delhi
EDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT Delhi
 

Andere mochten auch

Mapping the development of my idea
Mapping the development of my ideaMapping the development of my idea
Mapping the development of my ideaMalaika21
 
Textual analysis
Textual analysisTextual analysis
Textual analysisMalaika21
 
Final research audit
Final research auditFinal research audit
Final research auditMalaika21
 
Research audit
Research auditResearch audit
Research auditMalaika21
 
Research audit
Research auditResearch audit
Research auditMalaika21
 
Pitch for Two Ideas for my product based on my Research
Pitch for Two Ideas for my product based on my ResearchPitch for Two Ideas for my product based on my Research
Pitch for Two Ideas for my product based on my ResearchMalaika21
 
Two+ideas+for+product+based+research
Two+ideas+for+product+based+researchTwo+ideas+for+product+based+research
Two+ideas+for+product+based+researchMalaika21
 
Evaluation of unit 2 advert
Evaluation of unit 2 advertEvaluation of unit 2 advert
Evaluation of unit 2 advertMalaika21
 
Swo ts anddhfbzsdhfb
Swo ts anddhfbzsdhfbSwo ts anddhfbzsdhfb
Swo ts anddhfbzsdhfbMalaika21
 
Research into existing output
Research into existing outputResearch into existing output
Research into existing outputMalaika21
 
Research audit
Research auditResearch audit
Research auditMalaika21
 
Malaika technology audits
Malaika technology auditsMalaika technology audits
Malaika technology auditsMalaika21
 
Textual analysis
Textual analysisTextual analysis
Textual analysisMalaika21
 
Formato dificultadesapreme
Formato dificultadesapremeFormato dificultadesapreme
Formato dificultadesapremeArmando Aguilar
 
Java垃圾收集原理
Java垃圾收集原理Java垃圾收集原理
Java垃圾收集原理yin gong
 
Ashestoangels del 8
Ashestoangels del 8Ashestoangels del 8
Ashestoangels del 8skarahan08
 
Slideshow (Bruce & Jami Sangster)
Slideshow (Bruce & Jami Sangster)Slideshow (Bruce & Jami Sangster)
Slideshow (Bruce & Jami Sangster)Jami Clark
 
Documentary ideas finished
Documentary ideas finishedDocumentary ideas finished
Documentary ideas finishedMalaika21
 

Andere mochten auch (20)

Mapping the development of my idea
Mapping the development of my ideaMapping the development of my idea
Mapping the development of my idea
 
Textual analysis
Textual analysisTextual analysis
Textual analysis
 
Final research audit
Final research auditFinal research audit
Final research audit
 
Presentation1
Presentation1Presentation1
Presentation1
 
Research audit
Research auditResearch audit
Research audit
 
Research audit
Research auditResearch audit
Research audit
 
Pitch for Two Ideas for my product based on my Research
Pitch for Two Ideas for my product based on my ResearchPitch for Two Ideas for my product based on my Research
Pitch for Two Ideas for my product based on my Research
 
Two+ideas+for+product+based+research
Two+ideas+for+product+based+researchTwo+ideas+for+product+based+research
Two+ideas+for+product+based+research
 
Evaluation of unit 2 advert
Evaluation of unit 2 advertEvaluation of unit 2 advert
Evaluation of unit 2 advert
 
Swo ts anddhfbzsdhfb
Swo ts anddhfbzsdhfbSwo ts anddhfbzsdhfb
Swo ts anddhfbzsdhfb
 
Research into existing output
Research into existing outputResearch into existing output
Research into existing output
 
Research audit
Research auditResearch audit
Research audit
 
Malaika technology audits
Malaika technology auditsMalaika technology audits
Malaika technology audits
 
Textual analysis
Textual analysisTextual analysis
Textual analysis
 
Presentation1
Presentation1Presentation1
Presentation1
 
Formato dificultadesapreme
Formato dificultadesapremeFormato dificultadesapreme
Formato dificultadesapreme
 
Java垃圾收集原理
Java垃圾收集原理Java垃圾收集原理
Java垃圾收集原理
 
Ashestoangels del 8
Ashestoangels del 8Ashestoangels del 8
Ashestoangels del 8
 
Slideshow (Bruce & Jami Sangster)
Slideshow (Bruce & Jami Sangster)Slideshow (Bruce & Jami Sangster)
Slideshow (Bruce & Jami Sangster)
 
