#5 Colour Grade

For the colour grading, I’ve chosen three clips with different starting points in their original form.

No.1 has a strong contrast and shadow on the subject. No.2 Cold No.3 Warmth.




Anthony Johansson 360 flip




1.1 Purple Haze: Adjustments made: Low fade and saturation. Sharpened.


1.2 Maybe exaggerated a bit on this clip, but the pink skies were nice. Made it warmer by adjusting temperature and tint. lowered the white tones and increased highlights.


1.3 Lowered the saturation all the way down and also toned down the blacks. Toned up the whites and the contrast. Adjusted the shadows a bit for a darker effect.




Marius Barstad Hardflip





2.1 Adjusted the temperature for a warmer look while also sharpen the contrast to make the lines more visible and give the clip more depth.



2.2  Made the temperature even colder and toned down the exposure and contrast to give it a midnight blue feel (Norwegian summer night, that is).



2.3 Peaked the contrast and whites for a grainy old look. Toned down the blacks. Turned the saturation all the way down to strip the clip from colour, toned the contrast up high. This to complement the skater and the sky. There´s a strong contrast between the two.




Robin, Andreas, Anthony, Einar





3.1 Lowered the saturation and gave it a faded look. Like a dreamy layer.



3.2 Darkened the clip. Adjusted temperature and tint and added more depth by adding more shadow. Turned down the saturation for a colder look but not losing all colour.



3.3 B/W Super low saturation, faded background and the boys in black in focus makes a strong contrast.




#3 Forbidden Lies

I´ll describe in detail all of the audio from this clip from the documentary Forbidden Lies.

The clip starts off as a cheesy ´music video´ of a fan-written song. The music is layered with what I would assume is stock sounds of tweeting birds, chimes, and a car engine. But it could also have been recorded. There´s a loud `swoosh´ sound when Dalia throws of her hijab and the sound is even more emphasised when the hijab falls to the ground. The scene is interrupted by the sound of a cassette pausing, shortly followed by a pound. It´s a hard cut in the dramatic sound which grasps the audience’s attention when journalist Rana Husseini in a voiceover claims ´this is not the truth´. There´s a scratching sound as the burka dressed woman vanishes in the dessert. Clearly layered sounds of a camera shutter and a cash register chiming. It sounds like stock sounds. I believe they´re sourced externally and not recorded as ambiance. The sound effects are used as a transition between scenes. Rana, the journalist says the book is an insult to all Muslim women.

Continuing in a voiceover, Rana talks about honour crime in Jordan and her journalism career. I think they’ve used a lapel because even when filming outdoors the sound is loud and clear. Less disturbance than with a boom. While she talks we hear the sound of her typing away on her keyboard. For the sit-down interviews (except the authors´) they´ve used a boom to record sound. 

Dr. Amal A. Sabbagh is talking about factual errors in the book. Bells are chiming when the frame cuts to a close-up of the book. The chiming sound reoccurs throughout the clip to divide the different topics of the dialogue.

For the next sequence, the three of them (The Author, the journalist and Dr. Amal) are reading the same phrase from the book. This specific section must have been requested so that when editing the film, it would be easier to overlap and cut between all of them reading out loud.

The reading session is interrupted by a sound of a camera shutter followed by the voice of Dr. Sabbagh talking about how the Jordan river does not run through Amman. The journalist reads out loud from the book. As the frame changes back to the author, Norma. their voices are overlapping as they read the same phrase from the book. Norma´s voice is layered over another voice.

Dramatic sound effects with a resemblance to the music from the game show Jeopardy plays while we see a Map voiced over by Rana and Dr. Amal exposing factual flaws from the book. Upbeat tunes start playing. Clearly layered during post-production.

While Norma is reading from the book the arguments from the journalist and Dr.Sabbagh showing the re-enactments. The music plays continuously and as the lies in the book are revealed, sound effects are layered on top; rattling of change, camera shutter, the cash register. The cartoon sounds as the Hyatt Hotel is taken apart.

The sound effects are in tune with the footage on screen. The lighting of the cigarette could have been live sound but the rest I believe is edited in during post-production.  

The clip continues with Rana´s voiceover and her having a conversation over the phone. The phone call might have been recorded using a recording software because the dialogue is heard as a clear conversation.


