SlideShare a Scribd company logo
1 of 14
Download to read offline
Research Investigation
20 % of A-Level Media
Research Investigation


Your essay must ;
-Use primary and secondary research
-Use quotations which are referenced in a bibliography
-Not make a statement which is not evidenced or backed
up by a source
-Link and inform your practical coursework
-Not exceed the maximum of 1800
-Be based on Genre, Representation, Narrative
Research Investigation
You	
  must	
  show	
  evidence	
  of;	
  



Secondary research


Primary research



-Academic theories
-Detailed scene analysis
-Academic books
-Analysis of mode of address
-Reputable online resources
-  Documentaries
-  DVD extras
-  E Books
A- grade criteria
	
  

Research will cover a wide range of
sources
	
  
A - grade criteria
	
  

Research will be applied correctly and
will successfully answer the students
question
	
  

+	
  

=	
   answer	
  
A - grade criteria
	
  

Quality of written work will be
sophisticated and contain appropriate
media terminology


Mode of address, representation, protagonist,
objectification, hyper reality, the male gaze, close up,
tracking shot, post modernist, patriarchal society,
cultivated, gratifications, scopophilia, stereotypical,
connotations, non diegetic, hegemonic, genre, narrative,
plot device, cultivated, audience, parody, homage,
editied, cut, linear, non linear, binary opposition,
polysemic narrative, 
	
  
A - grade criteria


The essay will be sophisticatedly structured


Ø  Title question
Ø  Introduction with bite-size aims
Ø  Aim 1
Ø  Aim 2
Ø  Aim 3
Ø  Conclusion
Ø  Bibliography
Each aim should link and follow on from one another.
	
  
Possible theories to assist answering your question
	
  



Students should use 2-3 theories
for an essay, suggestions;
Laura Mulvey – Male Gaze
Uses and Gratifications
Cultivation theory
Genre theory
Post Modernism theory 
-Hyper-reality
Todorov – Narrative theory
Propp – Character roles
Binary opposition 
Feminism/Post Feminism
Today;
Working + reviewing
our Introductions
Structuring your introduction
1- State your intentions
2 - Introduce your two texts
3 - Separate your investigation
into bite size chunks
4 - Introduce the theories you
plan to use
Student examples of stating intentions and texts




Example 1 -Tomb Raider' and 'The Hunger Games
“Within this investigation I will analyse how female
protagonist are represented in the action genre and
specifically the two texts 'Lara Croft: Tomb Raider' and 'The
Hunger Games”





Example 2 - Tom Ford and Chanel No.5
“The representation of woman changes drastically when
advertising a product to different genders. Through selling
aspirations, companies are able to sell products. I will prove
this with examples of Tom Ford and Chanel No.5s’ perfume
campaigns.
Student examples of creating bite size aims




Example 1 - Tomb Raider' and 'The Hunger Games
I firstly will explore the female protagonist’s reliance on
men, secondly I will investigate if their ideology and
mindset is relative to the present or some what dated? Lastly
I will discuss the representation of female body, are females
still being objectified, is a realistic body images being
projected and if so why is this the case? 





Example 2 - Tom Ford and Chanel No.5
To prove this I will look at what the companies are selling
apart from the perfume, whether that be sex, ideology
or escapism. I will also research whether this advertising was
successful and whether the perfume products sold.
Student examples of introducing theory




Example 1 - Tomb Raider' and 'The Hunger Games
To help answer my investigation I will apply relative theory
such as the audience theory, uses and gratifications and
Laura Mulvey’s - The male gaze, which discusses female
representation.





Example 2 - Tom Ford and Chanel No.5
To do this I will apply specific theories, one being Laura
Mulvey’s theory of 'the male gaze' and how woman are
objectified to meet male aspirations, another being the
mirror stage and how this makes woman aspirer to be like
the woman they see in advertising campaigns such as
Chanel.
Use the A2 Media blog
to help you!





500 words by Friday!

