SlideShare a Scribd company logo
Audience Theories
     By Thomas Hall
Hypodermic needle/ Magic
         bullet theory
. The hypodermic needle theory is basically the theory
that the media “Injects” the information and message
directly into the heads of the intended audience, who
absorb the message in it’s entirety. The use of the words
“hypodermic needle” makes the the person think of a
direct injection of the information, which is what the theory
is all about.
Uses and gratifications theory
. The uses and gratifications theory is about how people
search for certain media types that will appeal to or
please the need for more knowledge, social interaction or
diversion/ escapism. These are the more common
reasons in which people use the media for in this theory.
Reception theory
. The reception theory is basically the idea that the
producers/directors/ editors “encode” a film, which
includes certain codes and conventions which the
audience then “decodes” and dissects this film, however
the eventual decoding of the film may end up with a new
look/ view on the film which was not intended by the
directors etc. The decoding sequence can often be
altered dramatically by the age, class, gender and
ethnicity.
Two-step flow theory
. The two-step flow theory Is based on the idea that
information and messages from the media do not “flow”
directly to the audience, the first pass through people
called “Opinion leaders” who first the media goes through,
which is then “programmed” with messages and opinions
which then flows to the target audience.

More Related Content

Similar to Audience theories

Audience reception theories
Audience reception theoriesAudience reception theories
Audience reception theories
sofiamazmanidou
 
Audience Theories
Audience TheoriesAudience Theories
Audience Theories
Maleeha17
 
Audience
AudienceAudience
Audience
CoombeMedia1
 
Audince theory
Audince theoryAudince theory
Audince theory
dankyjosh
 
Audincetheory 170328131453
Audincetheory 170328131453Audincetheory 170328131453
Audincetheory 170328131453
dankyjosh
 
Audience Theory
Audience TheoryAudience Theory
Audience Theory
Mizz_Sarahx
 
Audience Investigation
Audience InvestigationAudience Investigation
Audience Investigation
LillieLague
 
1.3 g324 advanced portfolio
1.3 g324 advanced portfolio1.3 g324 advanced portfolio
1.3 g324 advanced portfolio
Charlotte Cowles
 
Looking back at our theoretical research
Looking back at our theoretical researchLooking back at our theoretical research
Looking back at our theoretical research
wlaufs
 
Audience theory mr daley
Audience theory mr daleyAudience theory mr daley
Audience theory mr daley
Alisha_Dobinson
 
Audience theories
Audience theoriesAudience theories
Audience theories
Jade Jackson
 
Audience theories
Audience theoriesAudience theories
Audience theories
toscar136
 
Audience theories
Audience theoriesAudience theories
Audience theories
oscar thomas
 
Audience investigation
Audience investigationAudience investigation
Audience investigation
laurencowey
 
Audience theory
Audience theoryAudience theory
Audience theory
Kayyah_Robun
 
Audience theory
Audience theoryAudience theory
Audience theory
CaponEmily
 
7 narrative TA - Bernd Schmid (Oxford lectures)
7 narrative TA - Bernd Schmid (Oxford lectures)7 narrative TA - Bernd Schmid (Oxford lectures)
7 narrative TA - Bernd Schmid (Oxford lectures)
isb GmbH Systemische Professionalität
 
Section A: Passive Audience Theory
Section A: Passive Audience TheorySection A: Passive Audience Theory
Section A: Passive Audience Theory
MissCTurner
 
Preliminary Tasks Planning - Mrs. Turner
Preliminary Tasks Planning - Mrs. TurnerPreliminary Tasks Planning - Mrs. Turner
Preliminary Tasks Planning - Mrs. Turner
rhsmediastudies
 
Audience
AudienceAudience
Audience
robynmd_
 

Similar to Audience theories (20)

Audience reception theories
Audience reception theoriesAudience reception theories
Audience reception theories
 
Audience Theories
Audience TheoriesAudience Theories
Audience Theories
 
Audience
AudienceAudience
Audience
 
Audince theory
Audince theoryAudince theory
Audince theory
 
Audincetheory 170328131453
Audincetheory 170328131453Audincetheory 170328131453
Audincetheory 170328131453
 
Audience Theory
Audience TheoryAudience Theory
Audience Theory
 
Audience Investigation
Audience InvestigationAudience Investigation
Audience Investigation
 