#2 No Direction Home


The opening scene is a clip in warm colours of Bob Dylan live in concert. More specific, it´s Dylan performing his revolutionary 1965 song ´Like A Rolling Stone´, which completely transformed his image from a poetic folk singer to an absolute rock star. We´re cut straight to the line, No Direction Home which is the title of the documentary. Already here the audience know what to expect; The story of Dylan´s road to being one of the most influential musicians of our time- and the path which lead him there.

The music finishes without warning. The next clip is a quiet winter scene.  The transitions of the B/W still images of hazy fogged trees.switch from CU-MCU-WS. It´s a hard-cut contrast to the opening scene. After the second transition, Dylan´s voice narrates. He goes on about ´how you can do a lot of things that seem to make time stand still, but of course, no one can do that´. The whole vibe from the scene is cold and silent, compared to the first clip. After Dylan´s philosophical thoughts `Drifting Too Far From The Shore´by The Monroe Brothers starts playing while a B/W still image of a house takes over the next frame. The viewers soon understand it´s Dylan’s childhood home. The Text “Many Years Earlier” appears on the screen. What we get from this is an understanding that part of the documentary revolves around Dylan’s childhood. And what lead him to pursue a career in music which again leads him to become the influential voice he is, even today.

As photos of a young Dylan and B/Ws from his childhood pops up on the screen, Scorsese’s use of images illustrates the key points of Dylan´s interview. There´s a nostalgic vibe to it when Dylan talks about his childhood and his hometown.

He speaks of what led up to his pursuit of music. When he first started playing the guitar, the first time he listens to music on his dad’s big mahogany radio with a 78” turntable. He opened it up one day and there was a country record in. It was `Drifting Too Far From The Shore´, which is also playing in the background while he speaks. At the end of this part, a selection of photos fills the screen. Dylan as a young boy, a video of a turntable and then footage from Dylan´s interview. In the interview footage of Dylan, he says the sound of the record made him feel like he was somebody else, that he was maybe not even born to the right parents. To the viewer, It’s obvious that this moment in his life was one of huge influence.

It cuts to a B/W clip of a street with a banner which reads “See the Iron Mines 1 Mile North”. Footage from the mine is also shown. Music is playing in the background while Dylan talks about his hometown. “What happens to a town after it´s livelihood is gone…it decays and blows away”. B/W clearly represents the past.

Colour clip of Dylan in an interview setting reminiscing back to the life on the farm, the mine, the harsh weather and the pit, where everybody worked. It was so cold you couldn´t be a rebel, you couldn´t be bad, he says. There were no philosophy, idiom or ideology to go against. – Which again leads up to the documentary showing that is what he eventually did.

Photos of his father’s electrical store and the town are shown when Dylan talks about his first job sweeping up the store and how that was supposed to teach him the discipline of hard work and the merits of employment.

This almost 3-minute long edit by Schoonmaker is a good indication of what we can expect from this documentary and what Scorcese is trying to tell; How Dylan came to be one the most influential musicians and poets of our time. He wasn’t born into the music scene. He rebelled against his upbringings and against taking over the family business so he could follow his own life-philosophy and change the world. The rest of the documentary will show this by using both stills and videos of a young Dylan cut in an efficient way going back and forth from the past till now. The edit switches from colour to B/W image to effectively tell a story separating the now from the past. The use of music gives a nostalgic feel. Also the use of old photographs. Schoonmaker and Scorsese will continue to use this method throughout the rest of the documentary. It’s a very effective way to show the story in a sequent.



Next Level Transmedia






The benefits of Transmedia is that it gives us storytelling on multiple devices and in multiple formats. As defined by Henry Jenkins, a transmedia story is one that “unfolds across multiple media platforms” (2006).

I can´t even begin to think of how many story worlds I´ve completely lost myself to over the years. Since it first aired in 2015, I´ve been obsessing over SKAM- A Norwegian web series which also lets the viewers follow the characters on a day to day basis through social media.

The audience for “Skam” is taking up huge pockets of Twitter and Facebook, and most especially Tumblr. The series gained international fame after the third season where the viewers followed Isak, who struggled with homosexuality. The main character in the fourth season is Sana, a teenage Muslim girl who´s struggling with balancing her day to day life and her religious belief. One of the reasons the show is so addictive is because on an everyday basis the views can interact with the characters on social media and there´s even a website which tracks all their social media activity and group conversations.

