
My First Blog Post


Video brief:
In this video, I use the idea from last time: video segmentation to complete the video.
It can be seen that in this video I have three roles. I put them in the one scene. These three people represent different types in society. The first person to come out is very socially experienced and very confident. The second who come out is more arrogant, she will face-to-face if she is monitored and would not tolerate any illegal matters. The third is very cowardly, and would choose to escape even if she found herself under surveillance or tracking.
My video is talking about surveillance in the form of an interview. The goal of making this video is to give people a reminder, although most of people are understanding surveillance take a lot benefits to them now, but there are potential dangers in the life, so you must be careful and cautious wherever you go.
The main content of this video I want to do a comparative thing, but I still magnified the disadvantages of surveillance. This interview is not very serious, this is most like a discussion between friends to share their stories.
First I ask questions about the two aspects of surveillance, “security and privacy”, and then quoted TED Talks to demonstrate my question, I simply make a question to my friends. One person talk about the importance of secretly taking pictures of herself and the monitors in public places. Another person first expressed her affirmation of surveillance, quoting some forums, article and her experience of the terrible things that she had been monitored and followed. Finally, I cite the academic to analyze the pros and cons of security and privacy in the current society.
Reflection:
This time the video makes Premiere Pro editing more interesting.
At the beginning of the theme determination, I encountered a big problem, in what form and comparison to present an effect I want to show. I actually completed two videos.
The first video, the background is colourful, but because the connection is not very good.

So I took another version. The background is white because it can better connect and express world to become pure. Although the scenes are not harmonious, this is where I need to strengthen.

Of course, the first video has become a lesson from the past, and many lessons have been learned:
I used headphones, there still have noise, so I use background music to cover up the noise
2.The quality feeling of scene, the effect of the lens makes people comfortable and presents a sense of reality.
I change the white balance and rendering to make video looks softer. Because of the performance, I actually took it many times to show the best results.
3.How does the matching of text effects look unobtrusive.
I have been thinking about the layout of the text for a long time, and the control of font, colours have also changed many times.
4.How to achieve harmony between screen switching and connection.
In fact, I have read a lot of tutorials to learn about cutting and then combining together, using the split method to make this video, but the effect is not very good because of the control of the light and the unskilled technique.
5.How to start and how to end makes people understand my thoughts.
At the beginning, I used the camera that I drew with stop motion, but in order to link the TED Talks behind, I changed it to a text question.
6.the details of the video.
I did not use a lot of pictures to complete this video, but use a story to show my views on surveillance.
After the first video was finished, I find many points on my video. So in the last video, I make more intuitive and obvious changes to these six points, which also make my video have greatly improved.
In today’s society, “Surveillance” mostly tends to be derogatory. This world is often appears in prisons and police stations, but it also appears in the beautiful world. For example, the monitoring of patients in intensive care, for example, there is a traffic accident, global surveillance is extensive, involving every corner, the perpetrator will not escape. In my opinion, the significance of surveillance is infinite, with pros and cons, depending on how to use it.
Reference:
D.Lyon 2001, Surveillance Society: Monitoring Everyday Life, pg1,retrieved 18 september 2020
V Pavone, SD Esposti 2012- Public Understanding of Science:“Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security”pg 558, retrieve on September 2020
Forum:
“r/technology” by ohnoh18
Article:
“Melbourne is using pop-up policy spy stations to find people breaking COVID rules, what does the law say?” by Rick Sarre
TED TALKS:
K.Crockford,2020, TEDxCambridgeSalon :“What you need to know about face surveillance”
music:
“Happy and Joyful Children – Positive and Upbeat Instrumental Background Music” by free music is licensed under CC-BY-3.0
Scary Sound Design (© Clap Studios 2011) by ClapStudios is licensed under CC-BY-3.0
“*HALLOWEEN* Scary Movie/Game/Haunted House/Horror Sound Effects Soundtrack [FREE DOWNLOAD]” by MB productions is licensed under CC-BY-3.0
picture:
“Think” by Taymaz Valley is licensed under CC BY 2.0
https://search.creativecommons.org/photos/ef1f214d-2a2b-4817-9f8e-ba10f7aad1df
“Skull” by SebastianDooris is marked with CC0 1.0
https://search.creativecommons.org/photos/adba482b-1fa8-4d03-bd3a-d2407ab9dbe5
( other pictures and monitoring video by myself)
Brief:
In the first part, I express my opinion on some of the advantages and disadvantages of surveillance. No matter which things will be divide into good and bad. Surveillance is everywhere in people’s lives. It can bring convenience to many people, but it have to invade of privacy.
In the second part, I express agreement with surveillance, because it is true that many of our lives today cannot be without it, so I only invoke on women and even men to be alert to their surroundings and learn how to protect themselves.
The last part is a kind of surveillance situation in the way of performance, to lead the “New watching: “Surveillance” that the video I want to express.
I hope that my video can let everyone pay attention to protect themselves. The society is developing too fast now, and there are various ways to peep into privacy. Especially women should be more careful in this regard. I involve on girls to protect themselves. If there are fewer people in this world who did ridiculous things, there will be less trouble.
Reflection:
I used Premiere project to complete my work. This time my video revolves around surveillance as the subject of narration. One part is a performance, and the other is a very serious explanation of my opinion on surveillance. There will be a little horror in this video because I want to echo end and begin. There are a few parts that I didn’t connect very well, and the transition are not natural enough. I need a big improvement on this, and I hope I can do it well in the next work. I have used a lot of pictures and videos to help what I have explained. I add some sound effects to set off the atmosphere. I am more satisfied that every sound effect of mine is stuck well, so I know that I have to keep it. One thing I’m not satisfied with is the light. When I film this video because it was night, the material of the lamp I bought was not available, so I could only use a flashlight to do it. Of course, the effect was not very good, which reminded me, next time i have to make all the preparations to present a better video.
But actually my feelings after making this video is when I am really serious about learning to make videos, there are some details in the actual operation, I will search online or follow other people’s tutorials on YouTube, and basically find the answer. The cutting of video, re-splicing, background music, subtitles, transition effects, so simple ones can all be mastered quickly.
In my opinion before, I wanted to add a split screen to make the whole video be layering, but this special effect is more about the time control of the video. For example, one lens should move in a second, and the time must be precise. I didn’t master it very well, so I didn’t use it in my work this time.
After making some videos, I think what really took the time and decided to make a good video is: I sketched a story in my mind with the story, the post-shooting and editing are all around the story, and many effects can be learned and realized. Like now, I started to watch some videos because I have no foundation, so I analyze what good effects they have used, how to express a certain scene, start with imitating, and then slowly develop my own style.
My draft planning:



Reference list:
Pictures:
https://search.creativecommons.org/photos/719ba3b1-93b4-476a-a69e-87473791c1ec “CCTV camera” by Mike_fleming is licensed under CC BY-SA 2.0 https://search.creativecommons.org/photos/557d6151-50e5-4d23-a2a0-9a0d18cd449d “Caméra de vidéo-surveillance” by zigazou76 is licensed under CC BY 2.0 https://search.creativecommons.org/photos/115941d9-270d-48f0-a374-552765ba5979 “surveillance cameras” by gavinandrewstewart is licensed under CC BY 2.0 https://search.creativecommons.org/photos/9a1f4052-d81e-4a74-a37e-113bac84141b “One Nation Under CCTV” by tj.blackwell is licensed under CC BY-NC 2.0 https://search.creativecommons.org/photos/2ee80559-b74a-4ee6-a0ad-01d6c30bd244 “Surveillance camera” by Matti Mattila is licensed under CC BY-NC-SA 2.0 https://search.creativecommons.org/photos/eaba1923-4680-4b76-902f-007ef51b6195 “Malware Infection” by Visual Content is licensed under CC BY 2.0 https://search.creativecommons.org/photos/f0cb4280-f872-46fa-b034-2959a4672c6c “Data Security” by Visual Content is licensed under CC BY 2.0 https://search.creativecommons.org/photos/0f4231fd-194f-4c94-bacb-e2d3db2f6699 “Invasion of privacy” by jaci XIII is licensed under CC BY-NC-SA 2.0 https://search.creativecommons.org/photos/21034158-32a1-4b01-85f6-2a7a91e712b3 “Hacker stealing information” by cafecredit is licensed under CC BY 2.0
Video:
“Australian car crash/dash cam compilation 23” by Dash Cam Owners Australia is licensed under CC By 3.0 https://youtu.be/4YkU-HSBLeE “what do hackers do with your data?” by techquickie is licensed under CC By 3.0 https://youtu.be/RMojraRwxio
Music:
for game-picture-horror_0_adobestock_372208353_preview.m4a skeletons in the closet_adobestock_356966194_preview.m4a
Scholar reference:
“Surveillance society” by lyon David published on September 28 2008, page 2 http://www.festivaldeldiritto.it/2008/pdf/interventi/david_lyon.pdf



