Documentary ideas finished
Documentary ideas finishedDocumentary ideas finished
Documentary ideas finished
 

Ähnlich wie Two+ideas+for+product+based+research

Building social capital
Building social capitalBuilding social capital
Building social capitalEula M. Guest
 
Social media parent night
Social media parent nightSocial media parent night
Social media parent nightJenny Jongste
 
How to Ruin Your Life with Your Online
How to Ruin Your Life with Your OnlineHow to Ruin Your Life with Your Online
How to Ruin Your Life with Your OnlineMichael Carnell
 
Digital Citizenship (2016)
Digital Citizenship (2016)Digital Citizenship (2016)
Digital Citizenship (2016)Daniel Budd
 
Social media by swikrit bhandari #scichallenge 2017
Social media by swikrit bhandari #scichallenge 2017Social media by swikrit bhandari #scichallenge 2017
Social media by swikrit bhandari #scichallenge 2017swikrit145
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying jun ijan
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.jessy0121
 
Horoscopes, Palm Readings, and Generational Puff Pieces - CASESMC 2015
Horoscopes, Palm Readings, and Generational Puff Pieces - CASESMC 2015Horoscopes, Palm Readings, and Generational Puff Pieces - CASESMC 2015
Horoscopes, Palm Readings, and Generational Puff Pieces - CASESMC 2015Jennifer Doak-Mathewson
 
Character Development, for students, by students!
Character Development, for students, by students!Character Development, for students, by students!
Character Development, for students, by students!mediaplaylab
 
How people should act on the social media
How people should act on the social mediaHow people should act on the social media
How people should act on the social mediastacieisman
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipKaylon McGee
 
433801274-Who-Am-i-in-the-Cyberworld.pptx
433801274-Who-Am-i-in-the-Cyberworld.pptx433801274-Who-Am-i-in-the-Cyberworld.pptx
433801274-Who-Am-i-in-the-Cyberworld.pptxNajmiahShaik
 
I have a secret_ #CBSME Pitching Contest
I have a secret_ #CBSME Pitching ContestI have a secret_ #CBSME Pitching Contest
I have a secret_ #CBSME Pitching ContestMonnel Espiritu
 

Ähnlich wie Two+ideas+for+product+based+research (20)

Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Building social capital
Building social capitalBuilding social capital
Building social capital
 
Social media parent night
Social media parent nightSocial media parent night
Social media parent night
 
How to Ruin Your Life with Your Online
How to Ruin Your Life with Your OnlineHow to Ruin Your Life with Your Online
How to Ruin Your Life with Your Online
 
How to Engage the GEN Y using Social Media ?
How to Engage the GEN Y using Social Media ?How to Engage the GEN Y using Social Media ?
How to Engage the GEN Y using Social Media ?
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Teens & Technology: Understanding the Digital Landscape
Teens & Technology: Understanding the Digital LandscapeTeens & Technology: Understanding the Digital Landscape
Teens & Technology: Understanding the Digital Landscape
 
Digital Citizenship (2016)
Digital Citizenship (2016)Digital Citizenship (2016)
Digital Citizenship (2016)
 
Social media by swikrit bhandari #scichallenge 2017
Social media by swikrit bhandari #scichallenge 2017Social media by swikrit bhandari #scichallenge 2017
Social media by swikrit bhandari #scichallenge 2017
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Horoscopes, Palm Readings, and Generational Puff Pieces - CASESMC 2015
Horoscopes, Palm Readings, and Generational Puff Pieces - CASESMC 2015Horoscopes, Palm Readings, and Generational Puff Pieces - CASESMC 2015
Horoscopes, Palm Readings, and Generational Puff Pieces - CASESMC 2015
 
C2. Cyberbullying
C2. CyberbullyingC2. Cyberbullying
C2. Cyberbullying
 
Character Development, for students, by students!
Character Development, for students, by students!Character Development, for students, by students!
Character Development, for students, by students!
 
