SlideShare a Scribd company logo
By Julia Boguszewska
CODES AND
CONVENTIONS OF
SLASHER FILMS
THE MONSTER...
Halloween
Child’s Play
Nightmare on Elm
Street
The Texas Chainsaw
Massacre
ScreamI Know What You Did Last
Summer
The monster is the villain within the story. He is
normally killed by the final girl (although this often takes
a few attempts) and often wears a mask. This is due to
the fact that if they do not know who is behind the
mask, each person will imagine their worst nightmare.
Meaning its personal to everyone within the audience.
They also often carry a weapon e.g. knife.
GROUP OF TEENS...
I Know What You
Did Last Summer
The Texas Chainsaw
Massacre
Scream The Nightmare On
Elm Street
Halloween
Within slasher films there is often a group of teens, including a
sexually active girl etc. They usually consist of both, males and females
and are associated or linked with the final girl. The convention is that
they get killed one by one, until only the final girl is left.
Scream
SEXUALLY ACTIVE GIRL...
The Texas Chainsaw MassacreScream
Nightmare on Elm Street Halloween
The sexually active girl is usually the first to be killed by the
monster within slasher films, usually shortly after having a sexual
encounter. The weapon, which is often a knife, is a phallic
symbol. It is widely believed that the knife is supposed to
represent the girl being penetrated.
FINAL GIRL GIRL...
The Texas Chainsaw Massacre
Halloween
Scream
I Know What You Did Last Summer
The final girl is the usually the only person to survive and the one who defeats the
monster. The final girl is often considered as pure, she is normally the most sensible
within the group. Most final girls seem to be brunette, and wear quite modest clothes
in neutral colours. Slasher films are often considered as moral stories seeing as the
virginal girl does not die, yet the sexually active are “punished”.
INEFFECTIVE AUTHORITY
FIGURE...
The Texas Chainsaw Massacre
Halloween
Scream
I Know What You Did Last Summer
The authority figure/s within slasher films is ineffective and is often
one step behind the monster. This makes the audience feel uneasy,
as they are meant to be a symbol of protection and safety, which is
rarely the case in the slasher genre.
LOCATION...
The Texas Chainsaw
Massacre Halloween
Child’s Play The Nightmare On Elm Street
Scream
The location is often a house within the suburbs in order for the audience to feel as if it can happen to
anyone, including them. This makes the audience feel as if they cannot be safe anywhere, even within
the comfort of their own homes. Another common location is an abandoned house or woods. This is
because it means that the place is isolated, meaning no escape or help for the victims, making the
audience feel uneasy.
GERMAN EXPRESSIONISM ...
Child’s Play The Nightmare On Elm Street
Scream
This is a style of film developed in the 1920’s, in Germany. The films are not filmed on locations,
but instead they are put together in studios, in order for the producers to have full control of
the process. This involves things such as creating mise en scene throughout the film, through
the use of backgrounds etc. German expressionism involves dark shadows and rugged abstract-
like shapes, to convey meaning to audiences. These extreme backgrounds are called
psychological landscapes. Hints of German expressionism are evident within the slasher genre,
as most slasher films use woods, and the rigid edges and shadows that the trees create to
illustrate that the characters are trapped. The lifeless trees also represent and convey death.
FILM NOIR...
Child’s Play The Nightmare On Elm Street
Film noir is a cinematic term used primarily to describe stylish crime dramas. Hollywood's
classical film noir period is generally regarded as starting from the early 1940s to the late
1950s. Film noir of this era is associated with a low-key black-and-white visual style that
has roots in German Expressionist cinematography. Film noir often include a femme fatal,
and they represent the men’s fear of independent women at that moment in time. Film
noir is also evident in the slasher genre, as low- key lighting is widely used, especially when
portraying the monster within this genre.

