04424631960, 9884350700 #70/1, Market Lane, 7th Street, Kaladipet, Thiruvottiyur, Chennai 600 019. Tamil Nadu, India

AIDA MODEL

A some what simplifie model based on the identical principle fo sequential stages of consumer action is known as Aida Model stands for A – attracting attention I – rousing interest D –  building desire A – obtaining Action                Advertising as a communication medium can in most cases effectively perform the first three functions. […]

Read More »

Elements of Design

Line                A line is a mark between two points. They are various types of lines, from straight to squiggly to curved and more. Lines can be used for a wide range of purposes like stressing a word or phrase, connecting content to one another, creating patterns and much more. Shape                Height + Width […]

Read More »

10 C’s of effective communication

There are 10 C’s of effective communication which are applicable to both written as well as oral communication. These are as follows: Completeness – The communication must be complete. It should convey all facts required by the audience. The sender of the message must take into consideration the receiver’s mind set and convey the message accordingly. A complete […]

Read More »

Social Presence Theory

Cues-filtered-out approach: A perspective on CMC that says the Internet is inferior as a channel for communication because of a lack of nonverbal cues. In this approach, there is less information exchanged between people, then, it is not surprising that some would find this medium more impersonal compared to the richness of face-to face interaction. […]

Read More »

Shadow Identities

Another identity that is being further compromised by Internet technologies is the public identity of people, organizations, and their creations. Entities like manufacturers, film studios, and retailers go to considerable lengths to protect their images from misrepresentation. Certainly, many of these entities have established a presence on the World Wide Web to promote their preferred […]

Read More »

PROTECTING IDENTITIES IN THE INFORMATION AGE

we look at two identity-related threats of growing concern in the Information Age: identity fraud and shadow identities Identity Fraud Most of us spend a good deal of time, consciously or unconsciously, building a good reputation. We strive to make our credit card and automobile loan payments on time, we work hard to earn passing […]

Read More »

ANONYMITY, PSEUDONYMITY, AND IDENTITY

ANONYMITY Although most Americans would consider being “up-front” with people to be a common value, the fact is that in many instances we value privacy even more than frankness. There are certain legitimate circumstances in which our safety is protected by issuing our messages anonymously. In mediated contexts, anonymity is a state of communicating where […]

Read More »

Gender-Swapping

Gender-swapping occurs when an individual of one gender self-presents as a member of another gender. As you probably know, gender is a social construct that provides guidelines for how we expect people of a certain biological sex to behave. For example, men are expected to be masculine and thus strong and women to be feminine […]

Read More »