“Reverse Psychology” (Short Film) | Behind the Scenes Video
This is the behind the scenes of the short film “Reverse Psychology”! The entire production was documented live on social media, but this here is never-before-seen footage and contain SPOILERS. So you can only watch it after you’ve seen the actual film.
A mentally ill patient violently resists getting any help from his therapist.
THE GEAR WE USED ↓
Black Magic Camera: https://www.amazon.com/gp/product/B00CWLSHYG/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B00CWLSHYG&linkCode=as2&tag=marinabruno-20&linkId=7652a4802b6a962794f8c36612beb901
Shotgun Mic: https://www.amazon.com/gp/product/B00A2X9BVE/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B00A2X9BVE&linkCode=as2&tag=marinabruno-20&linkId=77ee55462e93290c0d7ca683e569309c
Wide Lens: https://www.amazon.com/gp/product/B004NNUN02/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B004NNUN02&linkCode=as2&tag=marinabruno-20&linkId=ba20ca503c8cc6da09e89425f6409b94
Long Lens: https://www.amazon.com/gp/product/B0033PRWSW/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B0033PRWSW&linkCode=as2&tag=marinabruno-20&linkId=f0a81e60be1cbfd672eedf8d8232bf84
Psychology behind Social Media
Presentation about Psychology behind Social Media– Created using PowToon — Free sign up at http://www.powtoon.com/ . Make your own animated videos and animated presentations for free. PowToon is a free tool that allows you to develop cool animated clips and animated presentations for your website, office meeting, sales pitch, nonprofit fundraiser, product launch, video resume, or anything else you could use an animated explainer video. PowToon’s animation templates help you create animated presentations and animated explainer videos from scratch. Anyone can produce awesome animations quickly with PowToon, without the cost or hassle other professional animation services require.
Social Media – Ex Facebook Pres. Says Network Created To MANIPULATE Human Psychology
From 11-16-17. Sean Parker the former head president of the social networking site Facebook says what we should all know anyway, it was designed to MANIPULATE human psychology and to be “addictive” for certain personality types.
Psya4 Media Psychology June 2015 Predictions
Psya4 Media Psychology June 2015 Predictions For Unit 4.
More resources for AQA Psychology available here: http://www.loopa.co.uk (new spec for 2015 onwards included too!)
The True Cost of Instagram Fame
Instafame is a film produced by Sylvain Labs and Greencard Pictures, exploring the phenomenon of teenagers becoming famous through Instagram.
With so many young people equating followers for friends, what is the social and psychological impact of overnight fame?
We speak to Shawn Megira, 15-year-old with 81,000 followers – as well as his mother – about being spotted at the mall and being told he’s perfect. A professors of psychology also gives her views on the phenomenon of Instafame.
There are hundreds of different ways hackers can steal your personal information from Social Media accounts and local network drives. For most people, this happens without them even knowing. By the time someone recognizes that there may be a security breach it is often times too late and the damage is done. The damage can vary from simple hacks for entertainment, or harm producing wiki leaks that make unsuspecting victims vulnerable to exposure. But what happens when your online social identity is compromised directly from the computer drive you work from? Many of us use an office computer at work, when those get upgraded what happens to the old hard drives? Typically, hard drives can be shredded or recycled. In the event that the computers you work on were not properly disposed of there is a chance that someone with extensive knowledge of computers and data recovery could access the hard drive and extract the data that existed on it while it was in your possession. The sensitive data that could be accessed might be things like credit card numbers, email accounts, social profiles, personal information like birth date, social security numbers, home address, bank statements, family pictures, and information about your children including personal records and location information like schools they attend. Keeping your data secure is extremely important to avoid identity theft and theft in general. You can destroy your hard drive yourself, there are various methods that work. You can use powerful magnets, drill holes through them, crush them with sledge hammers, melt them down, or any other destructive method you can think of. Just don’t recycle your computer without paying attention to the proper disposal of your hard drive. The rest of the computer can be melted down and repurposed for it’s plastics and metals. There are computer recycling companies that will come to your home or office and pick these items up for you, while other recycling companies offer drop off locations that allow you to pack up your vehicle with outdated unused electronic components and drop them off, something similar to a goodwill drop off station. Electronic recycling is big business and consumers should be aware about the importance of data removal prior to dropping off equipment with recyclers.
Hacked Social Profiles – What Could go Wrong?
We know the problem with compromised bank accounts and social security numbers, but what about hacked social profiles? There are many reasons why you wouldn’t want criminal going through your personal feed, but there are also some things beyond the obvious that you might not have thought of that should be considered as well. There have been stories of Facebook profiles being hacked, then inappropriate images and content being messaged out to the the friends connected to that profile. This could be very embarrassing if pornographic images were sent out to employers or co-workers, or even family members. There are also stories of profiles being hacked and money requests being made to friends and family. Criminals have reached out to friends and family members through messenger, posing as the account holder, pitching a story, and asking for funds to be transferred into an anonymous account. I am sure there are stories more terrifying and more insane then those I used as an example, but you need to be aware that there are plenty of ways a criminal could manipulate someone on the other end that was believing the messages were coming from you. Keeping your social profiles out of the hands of criminals is Social Knowledge you should be aware of.