More Related Content

Viewers also liked

Report Writing - Introduction section
Report Writing - Introduction sectionReport Writing - Introduction section
Report Writing - Introduction sectionSherrie Lee
 
Disney and vertigo
Disney and vertigoDisney and vertigo
Disney and vertigotashimeisel
 
Analysing the results of our survey
Analysing the results of our surveyAnalysing the results of our survey
Analysing the results of our surveySamMullerMedia
 
Kinds & classification of research
Kinds & classification of researchKinds & classification of research
Kinds & classification of researchGerlie Joy Gonda
 
Investigatory paper sample
Investigatory paper sampleInvestigatory paper sample
Investigatory paper sampleMarlo Ortinez
 
Definition and types of research
Definition and types of researchDefinition and types of research
Definition and types of researchfadifm
 

Viewers also liked (11)

Report Writing - Introduction section
Report Writing - Introduction sectionReport Writing - Introduction section
Report Writing - Introduction section
 
Sin city booklet
Sin city bookletSin city booklet
Sin city booklet
 
Sin city noir 333
Sin city noir 333Sin city noir 333
Sin city noir 333
 
Disney and vertigo
Disney and vertigoDisney and vertigo
Disney and vertigo
 
A2 media blog quiz
A2 media blog quizA2 media blog quiz
A2 media blog quiz
 
Analysing the results of our survey
Analysing the results of our surveyAnalysing the results of our survey
Analysing the results of our survey
 
Fish Tank
Fish TankFish Tank
Fish Tank
 
Kinds & classification of research
Kinds & classification of researchKinds & classification of research
Kinds & classification of research
 
Investigatory paper sample
Investigatory paper sampleInvestigatory paper sample
Investigatory paper sample
 
Definition and types of research
Definition and types of researchDefinition and types of research
Definition and types of research
 
Types of Research
Types of ResearchTypes of Research
Types of Research
 

Similar to Introducing research investigation

Rubric for Essay II – Final DraftEssay II54321Format.docx
Rubric for Essay II – Final DraftEssay II54321Format.docxRubric for Essay II – Final DraftEssay II54321Format.docx
Rubric for Essay II – Final DraftEssay II54321Format.docxtoddr4
 
Intro to representation
Intro to representationIntro to representation
Intro to representationchristimothy12
 
Rhetorical analysis
Rhetorical analysisRhetorical analysis
Rhetorical analysispumabeth
 
Alternatives To Social Research
Alternatives To Social ResearchAlternatives To Social Research
Alternatives To Social Researchjajp1968
 
Judging the Relevance and worth of ideaspart 1.pptx
Judging the Relevance and worth of ideaspart 1.pptxJudging the Relevance and worth of ideaspart 1.pptx
Judging the Relevance and worth of ideaspart 1.pptxSherlyMaeNeri
 
Audience Essay examples
Audience Essay examplesAudience Essay examples
Audience Essay examplesNaamah Hill
 
marketing - MK102_Session 4_2023_Final.pdf
marketing - MK102_Session 4_2023_Final.pdfmarketing - MK102_Session 4_2023_Final.pdf
marketing - MK102_Session 4_2023_Final.pdff20180184h
 
A2 media investigation help
A2 media investigation helpA2 media investigation help
A2 media investigation helpchristimothy12
 
This assignment is in three parts and asks you to take a critica.docx
This assignment is in three parts and asks you to take a critica.docxThis assignment is in three parts and asks you to take a critica.docx
This assignment is in three parts and asks you to take a critica.docxadkinspaige22
 
Primary research
Primary researchPrimary research
Primary researchctkmedia
 
Who is the target audience for your thriller opening?
Who is the target audience for your thriller opening?Who is the target audience for your thriller opening?
Who is the target audience for your thriller opening?bearskin_2
 
For this assignment you will write your Frankenstein1 applic
For this assignment you will write your Frankenstein1 applicFor this assignment you will write your Frankenstein1 applic
For this assignment you will write your Frankenstein1 applicMatthewTennant613
 
Semiotic strategies: The things you are looking at have names
Semiotic strategies: The things you are looking at have namesSemiotic strategies: The things you are looking at have names
Semiotic strategies: The things you are looking at have namesMRS
 
Lesson 4 representation in media products
Lesson 4   representation in media productsLesson 4   representation in media products
Lesson 4 representation in media productsbearskin_2
 
Section a theorists y13 recap
Section a theorists y13 recapSection a theorists y13 recap
Section a theorists y13 recapKStockwell
 
Rubric for Concise Mastery Reports (60 points) Perfor.docx
Rubric for Concise Mastery Reports (60 points)  Perfor.docxRubric for Concise Mastery Reports (60 points)  Perfor.docx
Rubric for Concise Mastery Reports (60 points) Perfor.docxcheryllwashburn
 