Reflection of my podcast
My mainly podcast’s topic is “What benefits and limitations are involved in using digital media to facilitate student learning and engagement?”. There are there important points to note in the topic, in the first part, I have introduce them and explain these 3 points: “what’s the digital media”, “what’s the benefit and limitations?” and “what’s the students’ education?”. When dealing with these points, I start thinking about the coherence between them. So I searched the information about this topic by google scholar. Then, I arranged my words and gave my opinion about my topic.
In my topic, my opinion is that using digital media is a very convenient, fast thing and a really great benefit for students. “They can use this to think about the problem more quickly. Using digital media can encourage students to think deeply about the topic or meaning of the article, combine their experience, and then explain the developments they see and their understanding of the topic during the communication process. They can present facts and concepts related to the subject and learn to think about various issues. Of course, digital media can bring students the knowledge of new media and other skills. For example, they can use digital cameras to take and edit photos, then recognize different image formats, learn to use audio editing, make and save their own pictures or videos taken.” (From my podcast )
Through my assessment this time, I need to record, edit and add music in it. Many software can help me and it is much more convenient for me. I used Audacity to fixed my audio, in this learning, I believe that I can be great help in the future, and I can skilfully use video or audio editing. But when I did my work, I had a big problem. It took me five hours to finish my podcast , and I checked it, it was very strange, but I did not know what went wrong, I checked over and over about half hour, I got it. Because I found the wrong articles at the beginning. It is not “social media”, it is about “digital media”! At the time, I was a bit broken, because after spending five hours to complete the podcast, I had to find all the sources again and then organize my words to answer questions. So this experience taught me that no matter what you do, you must be very careful and you can not ask for it be very fast, you have to check it over and over again.
I used 4 scholar sources “according” in my podcast. The famous quotes of every author are very important, what they say is to convey what they want to express through their readers. So they bring us many influences and various factors.
Digital media has always been around us and can be seen everywhere. In fact, the most important thing is to study well and know how to properly use digital media. Because it is inevitable that you will need to use it in both work and study, so I think that the development od digital media will gradually grow in the future.
Learning is really something you can never learn. I believe that I can meke very good and perfect assessment and projects with your heart.
References for podcast:
https://link.springer.com/content/pdf/10.1007%2Fs11423-008-9091-8.pdf
Music reference:
What’s the online identity?
Online identity is a virtual identity on the network, it is an internet users who build online communities and social identities on websites, some people choose to use real names and avatars but some people use fake name or fake avatar. You can connect people from everywhere around the world, communicate and share information about some topics. You use the online identity of social media had greatly expanded the range of possible communication, you can share files, pictures, messages and even instant information about where you are doing. These features are not new or unique, even if you do not join a social media website, you can do these actions directly through the web. How to obtain such an identity, online identity is associated with the user through registration and login. Some websites also use users’ IP addresses to identity users, so create online identity is not completely secure.
Why we create online identity?
I use Twitter and Instagram now. Create an online identity to communicate is already a way for many people. The advantage is that you can chat with your friend without going out, you can order food on the internet, and you can also purchase online, items are post directly to your home. The event you want to attend can be found on the web. “Display different digital images, build personal digital reputations, and post and receive feedback from participating online communities.” (Affan Yashi & Lin Liu 2016) which is very convenient.

What Online Identity we can use?
For example:

QQ is a Chinese social media, a lot of teenagers use this application. It has many features, people can post their lives on it, their friends can like it, share it and comment on it. When the various festivals come, people will always send a red packet to each other, such as blessing, similar to a traditional in China. Red packet like transfer, you can get money from this. You can chat, you can express your feelings and also make your own emoticons. QQ contains a lot of games, you can play when you are bored. It will push some real-time news every day which will keep you focused on what is happening to society. QQ also records your exercise steps and tell you the daily weather forecast. The most interesting one of QQ is that it can be upgraded, if your level comes to be higher, the value of your QQ number will higher. QQ can join a membership, but need to be bought for money. After getting it, you can enjoy various background skins and change the font. QQ also has a convenient QR code, when you need to add a friend, you do not need to enter the name or feature, you can add it as a friend by scanning it. It has the same function as WeChat which another Chinese social media. QQ’s personal homepage is to choose an avatar suitable for your own net name. Below is my QQ profile, I did not use my real avatar and name. Because we are not usually putting our real name on it, I would write my date of birth, my country and some of my bios, and my favourite personality tags.

