Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Virtual Plug Script NEW
1. Virtual Plug Script
0.00-0.45 Reconstruction
VISUAL AUDIO
MCU of Presenter talking to the camera
RESHOOT – FRIDAY 22/01
JARRETT MILLEN (SYNC)/MUSIC IN - TBD
“Two factor authentication is used to make your
computer more safe and secure.
There are three types of authentication. First, by
something you know e.g. password. Second,
something you possess e.g. ID cards and third,
something you are e.g. biometric. For your
security you should have two of these, which is
essentially what two factor authentication is.
This has also been called as two – step
verification or two factor security. For example if
you want to get money out of a cash machine
you firstly need to present something you own
(your bank card) and then you need something
you know the four digit password.
Websites more often than not only require to
have one of these means of authentication
usually passwords and usernames which is a
problem because some people use weak
passwords, making them an easier target for
hackers to access their account.”
(Presenter 7/Presenter Voice 1.MOV)
JARRETT MILLEN (OOV)
“Now many websites such as Facebook and
Google encourage you to have two factor
authentication by having a phone based
solution, meaning that along with having to enter
your username and password as usual you now
have a text delivered to your phone which
presents to you an authorization code, which
means that hackers now have to have your
phone and your password to get into your
account, meaning that now you have two factor
authentication.”
(Presenter Voice 2.MOV)
CU of Facebook Security Panel (Reconstruction
4.MOV)
CU of Facebook Security Settings
(Reconstruction 3.MOV)
CU of Facebook Login Approval (Reconstruction
4.MOV)
MCU of Phone on bed (Reconstruction 6.MOV) /
MCU of Phone in hand (Reconstruction 7.MOV)
CU of typing (Reconstruction 10/11.MOV)
MCU of Security Code typing (Reconstruction
8.MOV)
ECU of Password entry (Reconstruction 9.MOV)
2. 0.45-1.45 Royal Holloway Interview
VISUAL AUDIO
CU of Royal Holloway sign (Royal Holloway
15.MOV)
MUSIC IN - TBD
MLS of Jarrett entering Royal Holloway gates
(Royal Holloway 5.MOV)
Tilt of Jarrett walking towards Royal Holloway
building (Royal Holloway 8.MOV)
LS of Royal Holloway in the distance (Royal
Holloway 3.MOV)
PROFESSOR KEITH MARTIN (OOV)
“I’m Professor Keith Martin and I’m a Professor
of Information Security at Royal Holloway,
University of London.”
MCU of Professor Keith talking, CU cut-away of
Professor Keith’s hands, various cutaways of
Server Room TBD
PROFESSOR KEITH MARTIN (SYNC/OOV)
“Anything you say or any information you put
into these could at some point in the future get
out out there and be discovered so you have to
be very very cautious about what information
you are putting on there about yourself.
All organizations are prone to problems at the
moment and all individuals as well so as
individuals we have to be very careful. I think if
you ask your friends or speak to colleagues you
will discover someone very quickly who has had
some difficulties of this type so I think it is very
prevalent.
I don’t think you can ever get on top of that
game at all because I think crime will always be
around in any society. We are human beings
and cyberspace is just a new place where
people can conduct crimes…
Wherever there are human beings there will
always be crime and unfortunately that’s the
world we live in. We make it, we are it.”
1.45-2.00 Timelapse
VISUAL AUDIO
Timelapse of the street (Timelapse.MOV) MUSIC IN – TBD
NARRATION - TBD
2.00-2.10 Titles
VISUAL AUDIO
Titles (“Virtual Plug” written in Terminal, with a
slight zoom in) – to be filmed
Typing – audio taken from Reconstruction
10/11.MOV?
3. 2.10-3.30 Hannah Smith Case Study
VISUAL AUDIO
RESHOOT – MONDAY 25/01 JARRETT MILLEN (SYNC)/MUSIC IN (TBD)
“Cyber-crime may involve passwords, firewalls
and IP addresses, but the consequences are felt
far outside the virtual world: real people are
affected just the same. Hacking can lead to the
same anxiety as mugging, while cases such as
Hannah Smith’s are just as devastating.
Hannah Smith was 14 years old when she
died, the verdict: suicide. The coroner described
her as ‘intelligent, bright, clever and bubbly’, but
her family believe she was bullied at school.
Things then became far more dire for the young
girl as bullies targeted her on social networking
site ask,fm, which was largely blamed for driving
her to commit suicide.
Ask.fm allows completely anonymous
messages to be sent in the form of questions;
this enables bullies to torment their victims with
little risk of consequences, meaning that they
are far more likely to do so. In fact, Hannah’s
school had alerted parents to the risks
associated with the website, but Hannah
ignored such warnings. She kept her usage of
the website hidden from her parents while her
sister, Jo, stopped using the website just
months before Hannah’s death.
Despite later reports that the majority of the
messages were sent by Hannah herself, it is still
believed that usage of ask.fm played a role in
her untimely death; her father has called for
legal changes to ensure that vulnerable youths
are protected, and that Hannah’s death was not
in vain.”
4. 3.30-4.45 Miss Wright CEOP Interview
VISUAL AUDIO
MCU of Tina Wright interview, Pan cutaway of
Cullum Centre (MVI_8004.MOV) – possible
cutaways of playground footage if not used –
MCU of raindrops in puddle (Playground
11.MOV)
MCU of swing swinging (Playground 6.MOV)
MISS TINA WRIGHT(SYNC/OOV)
“I’m Tina Wright and I’m a CEOP ambassador.
CEOP is child exploitation and online protection.
What it actually does is try to keep young people
safe on the internet and give parents’ guidance.
I thinks it’s like anything else to be honest, if
it’s used wisely; parents need to take
responsibility for what children and young
people are doing.
The more we talk about it, I think the better
prepared young people are to know the
dangers.
I don’t think that bullying online is any different
to being bullied on the yard, on the playground
or in the workplace.
It all needs to be reported because [while
there’s] lots of reporting buttons on websites, I
wonder how many people feel confident to use
them.”