04424631960, 9884350700 #70/1, Market Lane, 7th Street, Kaladipet, Thiruvottiyur, Chennai 600 019. Tamil Nadu, India

Image analysis

Visual communication contains image aspects. The interpretation of images is subjective and to understand the depth of meaning, or multiple meanings, communicated in an image requires analysis. Images can be analysed though many perspectives, for example these six major perspectives presented by Paul Martin Lester. Personal perspective When a viewer has an opinion about an image […]

Read More »

AIDA MODEL

A some what simplifie model based on the identical principle fo sequential stages of consumer action is known as Aida Model stands for A – attracting attention I – rousing interest D –  building desire A – obtaining Action                Advertising as a communication medium can in most cases effectively perform the first three functions. […]

Read More »

Elements of Design

Line                A line is a mark between two points. They are various types of lines, from straight to squiggly to curved and more. Lines can be used for a wide range of purposes like stressing a word or phrase, connecting content to one another, creating patterns and much more. Shape                Height + Width […]

Read More »

10 C’s of effective communication

There are 10 C’s of effective communication which are applicable to both written as well as oral communication. These are as follows: Completeness – The communication must be complete. It should convey all facts required by the audience. The sender of the message must take into consideration the receiver’s mind set and convey the message accordingly. A complete […]

Read More »

Social Presence Theory

Cues-filtered-out approach: A perspective on CMC that says the Internet is inferior as a channel for communication because of a lack of nonverbal cues. In this approach, there is less information exchanged between people, then, it is not surprising that some would find this medium more impersonal compared to the richness of face-to face interaction. […]

Read More »

Shadow Identities

Another identity that is being further compromised by Internet technologies is the public identity of people, organizations, and their creations. Entities like manufacturers, film studios, and retailers go to considerable lengths to protect their images from misrepresentation. Certainly, many of these entities have established a presence on the World Wide Web to promote their preferred […]

Read More »

PROTECTING IDENTITIES IN THE INFORMATION AGE

we look at two identity-related threats of growing concern in the Information Age: identity fraud and shadow identities Identity Fraud Most of us spend a good deal of time, consciously or unconsciously, building a good reputation. We strive to make our credit card and automobile loan payments on time, we work hard to earn passing […]

Read More »

ANONYMITY, PSEUDONYMITY, AND IDENTITY

ANONYMITY Although most Americans would consider being “up-front” with people to be a common value, the fact is that in many instances we value privacy even more than frankness. There are certain legitimate circumstances in which our safety is protected by issuing our messages anonymously. In mediated contexts, anonymity is a state of communicating where […]

Read More »