“Once people find a story world that they really like, they want to stay there for as long as they can, and transmedia is just an incredibly efficient way of catering to that desire”. – Andrea Phillips

A story can be collected and enjoyed. We emerge ourselves in these story worlds because we can comment on what we enjoy in social media. Very soon there are going to be ways for the audience to actually enter into the story in some way and participate creatively by generating content, submitting it and having it curated and perhaps become a part of the story world. The audience is going to be able to participate in more and more immersive ways.

Modern technology is allowing and facilitating this notion of interaction. I am sure Transmedia will be the future of communication.


Gaskins, K. (2012). Future of Storytelling Expert Series: a Conversation with Transmedia Creator Andrea Phillips. Available: http://latd.com/blog/future-storytelling-expert-series-conversation-transmedia-creator-andrea-phillips/. Last accessed 31st May 2017.

Jenkins, H (2006). Convergence Culture: Where Old and New Media Collide. New York: New York University Press. 95.

Kickham, D. (2017). What You Need To Know About The Viral Norwegian Teen Drama Tackling Sexuality. Available: http://elitedaily.com/entertainment/viral-norwegian-teen-drama-sexuality/1839614/. Last accessed 31st March 2017.


Hashtag is Key


80x15 by  Théo La Photo 

The definition of hashtag is simply a word or phrase preceded by a # sign.

Hashtags can expand your content reach, target your market, grow your brand, get your content found more easily and improve your SEO. When it comes to building social media campaigns, especially on Twitter and Instagram, hashtag is key.

Hashtags began trending on Twitter but are now also used on other social media sites such as Facebook, Instagram, and Google+. Hashtags enable you to categorise posts and tweets you publish. It also makes it possible for you to identify all the content that has been published on social media on a specific topic. For example, I watch a lot of debate shows and one thing that is always trending during and after the shows is their own hashtags. by clicking the hashtag I can easily follow and interact further in the public debate in the “hashtag chat”.

Anyone can make a new hashtag, but not everyone can make their hashtag start trending. So how can you use your hashtag more efficiently?

Whatever your message might be, sum it up in one word. It´s crucial that you search the hashtags you know your customers or followers are using online. Go on social media to find out what people are talking about. Visit the different sites where people are using those hashtags and start to engage in conversations.

If you want to create and use your own hashtag ask people to use it in their content. you can´t own a hashtag because people are free to use is however they please. To encourage people to use your hashtag start listening to them. Everyone’s biggest fear is not to be heard at all. If you give people the opportunity by saying `use this hashtag and we´ll respond to you´ they will value you for that.

To promote your hashtag add it in your site banner, in your ads, and in your profile description.

Click here to find out what hashtags are being used for what.

How do you track the performance of your hashtag?

This tool will show you how much engagement your hashtags has received. Whether it´s positive, negative or neutral. It will also tell you how many people saw your hashtag, their geolocation etc.

If you create your own hashtag you will benefit by attracting more relevant users to join your conversation. As your hashtag becomes more and more popular you online reach will grow.



Loren, T. (2017). The Ultimate Guide to Instagram Hashtags in 2017. Available: https://later.com/blog/ultimate-guide-to-using-instagram-hashtags/. Last accessed 30th May 2017.

Moritz, D. (2014). How to Encourage Fans to Create and Share Visual Content. Available: http://www.socialmediaexaminer.com/encourage-fans-to-create-share-visual-content/. Last accessed 30th May 2017.

-. (-). Definition of hashtag in English:. Available: https://en.oxforddictionaries.com/definition/hashtag. Last accessed 29th May 2017.

-. (-). 3 Key Hashtag Strategies: How to Market your Business & Content. Available: http://blog.wishpond.com/post/62253333766/3-key-hashtag-strategies-how-to-market-your-business. Last accessed 29th May 2017.

A Gaming World Gone Wrong


You say Virtual Reality, I say Black Mirror.

These days you need a lot of advanced and expensive equipment if you want the full VR experience.

People are keen on technology and would use any excuse to take a break from their own boring or hectic lives. The reality is that we´re already interacting more with our devices than with each other (Anderson & Rainie 2010).

This got me thinking of an episode of season 3 of Black Mirror. The episode is called “playtest”. To sum up the storyline from IMDb: An American traveler short on cash signs up to test a revolutionary new gaming system, but soon can’t tell where the hoot game ends and reality begins.