What happened if we create an Online Identity?
For example:
When we post our life status on the website, sometimes we put a tag on it, like a social media named Weibo in China, we can search all kinds of real-time news, we can also chat on it. On Twitter and Facebook, there is a popular hashtag is “Feminism”. In fact the identity of the internet is not very secure. Many women will be misinterpreted by others because they share some pictures by themselves on the internet, or used to ridicule women. They are a very humble existence. This tag is actually a virtual space. It provides them a platform for them to state what happened. Let’s discuss and solve it together.
“I decided to transform my feeling of powerlessness into action. I thought of getting on a plane to Chibok, Nigeria, where the students were kidnapped, but my eleven year old daughter begged me not to go out of concern for my safety. She asked me to think of another way to help from home. I decided what I would do is that I would put out a call on social media. I started shouting it on social media hoping that people would listen and they would shout it back, and so first I started shouting to all of my friends. Then I started shouting it to President Barack Obama.” (Litoff, 2014)
So when you have your identity online, you must be very careful, because there are people that want to attack you or steal your information to make something terrible have happened or borrow usury.



My Twitter and my tweets:
Kylie Jenner promotes her brand through free advertising in an informal way that’s connects her with younger audiences."Celebrities are allowing……an audience." https://t.co/6DBuK1VcEBhttps://t.co/6DBuK1VcEB (Marshall2010pg41)
— Kristina Li (@Kristin23534341) November 28, 2019
Picture By Ayriel Jone (CC By-NC 4.0)#ALM101DC pic.twitter.com/LcMSIHXeDe
Clown's tearshttps://t.co/4zP11AXmGo…
— Kristina Li (@Kristin23534341) November 14, 2019
"Paintings private sale"
by Sean Taggart is licensed under CC BY-NC-ND 4.0#ALM101DC pic.twitter.com/VSaWVjOsm7
Reference list:
Dr. Kitsy Dixon, 2014, Journal od Arts&Humanities, “Feminist Online Identity: Analyzing the Presence of Hashtag Feminism”, Vol 3, No 7 (2014), pp 34-35
https://theartsjournal.org/index.php/site/article/view/509/286
Alice Emily Marwick, 2005, “Selling Your Self: Online Identity in the Age of a Commodified Internet”, pp 16-18
Affan Yasin &Lin Liu (Institute of Electrical and Electronics Engineers), 2016, “An Online Identity and Smart Contract Management System” retrieved in 25 August 2016
https://ieeexplore.ieee.org/abstract/document/7552202/metrics#metrics
J. Kim, Community Building on the Web: Secret Strategies for Successful Online Communities, Boston, MA, USA:Addison-Wesley Longman Publishing Co., Inc., 2000. Abstract.
Social media are interactive computer-mediated technologies that facilitate the creation and sharing of information, ideas, career interests and other forms of expression via virtual communities and networks. The variety of stand-alone and built-in social media services currently available introduces challenges of definition.
(resource: https://en.wikipedia.org/wiki/Social_media)
My three social media hyperlink:
My twitter
My blog
My About.Me
In my Twitter portfolio, my user name is Kristina Li. That’s my true name, put this name because it is reality. My head portrait is a pink gummy bear. Because I love to eat gummy bear and it is very cute. In my bio (I’m a student who is studying design in Deakin college Melbourne, Australia /Music/ Movie/), I like listening to the music and watching the movies. Twitter is a good way to know a lot news, I can learn knowledge about social media from it. Lots of people can share and post their life on that.
In my blog, my user name is Kristina5986. Kristina is my English name and 5986 is the first word of my Chinese name replaced by a number. My head portrait is my own photo. I hope everyone can know me from this photo. WordPress is a very quite place where you can upload your own life and collect some memories.
In my About.me, my user name is Yitong Kristina Li. It is my true name that make it easier for everyone to remember my name. And my head portrait is same to my twitter, because I want to connect with Twitter.
What I learnt from social media is people who can share his own mood and dynamics, it can make a lot of friends and easily communication with friends. It also can learn appreciate different perspectives and worldviews to better understand the world around them and build their knowledge of a range that can support friends and family members who may encounter specific problems. Of course that network is fictitious and will be in danger, so be sure to protect yourself.
Hello, everyone, I’m Kristina Li. I’m learning Design in Deakin College in Burwood, Melbourne, Australia. I am a fan of design, technology, and music. I’m also interested in movies and DIY.
Hello, everyone, I’m Kristina Li. I’m learning Design in Deakin College in Burwood, Melbourne, Australia.
