SlideShare a Scribd company logo
1 of 5
The main attraction to our audience is the tension that we are able
 to build within the opening sequence. This convention is a vital
part in appealing to a thriller audience as it draws in the audience
                and keeps them guessing at all times.
This is used in many thriller’s opening sequences, where not much
information is given away e.g Lost Highway (David Lynch, 1997)
                  and Se7en (David Fincher, 1995) -
http://www.youtube.com/watch?feature=player_embedded&v=
                           SEZK7mJoPLY
We were able to attract our audience in this way by concealing the
                         characters identity.
Also to enable us to attract our target audience we had to take into account
    and follow these conventions;
   Fast-paced
   The unknown/ narrative enigma
   Plot twists
   Investigation
   Protagonist accustomed to violence and often dis-empowered
   Complex narrative that still abides by Todorov.
   Violent crime
   Everyday setting where something extraordinary happens
   Themes of mirroring, identity, voyeurism.


With these in mind we carried out audience research to ensure that we
included representations, themes etc that would appeal to them. In order to
find this out we carried out a questionnaire. Within which we included
questions that would help us establish both a location and character that
would appeal to our target audience and portray conventions.
   Our thriller addresses the audience by creating
    narrative enigma and building tension through
    the use of mise en scene, costume and
    props, camera, editing, and sound.
   The way in which we conveyed the key convention
    of a violent crime is by making the characters
    movements ghostly and in addition to this
    changing the camera settings to give an eerie feel.
    Another way in which this is established is
    through the use of red for the characters costume
    which has the connotations of danger, this creates
    narrative enigma and draws in the viewer. Doing
    this has the implications to the viewer that the
    character is dead due to a violent crime.

More Related Content

What's hot

Evaluation questions 4 and 5
Evaluation questions 4 and 5Evaluation questions 4 and 5
Evaluation questions 4 and 5
thedavev28
 
Audience attraction
Audience attractionAudience attraction
Audience attraction
REDHEAD501
 
Jemma, sammy, luke, stephen presentation
Jemma, sammy, luke, stephen presentationJemma, sammy, luke, stephen presentation
Jemma, sammy, luke, stephen presentation
reigatemedia
 
In what ways does your media product use, develop or challenge forms and cove...
In what ways does your media product use, develop or challenge forms and cove...In what ways does your media product use, develop or challenge forms and cove...
In what ways does your media product use, develop or challenge forms and cove...
Megan Godfrey
 
Evaluation q5
Evaluation q5Evaluation q5
Evaluation q5
Opal
 

What's hot (20)

Opening sequence analysis- The Sixth Sense
Opening sequence analysis- The Sixth SenseOpening sequence analysis- The Sixth Sense
Opening sequence analysis- The Sixth Sense
 
Evaluation questions 4 and 5
Evaluation questions 4 and 5Evaluation questions 4 and 5
Evaluation questions 4 and 5
 
Q1(b) Audience
Q1(b)  AudienceQ1(b)  Audience
Q1(b) Audience
 
Evaluation question 3 - John Glen
Evaluation   question 3 - John GlenEvaluation   question 3 - John Glen
Evaluation question 3 - John Glen
 
Friday the 13th - Full Film analysis
Friday the 13th - Full Film analysis Friday the 13th - Full Film analysis
Friday the 13th - Full Film analysis
 
Audience attraction
Audience attractionAudience attraction
Audience attraction
 
Jemma, sammy, luke, stephen presentation
Jemma, sammy, luke, stephen presentationJemma, sammy, luke, stephen presentation
Jemma, sammy, luke, stephen presentation
 
In what ways does your media product use, develop or challenge forms and cove...
In what ways does your media product use, develop or challenge forms and cove...In what ways does your media product use, develop or challenge forms and cove...
In what ways does your media product use, develop or challenge forms and cove...
 