A2 Media: How to Integrate Theory
A2 Media: How to Integrate TheoryA2 Media: How to Integrate Theory
A2 Media: How to Integrate Theoryiangbland
 

Similar to Introducing research investigation (20)

Rubric for Essay II – Final DraftEssay II54321Format.docx
Rubric for Essay II – Final DraftEssay II54321Format.docxRubric for Essay II – Final DraftEssay II54321Format.docx
Rubric for Essay II – Final DraftEssay II54321Format.docx
 
Intro to representation
Intro to representationIntro to representation
Intro to representation
 
Rhetorical analysis
Rhetorical analysisRhetorical analysis
Rhetorical analysis
 
Critical Introduction
Critical IntroductionCritical Introduction
Critical Introduction
 
Alternatives To Social Research
Alternatives To Social ResearchAlternatives To Social Research
Alternatives To Social Research
 
Judging the Relevance and worth of ideaspart 1.pptx
Judging the Relevance and worth of ideaspart 1.pptxJudging the Relevance and worth of ideaspart 1.pptx
Judging the Relevance and worth of ideaspart 1.pptx
 
Audience Essay examples
Audience Essay examplesAudience Essay examples
Audience Essay examples
 
marketing - MK102_Session 4_2023_Final.pdf
marketing - MK102_Session 4_2023_Final.pdfmarketing - MK102_Session 4_2023_Final.pdf
marketing - MK102_Session 4_2023_Final.pdf
 
Media revision as
Media revision asMedia revision as
Media revision as
 
Media audience theory
Media audience theoryMedia audience theory
Media audience theory
 
A2 media investigation help
A2 media investigation helpA2 media investigation help
A2 media investigation help
 
This assignment is in three parts and asks you to take a critica.docx
This assignment is in three parts and asks you to take a critica.docxThis assignment is in three parts and asks you to take a critica.docx
This assignment is in three parts and asks you to take a critica.docx
 
Primary research
Primary researchPrimary research
Primary research
 
Who is the target audience for your thriller opening?
Who is the target audience for your thriller opening?Who is the target audience for your thriller opening?
Who is the target audience for your thriller opening?
 
For this assignment you will write your Frankenstein1 applic
For this assignment you will write your Frankenstein1 applicFor this assignment you will write your Frankenstein1 applic
For this assignment you will write your Frankenstein1 applic
 
Semiotic strategies: The things you are looking at have names
Semiotic strategies: The things you are looking at have namesSemiotic strategies: The things you are looking at have names
Semiotic strategies: The things you are looking at have names
 
Lesson 4 representation in media products
Lesson 4   representation in media productsLesson 4   representation in media products
Lesson 4 representation in media products
 
Section a theorists y13 recap
Section a theorists y13 recapSection a theorists y13 recap
Section a theorists y13 recap
 
Rubric for Concise Mastery Reports (60 points) Perfor.docx
Rubric for Concise Mastery Reports (60 points)  Perfor.docxRubric for Concise Mastery Reports (60 points)  Perfor.docx
Rubric for Concise Mastery Reports (60 points) Perfor.docx
 
A2 Media: How to Integrate Theory
A2 Media: How to Integrate TheoryA2 Media: How to Integrate Theory
A2 Media: How to Integrate Theory
 

More from christimothy12

More from christimothy12 (20)

Lady Gaga - Born this way
Lady Gaga - Born this wayLady Gaga - Born this way
Lady Gaga - Born this way
 
Tv link cards
Tv link cardsTv link cards
Tv link cards
 
Tv link cards
Tv link cardsTv link cards
Tv link cards
 
King of limbs1
King of limbs1King of limbs1
King of limbs1
 
Nirvana v3
Nirvana v3Nirvana v3
Nirvana v3
 
Evaluation tips
Evaluation tipsEvaluation tips
Evaluation tips
 
Evaluation tips
Evaluation tipsEvaluation tips
Evaluation tips
 
Evalaution
EvalautionEvalaution
Evalaution
 
Attention to detail print
Attention to detail   printAttention to detail   print
Attention to detail print
 
Linking production to investigation
Linking production to investigationLinking production to investigation
Linking production to investigation
 
Feedback to homework tv audience
Feedback to homework tv audienceFeedback to homework tv audience
Feedback to homework tv audience
 
TV Audience appeal
TV Audience appealTV Audience appeal
TV Audience appeal
 
Lighting recap
Lighting recapLighting recap
Lighting recap
 
Media practical coursework v3
Media practical coursework v3Media practical coursework v3
Media practical coursework v3
 