More Related Content

What's hot

Halloween (1978) whole film case study
Halloween (1978) whole film case studyHalloween (1978) whole film case study
Halloween (1978) whole film case study
uzzthekid
 
pitch
pitchpitch
pitch
chez3000
 
Genre Analysis Final
Genre Analysis FinalGenre Analysis Final
Genre Analysis Final
ReeceBaynham
 
Q1 in what ways does your media
Q1   in what ways does your mediaQ1   in what ways does your media
Q1 in what ways does your media
rammj
 
Q1 Evaluation
Q1 EvaluationQ1 Evaluation
Q1 Evaluation
rammj
 
Evaluation q1
Evaluation q1Evaluation q1
Evaluation q1
DanielHancock
 
Slasher Codes and Conventions
Slasher Codes and Conventions Slasher Codes and Conventions
Slasher Codes and Conventions
PriyankaC17
 
Analysis Of Opening Techniques Scream
Analysis Of Opening Techniques ScreamAnalysis Of Opening Techniques Scream
Analysis Of Opening Techniques Scream
tahir369
 
Case Studies
Case StudiesCase Studies
Case Studies
meggarrattmedia
 
A Powepoint Presentation On Film Noir
A Powepoint Presentation On Film Noir A Powepoint Presentation On Film Noir
A Powepoint Presentation On Film Noir
Nic JM
 
Slasher films
Slasher filmsSlasher films
Slasher films
lavers1234
 
'Halloween' Film Analysis
'Halloween' Film Analysis'Halloween' Film Analysis
'Halloween' Film Analysis
ca11umh
 
Pitch
PitchPitch
Pitch
EduDuck
 
The Third Man
The Third ManThe Third Man
The Third Man
harrymediaproject
 
CANDYMAN FILM REVIEW BY ELISA DUBIGNON
CANDYMAN FILM REVIEW BY ELISA DUBIGNON CANDYMAN FILM REVIEW BY ELISA DUBIGNON
CANDYMAN FILM REVIEW BY ELISA DUBIGNON
Elisa Dubignon
 
Halloween and Psycho analysis
Halloween and Psycho analysisHalloween and Psycho analysis
Halloween and Psycho analysis
Blackpool Sixth Form
 
The third man
The third manThe third man
The third man
laurenstandley
 
Sin city noir 333
Sin city noir 333Sin city noir 333
Sin city noir 333
christimothy12
 

What's hot (18)

Halloween (1978) whole film case study
Halloween (1978) whole film case studyHalloween (1978) whole film case study
Halloween (1978) whole film case study
 
pitch
pitchpitch
pitch
 
Genre Analysis Final
Genre Analysis FinalGenre Analysis Final
Genre Analysis Final
 
Q1 in what ways does your media
Q1   in what ways does your mediaQ1   in what ways does your media
Q1 in what ways does your media
 
Q1 Evaluation
Q1 EvaluationQ1 Evaluation
Q1 Evaluation
 
Evaluation q1
Evaluation q1Evaluation q1
Evaluation q1
 
Slasher Codes and Conventions
Slasher Codes and Conventions Slasher Codes and Conventions
Slasher Codes and Conventions
 
Analysis Of Opening Techniques Scream
Analysis Of Opening Techniques ScreamAnalysis Of Opening Techniques Scream
Analysis Of Opening Techniques Scream
 
Case Studies
Case StudiesCase Studies
Case Studies
 
A Powepoint Presentation On Film Noir
A Powepoint Presentation On Film Noir A Powepoint Presentation On Film Noir
A Powepoint Presentation On Film Noir
 
Slasher films
Slasher filmsSlasher films
Slasher films
 
'Halloween' Film Analysis
'Halloween' Film Analysis'Halloween' Film Analysis
'Halloween' Film Analysis
 
Pitch
PitchPitch
Pitch
 
The Third Man
The Third ManThe Third Man
The Third Man
 
CANDYMAN FILM REVIEW BY ELISA DUBIGNON
CANDYMAN FILM REVIEW BY ELISA DUBIGNON CANDYMAN FILM REVIEW BY ELISA DUBIGNON
CANDYMAN FILM REVIEW BY ELISA DUBIGNON
 
Halloween and Psycho analysis
Halloween and Psycho analysisHalloween and Psycho analysis
Halloween and Psycho analysis
 