Cooper (The protagonist) mysteriously loses all his money and sees an opportunity to earn some fast cash by taking on a game testing role for the big SaitoGemu Company. Cooper is taken to a cold white room, which is where he will be conducting the testing- playing a video game where he is to conquer his biggest fears. The VR experience is downloaded directly into his consciousness through a micro device which is injected into his brain. The technology inserted in Coopers’ brain makes him see things that aren’t really there. When the game begins he is not capable of distinguishing what is real and what is augmented reality.  The technology is playing with his mind and his senses.

Playtest shows a disturbing vision of the future of video games and how far VR can go. Futurist Ray Kurzweil predicts we’ll be closer to the Matrix-type VR experiences in 20–25 years

But will Black Mirror become reality someday?

I would say that a similar scenario could realistically play out in the future. It really makes me think of some “What if” scenarios. Both mind control and VR exists, so a fusion between those two is not entirely unimaginable for the future of VR. It is scary, but it is possible. This scenario might just happen, in a dystopian future, not too far from now.



Anderson, J. & Rainie, L.. (2010). The future of social relations. Available: http://www.pewinternet.org/2010/07/02/the-future-of-social-relations-2/. Last accessed 16th May 2017.

Baer, D. (2015). The world’s most famous futurist just explained why VR will be important when people live forever. Available: http://www.businessinsider.com/ray-kurzweil-says-vr-will-be-important-when-people-live-forever-2015-11/?r=AU&IR=T. Last accessed 16th May 2017.

-. (-). Virtual Reality. Available: https://en.wikipedia.org/wiki/Virtual_reality. Last accessed 20th May 2017.

-. (2016). Playtest . Available: http://www.imdb.com/title/tt5709242/. Last accessed 23rd May 2017.

-. (2011). Black Mirror. Available: https://www.netflix.com/title/70264888. Last accessed 17th May.


Practice- Led Research

Digital Story Website

Digital Story Proposal Website

Social Media Profiles:     Twitter Instagram Facebook YouTube

The Issue: Brand Considerations

An issue that concerned me during the digital story project was our choice of platform. From the very beginning, we were set on making a web documentary series on YouTube, where the first episode would be our 90-second video on the penalty rate cut. As things turned out, we ended up adjusting our whole approach to the assignment and made a website that would function as our new platform. We leaned more towards the direction of Vice Magazine and our concept went from being a web series to becoming a news site.

When you upload to YouTube, you can’t control the perception the consumer has of your brand. Often, “related videos” will show your competitors, and the YouTube logo will always be on your video player. Related videos shown after your video ends may lead traffic to a competitor’s site instead of your company’s. There’s really no unique branding available on the YouTube platform unless you spend a lot of money to become a Partner, and even then you’ll have to deal with ads in some form (Archer 2014).

Since the theme was cultural differences, all of a sudden it wasn´t only the penalty rate cut we had to worry about. After converting into a news site, we had to come up with more content about cultural differences.

The task of not just creating content, but creating content that resonates with your readers, is a critical but difficult task to master.

As Neil Patel writes content marketing is also about using the best tools out there to promote your valuable content, in order to attract and retain customers.

Therefore we´re also relying on our social media sites to promote our website to solve the issue.


Archer, D. (2014). CUSTOMER EXPERIENCE: YouTube vs. Hosting on Your Own Site. Available: https://blogs.adobe.com/digitalmarketing/customer-experience/youtube-vs-hosting-site/. Last accessed 29th May 2017.

Patel, N. (-). How to Create Better Content For Your Customers. Available: http://neilpatel.com/blog/content-creation-how-to-create-better-content-for-your-customers/. Last accessed 28th May 2017.

Wainwright, C. (2012). How to Create Content That Actually Resonates With Your Readers. Available: https://blog.hubspot.com/blog/tabid/6307/bid/33747/How-to-Create-Content-That-Actually-Resonates-With-Your-Readers.aspx#sm.00018nwhyzf3cd50rrz2mpmq0wzzo. Last accessed 29th May 2017.