Art4
Art4Art4
Art4
 
Peaky blinders
Peaky blindersPeaky blinders
Peaky blinders
 
Health check lesson, semiotics1
Health check lesson, semiotics1Health check lesson, semiotics1
Health check lesson, semiotics1
 
What to consider when writing an Artist statement
What to consider when writing an Artist statementWhat to consider when writing an Artist statement
What to consider when writing an Artist statement
 
Mad men context
Mad men contextMad men context
Mad men context
 
Media assessment
Media assessment Media assessment
Media assessment
 

Recently uploaded

Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 

Recently uploaded (20)

Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 

Introducing research investigation

  • 1. Research Investigation 20 % of A-Level Media
  • 2. Research Investigation Your essay must ; -Use primary and secondary research -Use quotations which are referenced in a bibliography -Not make a statement which is not evidenced or backed up by a source -Link and inform your practical coursework -Not exceed the maximum of 1800 -Be based on Genre, Representation, Narrative
  • 3. Research Investigation You  must  show  evidence  of;   Secondary research Primary research -Academic theories -Detailed scene analysis -Academic books -Analysis of mode of address -Reputable online resources -  Documentaries -  DVD extras -  E Books
  • 4. A- grade criteria   Research will cover a wide range of sources  
  • 5. A - grade criteria   Research will be applied correctly and will successfully answer the students question   +   =   answer  
  • 6. A - grade criteria   Quality of written work will be sophisticated and contain appropriate media terminology Mode of address, representation, protagonist, objectification, hyper reality, the male gaze, close up, tracking shot, post modernist, patriarchal society, cultivated, gratifications, scopophilia, stereotypical, connotations, non diegetic, hegemonic, genre, narrative, plot device, cultivated, audience, parody, homage, editied, cut, linear, non linear, binary opposition, polysemic narrative,  
  • 7. A - grade criteria The essay will be sophisticatedly structured Ø  Title question Ø  Introduction with bite-size aims Ø  Aim 1 Ø  Aim 2 Ø  Aim 3 Ø  Conclusion Ø  Bibliography Each aim should link and follow on from one another.  
  • 8. Possible theories to assist answering your question   Students should use 2-3 theories for an essay, suggestions; Laura Mulvey – Male Gaze Uses and Gratifications Cultivation theory Genre theory Post Modernism theory -Hyper-reality Todorov – Narrative theory Propp – Character roles Binary opposition Feminism/Post Feminism
  • 10. Structuring your introduction 1- State your intentions 2 - Introduce your two texts 3 - Separate your investigation into bite size chunks 4 - Introduce the theories you plan to use
  • 11. Student examples of stating intentions and texts Example 1 -Tomb Raider' and 'The Hunger Games “Within this investigation I will analyse how female protagonist are represented in the action genre and specifically the two texts 'Lara Croft: Tomb Raider' and 'The Hunger Games” Example 2 - Tom Ford and Chanel No.5 “The representation of woman changes drastically when advertising a product to different genders. Through selling aspirations, companies are able to sell products. I will prove this with examples of Tom Ford and Chanel No.5s’ perfume campaigns.
  • 12. Student examples of creating bite size aims Example 1 - Tomb Raider' and 'The Hunger Games I firstly will explore the female protagonist’s reliance on men, secondly I will investigate if their ideology and mindset is relative to the present or some what dated? Lastly I will discuss the representation of female body, are females still being objectified, is a realistic body images being projected and if so why is this the case? Example 2 - Tom Ford and Chanel No.5 To prove this I will look at what the companies are selling apart from the perfume, whether that be sex, ideology or escapism. I will also research whether this advertising was successful and whether the perfume products sold.
  • 13. Student examples of introducing theory Example 1 - Tomb Raider' and 'The Hunger Games To help answer my investigation I will apply relative theory such as the audience theory, uses and gratifications and Laura Mulvey’s - The male gaze, which discusses female representation. Example 2 - Tom Ford and Chanel No.5 To do this I will apply specific theories, one being Laura Mulvey’s theory of 'the male gaze' and how woman are objectified to meet male aspirations, another being the mirror stage and how this makes woman aspirer to be like the woman they see in advertising campaigns such as Chanel.
  • 14. Use the A2 Media blog to help you! 500 words by Friday!