The third man
The third manThe third man
The third man
 
Sin city noir 333
Sin city noir 333Sin city noir 333
Sin city noir 333
 

Similar to Slasher Genre Conventions

Genre research.
Genre research.Genre research.
Genre research.
Jaaaaaaay_
 
Genre research.
Genre research.Genre research.
Genre research.
Jaaaaaaay_
 
Research - Historic slasher codes and conventions
Research - Historic slasher codes and conventionsResearch - Historic slasher codes and conventions
Research - Historic slasher codes and conventions
Nuradin Abadayah
 
Conventions of Chosen Sub-Genre
Conventions of Chosen Sub-GenreConventions of Chosen Sub-Genre
Conventions of Chosen Sub-Genre
laurenwalsh110600
 
Sub genres of horror
Sub genres of horrorSub genres of horror
Sub genres of horror
charmitch21
 
Slasher Codes & Conventions
Slasher Codes & ConventionsSlasher Codes & Conventions
Slasher Codes & Conventions
blackscreenproductions
 
Sub genres betsi final 2
Sub genres betsi final 2Sub genres betsi final 2
Sub genres betsi final 2
betsizzle
 
Sub genres betsi final 35756385
Sub genres betsi final 35756385Sub genres betsi final 35756385
Sub genres betsi final 35756385
betsizzle
 
Sub genres of horror
Sub genres of horrorSub genres of horror
Sub genres of horror
charmitch21
 
The Horror Genre - Media Studies
The Horror Genre - Media StudiesThe Horror Genre - Media Studies
The Horror Genre - Media Studies
Rachel Wood
 
Sub genres betsi final
Sub genres betsi finalSub genres betsi final
Sub genres betsi final
betsimegan
 
Trailer Overview
Trailer OverviewTrailer Overview
Trailer Overview
salinadaniel
 
Horror sub genres
Horror sub genresHorror sub genres
Horror sub genres
Nattayaday11
 
Sub genres of horror
Sub genres of horrorSub genres of horror
Sub genres of horror
char95
 
Story board
Story boardStory board
Story board
lennylavers1234
 
Slasher Films Codes and Conventions
Slasher Films Codes and ConventionsSlasher Films Codes and Conventions
Slasher Films Codes and Conventions
mrcaptainpanda
 
Recurring patterns
Recurring patterns Recurring patterns
Recurring patterns
raquelus
 
Horror genre chart
Horror genre chartHorror genre chart
Horror genre chart
aidanbaker96
 
Final girl
Final girlFinal girl
Final girl
karott
 
Conventions of slashers
Conventions of slashersConventions of slashers
Conventions of slashers
steviemccann
 

Similar to Slasher Genre Conventions (20)

Genre research.
Genre research.Genre research.
Genre research.
 
Genre research.
Genre research.Genre research.
Genre research.
 
Research - Historic slasher codes and conventions
Research - Historic slasher codes and conventionsResearch - Historic slasher codes and conventions
Research - Historic slasher codes and conventions
 
Conventions of Chosen Sub-Genre
Conventions of Chosen Sub-GenreConventions of Chosen Sub-Genre
Conventions of Chosen Sub-Genre
 
Sub genres of horror
Sub genres of horrorSub genres of horror
Sub genres of horror
 
Slasher Codes & Conventions
Slasher Codes & ConventionsSlasher Codes & Conventions
Slasher Codes & Conventions
 
Sub genres betsi final 2
Sub genres betsi final 2Sub genres betsi final 2
Sub genres betsi final 2
 
Sub genres betsi final 35756385
Sub genres betsi final 35756385Sub genres betsi final 35756385
Sub genres betsi final 35756385
 
Sub genres of horror
Sub genres of horrorSub genres of horror
Sub genres of horror
 
The Horror Genre - Media Studies
The Horror Genre - Media StudiesThe Horror Genre - Media Studies
The Horror Genre - Media Studies
 
Sub genres betsi final
Sub genres betsi finalSub genres betsi final
Sub genres betsi final
 
Trailer Overview
Trailer OverviewTrailer Overview
Trailer Overview
 
Horror sub genres
Horror sub genresHorror sub genres
Horror sub genres
 
Sub genres of horror
Sub genres of horrorSub genres of horror
Sub genres of horror
 
Story board
Story boardStory board
Story board
 
Slasher Films Codes and Conventions
Slasher Films Codes and ConventionsSlasher Films Codes and Conventions
Slasher Films Codes and Conventions
 