How people should act on the social media
How people should act on the social mediaHow people should act on the social media
How people should act on the social media
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
433801274-Who-Am-i-in-the-Cyberworld.pptx
433801274-Who-Am-i-in-the-Cyberworld.pptx433801274-Who-Am-i-in-the-Cyberworld.pptx
433801274-Who-Am-i-in-the-Cyberworld.pptx
 
I have a secret_ #CBSME Pitching Contest
I have a secret_ #CBSME Pitching ContestI have a secret_ #CBSME Pitching Contest
I have a secret_ #CBSME Pitching Contest
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 

Mehr von Malaika21

Swo ts anddhfbzsdhfb
Swo ts anddhfbzsdhfbSwo ts anddhfbzsdhfb
Swo ts anddhfbzsdhfbMalaika21
 
Documentary ideas finished
Documentary ideas finishedDocumentary ideas finished
Documentary ideas finishedMalaika21
 
Malaika final technology audits
Malaika final technology auditsMalaika final technology audits
Malaika final technology auditsMalaika21
 
Independent research
Independent researchIndependent research
Independent researchMalaika21
 
Subsidary labels
Subsidary labelsSubsidary labels
Subsidary labelsMalaika21
 

Mehr von Malaika21 (14)

Idea 2 swot
Idea 2 swotIdea 2 swot
Idea 2 swot
 
Idea 2 swot
Idea 2 swotIdea 2 swot
Idea 2 swot
 
Idea 1 swot
Idea 1 swotIdea 1 swot
Idea 1 swot
 
Idea 3 swot
Idea 3 swotIdea 3 swot
Idea 3 swot
 
Idea 2 swot
Idea 2 swotIdea 2 swot
Idea 2 swot
 
Idea 1 swot
Idea 1 swotIdea 1 swot
Idea 1 swot
 
Development
DevelopmentDevelopment
Development
 
Idea 3 swot
Idea 3 swotIdea 3 swot
Idea 3 swot
 
Swo ts anddhfbzsdhfb
Swo ts anddhfbzsdhfbSwo ts anddhfbzsdhfb
Swo ts anddhfbzsdhfb
 
Documentary ideas finished
Documentary ideas finishedDocumentary ideas finished
Documentary ideas finished
 
Malaika final technology audits
Malaika final technology auditsMalaika final technology audits
Malaika final technology audits
 
Case study
Case study Case study
Case study
 
Independent research
Independent researchIndependent research
Independent research
 
Subsidary labels
Subsidary labelsSubsidary labels
Subsidary labels
 

Kürzlich hochgeladen

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Kürzlich hochgeladen (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Two+ideas+for+product+based+research

  • 2. Narrative of advert A 20 year old man goes into passport control and hands his passport to the woman but the picture is blank she shows it to him, then it flashes back and he didn’t remember to log out of his Facebook and someone has his identity and someone else is living his life. It rewinds and then his conscience reminds him to log out of shared computers.
  • 3. Key Message • The message is that be careful and make sure you remember to log out of all accounts. Eg Facebook, Email, Twitter and Tumblr
  • 4. Locations • In an airport near passport control and in a library Technology • HD Camera • Tripod • Final cut
  • 6. Narrative • A 16 years old female tries to go into college and gets stop by a member of staff. The member of staff doesn’t recognise them, so ask to see their student ID. The photo is blank. She's Confused. We then cut to a shot of someone on a Facebook account. • The teacher challenges the student and ask her questions about her name, age and what lessons she has, the student goes to answer but suddenly cant remember. • Then we cut to a person on the girls Facebook deleting the information. The more the person changes on her Facebook is the less she knows about herself. Consequently The teacher asks her to leave.
  • 7. Key Message • The message is that be careful and make sure you remember to log out of all accounts. Eg Facebook, Email, Twitter and Tumblr
  • 8. Locations • Library where there is shared computers and the school entrance security box. Technology • HD Camera • Tripod • Final cut • Dolly
  • 9. Audience My target audience is young people that use social networking sites and go college or university. My age range is from 17-20, that are both genders and that are of all ethnic groups. They might have part-time jobs while still in full education so they might have an income, some of there hobbies and interest might be listening to music going partying, relaxing with friends, using blackberry messenger or using other social networking site to communicate.
  • 10. How does both ideas appeal to my target audience and which lines of appeals have I used? • My ideas appeals to my target audience because I am going to use actors that are of the same age so that then the audience can relate with the actors and the lines of appeal that I have used for my first idea is solution to problem and fear and for my second idea the lines of appeal that I have used are solution to problem, fear and insecurities.