1.3 g324 advanced portfolio
1.3 g324 advanced portfolio1.3 g324 advanced portfolio
1.3 g324 advanced portfolio
 
Looking back at our theoretical research
Looking back at our theoretical researchLooking back at our theoretical research
Looking back at our theoretical research
 
Audience theory mr daley
Audience theory mr daleyAudience theory mr daley
Audience theory mr daley
 
Audience theories
Audience theoriesAudience theories
Audience theories
 
Audience theories
Audience theoriesAudience theories
Audience theories
 
Audience theories
Audience theoriesAudience theories
Audience theories
 
Audience investigation
Audience investigationAudience investigation
Audience investigation
 
Audience theory
Audience theoryAudience theory
Audience theory
 
Audience theory
Audience theoryAudience theory
Audience theory
 
7 narrative TA - Bernd Schmid (Oxford lectures)
7 narrative TA - Bernd Schmid (Oxford lectures)7 narrative TA - Bernd Schmid (Oxford lectures)
7 narrative TA - Bernd Schmid (Oxford lectures)
 
Section A: Passive Audience Theory
Section A: Passive Audience TheorySection A: Passive Audience Theory
Section A: Passive Audience Theory
 
Preliminary Tasks Planning - Mrs. Turner
Preliminary Tasks Planning - Mrs. TurnerPreliminary Tasks Planning - Mrs. Turner
Preliminary Tasks Planning - Mrs. Turner
 
Audience
AudienceAudience
Audience
 

More from Thomas Hall

Eval q3
Eval q3Eval q3
Eval q3
Thomas Hall
 
Media Evaluation Question 1
Media Evaluation Question 1Media Evaluation Question 1
Media Evaluation Question 1
Thomas Hall
 
Media audience theories
Media audience theoriesMedia audience theories
Media audience theories
Thomas Hall
 
Consumption habits of music videos
Consumption habits of music videosConsumption habits of music videos
Consumption habits of music videos
Thomas Hall
 
Typical conventions of the alternative music video
Typical conventions of the alternative music videoTypical conventions of the alternative music video
Typical conventions of the alternative music video
Thomas Hall
 
Stylistic influences
Stylistic influencesStylistic influences
Stylistic influences
Thomas Hall
 
Questionnaire
QuestionnaireQuestionnaire
Questionnaire
Thomas Hall
 

More from Thomas Hall (7)

Eval q3
Eval q3Eval q3
Eval q3
 
Media Evaluation Question 1
Media Evaluation Question 1Media Evaluation Question 1
Media Evaluation Question 1
 
Media audience theories
Media audience theoriesMedia audience theories
Media audience theories
 
Consumption habits of music videos
Consumption habits of music videosConsumption habits of music videos
Consumption habits of music videos
 
Typical conventions of the alternative music video
Typical conventions of the alternative music videoTypical conventions of the alternative music video
Typical conventions of the alternative music video
 
Stylistic influences
Stylistic influencesStylistic influences
Stylistic influences
 
Questionnaire
QuestionnaireQuestionnaire
Questionnaire
 

Recently uploaded

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 

Recently uploaded (20)

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 

Audience theories

  • 1. Audience Theories By Thomas Hall
  • 2. Hypodermic needle/ Magic bullet theory . The hypodermic needle theory is basically the theory that the media “Injects” the information and message directly into the heads of the intended audience, who absorb the message in it’s entirety. The use of the words “hypodermic needle” makes the the person think of a direct injection of the information, which is what the theory is all about.
  • 3. Uses and gratifications theory . The uses and gratifications theory is about how people search for certain media types that will appeal to or please the need for more knowledge, social interaction or diversion/ escapism. These are the more common reasons in which people use the media for in this theory.
  • 4. Reception theory . The reception theory is basically the idea that the producers/directors/ editors “encode” a film, which includes certain codes and conventions which the audience then “decodes” and dissects this film, however the eventual decoding of the film may end up with a new look/ view on the film which was not intended by the directors etc. The decoding sequence can often be altered dramatically by the age, class, gender and ethnicity.
  • 5. Two-step flow theory . The two-step flow theory Is based on the idea that information and messages from the media do not “flow” directly to the audience, the first pass through people called “Opinion leaders” who first the media goes through, which is then “programmed” with messages and opinions which then flows to the target audience.