Recurring patterns
Recurring patterns Recurring patterns
Recurring patterns
 
Horror genre chart
Horror genre chartHorror genre chart
Horror genre chart
 
Final girl
Final girlFinal girl
Final girl
 
Conventions of slashers
Conventions of slashersConventions of slashers
Conventions of slashers
 

Recently uploaded

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 

Recently uploaded (20)

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 

Slasher Genre Conventions

  • 1. By Julia Boguszewska CODES AND CONVENTIONS OF SLASHER FILMS
  • 2. THE MONSTER... Halloween Child’s Play Nightmare on Elm Street The Texas Chainsaw Massacre ScreamI Know What You Did Last Summer The monster is the villain within the story. He is normally killed by the final girl (although this often takes a few attempts) and often wears a mask. This is due to the fact that if they do not know who is behind the mask, each person will imagine their worst nightmare. Meaning its personal to everyone within the audience. They also often carry a weapon e.g. knife.
  • 3. GROUP OF TEENS... I Know What You Did Last Summer The Texas Chainsaw Massacre Scream The Nightmare On Elm Street Halloween Within slasher films there is often a group of teens, including a sexually active girl etc. They usually consist of both, males and females and are associated or linked with the final girl. The convention is that they get killed one by one, until only the final girl is left. Scream
  • 4. SEXUALLY ACTIVE GIRL... The Texas Chainsaw MassacreScream Nightmare on Elm Street Halloween The sexually active girl is usually the first to be killed by the monster within slasher films, usually shortly after having a sexual encounter. The weapon, which is often a knife, is a phallic symbol. It is widely believed that the knife is supposed to represent the girl being penetrated.
  • 5. FINAL GIRL GIRL... The Texas Chainsaw Massacre Halloween Scream I Know What You Did Last Summer The final girl is the usually the only person to survive and the one who defeats the monster. The final girl is often considered as pure, she is normally the most sensible within the group. Most final girls seem to be brunette, and wear quite modest clothes in neutral colours. Slasher films are often considered as moral stories seeing as the virginal girl does not die, yet the sexually active are “punished”.
  • 6. INEFFECTIVE AUTHORITY FIGURE... The Texas Chainsaw Massacre Halloween Scream I Know What You Did Last Summer The authority figure/s within slasher films is ineffective and is often one step behind the monster. This makes the audience feel uneasy, as they are meant to be a symbol of protection and safety, which is rarely the case in the slasher genre.
  • 7. LOCATION... The Texas Chainsaw Massacre Halloween Child’s Play The Nightmare On Elm Street Scream The location is often a house within the suburbs in order for the audience to feel as if it can happen to anyone, including them. This makes the audience feel as if they cannot be safe anywhere, even within the comfort of their own homes. Another common location is an abandoned house or woods. This is because it means that the place is isolated, meaning no escape or help for the victims, making the audience feel uneasy.
  • 8. GERMAN EXPRESSIONISM ... Child’s Play The Nightmare On Elm Street Scream This is a style of film developed in the 1920’s, in Germany. The films are not filmed on locations, but instead they are put together in studios, in order for the producers to have full control of the process. This involves things such as creating mise en scene throughout the film, through the use of backgrounds etc. German expressionism involves dark shadows and rugged abstract- like shapes, to convey meaning to audiences. These extreme backgrounds are called psychological landscapes. Hints of German expressionism are evident within the slasher genre, as most slasher films use woods, and the rigid edges and shadows that the trees create to illustrate that the characters are trapped. The lifeless trees also represent and convey death.
  • 9. FILM NOIR... Child’s Play The Nightmare On Elm Street Film noir is a cinematic term used primarily to describe stylish crime dramas. Hollywood's classical film noir period is generally regarded as starting from the early 1940s to the late 1950s. Film noir of this era is associated with a low-key black-and-white visual style that has roots in German Expressionist cinematography. Film noir often include a femme fatal, and they represent the men’s fear of independent women at that moment in time. Film noir is also evident in the slasher genre, as low- key lighting is widely used, especially when portraying the monster within this genre.