Evaluation Question 1
Evaluation Question 1Evaluation Question 1
Evaluation Question 1
 
Evaluation Task 5
Evaluation Task 5Evaluation Task 5
Evaluation Task 5
 
Q1&2
Q1&2Q1&2
Q1&2
 
Question One of Evaluation
Question One of EvaluationQuestion One of Evaluation
Question One of Evaluation
 
Research on two media theorists
Research on two media theoristsResearch on two media theorists
Research on two media theorists
 
Camera angles
Camera anglesCamera angles
Camera angles
 
Camera angles
Camera anglesCamera angles
Camera angles
 
Pitch presentation final
Pitch presentation finalPitch presentation final
Pitch presentation final
 
Camera angles
Camera anglesCamera angles
Camera angles
 
Evaluation q5
Evaluation q5Evaluation q5
Evaluation q5
 
Research of opening sequences
Research of opening sequencesResearch of opening sequences
Research of opening sequences
 
Evaluation task one
Evaluation task oneEvaluation task one
Evaluation task one
 

Similar to Question 5 (20)

Evaluation 1
Evaluation 1Evaluation 1
Evaluation 1
 
Evaluation 1
Evaluation 1Evaluation 1
Evaluation 1
 
Final Evaluation
Final EvaluationFinal Evaluation
Final Evaluation
 
Final evaluation
Final evaluationFinal evaluation
Final evaluation
 
Evaluation Question 1
Evaluation Question 1Evaluation Question 1
Evaluation Question 1
 
MEDIA EVALUATION Question 1
MEDIA EVALUATION Question 1MEDIA EVALUATION Question 1
MEDIA EVALUATION Question 1
 
Critical reflection 2
Critical reflection 2Critical reflection 2
Critical reflection 2
 
Question five
Question five Question five
Question five
 
How did you attract
How did you attractHow did you attract
How did you attract
 
AS Media Evaluation
AS Media EvaluationAS Media Evaluation
AS Media Evaluation
 
Evaluation - Lauren
Evaluation - LaurenEvaluation - Lauren
Evaluation - Lauren
 
Evaluation
EvaluationEvaluation
Evaluation
 
AS MEDIA - EVALUATION
AS MEDIA - EVALUATION AS MEDIA - EVALUATION
AS MEDIA - EVALUATION
 
question 1
question 1question 1
question 1
 
Evalution
EvalutionEvalution
Evalution
 
Question 4 and 5 updated
Question 4 and 5 updatedQuestion 4 and 5 updated
Question 4 and 5 updated
 
Evaluation
EvaluationEvaluation
Evaluation
 
Evaluation
EvaluationEvaluation
Evaluation
 
Evaluation
EvaluationEvaluation
Evaluation
 
Media Evaluation
Media EvaluationMedia Evaluation
Media Evaluation
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Recently uploaded (20)

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 

Question 5

  • 1.
  • 2. The main attraction to our audience is the tension that we are able to build within the opening sequence. This convention is a vital part in appealing to a thriller audience as it draws in the audience and keeps them guessing at all times. This is used in many thriller’s opening sequences, where not much information is given away e.g Lost Highway (David Lynch, 1997) and Se7en (David Fincher, 1995) - http://www.youtube.com/watch?feature=player_embedded&v= SEZK7mJoPLY We were able to attract our audience in this way by concealing the characters identity.
  • 3. Also to enable us to attract our target audience we had to take into account and follow these conventions;  Fast-paced  The unknown/ narrative enigma  Plot twists  Investigation  Protagonist accustomed to violence and often dis-empowered  Complex narrative that still abides by Todorov.  Violent crime  Everyday setting where something extraordinary happens  Themes of mirroring, identity, voyeurism. With these in mind we carried out audience research to ensure that we included representations, themes etc that would appeal to them. In order to find this out we carried out a questionnaire. Within which we included questions that would help us establish both a location and character that would appeal to our target audience and portray conventions.
  • 4.
  • 5. Our thriller addresses the audience by creating narrative enigma and building tension through the use of mise en scene, costume and props, camera, editing, and sound.  The way in which we conveyed the key convention of a violent crime is by making the characters movements ghostly and in addition to this changing the camera settings to give an eerie feel. Another way in which this is established is through the use of red for the characters costume which has the connotations of danger, this creates narrative enigma and draws in the viewer. Doing this has the implications to the viewer that the character is dead due to a violent crime.