Digital Story: Peer Review


A good concept where they play one song to a bunch of people with different nationalities. Many people, many opinions and so little time to tell it. The fast-paced editing and use of 2 shot were very impressive and it solved what could have been a problem with this type of reaction video. I liked how they played the song in the background while the people gave their answers. It saved time but it also gave it a better overall feeling. The only thing I would pick on that really annoyed me while watching this clip was the bright red face on the poster positioned right behind the interviewees. It draws the attention away from the actual focus. I would suggest running the background through PS and colour grade, maybe even manipulate the bright red to make it less `out there´. Except that, my opinion is that the group has done very well.


With Children

This project is about a child being bullied at school because she come from another country and she´s struggling with the English language. Absolutely heartbreaking and because the interviewee is a child it gets even more emotional. It´s a strong story. The fact that the interview is shot at the girls’ school could have raised some concerns since it involves children, but they´ve solved it well by not filming any of the other kids and still managed to make the visual work. What I am missing from this project is a strong social media strategy. From what I heard it´s being published in an Arabic newspaper. Bullying is a global problem and I believe ´With Children´ has the potential to reach a much broader audience if they use the power of Twitter, Facebook, Vimeo and YouTube for publishing.


Risky Business in the App Stores



Smartinsight: Percent time spent on mobile apps 2016.


The world is mobile and applications are for people on the go. Mobile apps have revolutionised the way we use our smartphones. These days we have an app for everything. In this post, I will discuss some of the risky sides of downloading mobile apps. I Myself have over 75 Apps on my iPhone. Most of them I´ve had for years and they are hardly ever used.

The number of apps continues to grow. As of March 2017, according to Statista, Android users were able to choose between 2.8 million apps while Apple’s App Store remained the second-largest app store with 2.2 million available apps.

“Applications for mobile platforms are being developed at a tremendous rate, but often without proper security implementation. Insecure mobile applications can cause serious information security and data privacy issues and can have severe repercussions on users and organisations alike.”

The mentality of the developers is to build more apps before the competitors build them. Security isn´t thought off.

“Application risk is increasing because we’re doing more and more applications on our devices,” – Chris Wysopal, CTO and Cofounder of Veracode.

Every time you´re adding an application to your device there´s a potential risk that the app either has malicious functionality with intend to trick you into downloading what you see but instead you´re getting something you didn´t ask for. It could also be a poorly coded app which leaks information because of the way it transfers and stores data in the clear and sends your private information up to an add network. The developer thinks they´re doing a good job, but they´re actually putting your data at risk, Wysopal goes on.

If the developer doesn´t build the app correctly the operating system isn´t going to protect the user. In other words; all the data on your device, personal data, your address book, your photos etc. is at risk.

Apps shouldn´t be able to access contact information without disclosing it first with the user. When you download an App you agree to the terms and conditions to let the app access other parts of your phone. Have you ever asked yourself why a simple gaming or weather app needs access to your Wi-Fi, contact list or camera?

The more apps you add to you phone the higher risk you put yourself in.

After researching this topic it´s safe to say that the number of apps on my phone has rapidly decreased.


Jain, A.K. & Shanbhag, D.. (2012). Addressing Security and Privacy Risks in Mobile Applications. Available: https://pdfs.semanticscholar.org/aa53/1e41c4c646285b522cf6f33f82a9d68d5062.pdf. Last accessed 23rd May 2017.

Spark, D. (2012). The Causes of Mobile Application Risk. Available: https://www.tripwire.com/state-of-security/security-data-protection/the-causes-of-mobile-application-risk/. Last accessed 24th May.

-. (2017). Number of apps available in leading app stores as of March 2017. Available: https://www.statista.com/statistics/276623/number-of-apps-available-in-leading-app-stores/. Last accessed 21st May 2017.

Security issues with IoT





The Internet Of Things (IoT) refers to devices that collect and transmit data via the internet. But how does the IOT impact our security?

Anything that can be connected, will be connected. In 2008, there were already more objects connected to the internet than people. By 2020 there will be an estimated 50-200 billion connected devices,  According to Behmann & Wu.

Spamming is already a widely known problem on the Internet and could also affect the IoT. For example, criminals could change EPCs, so that tags point to banner ads instead of an ONS server, which would result in revenue for the spammer for each tag read (Weber & Weber 2010).

“As an industry, the IoT has failed to make it clear that if you put software on something attackable and connect it, it’s exposed. We have to aggressively and sanely excel the benefits of connected devices, while mitigating the risks. If we move too fast in developing new IoT applications, but don’t make security a paramount consideration, we’re leaving ourselves vulnerable for massive breaches with massive consequences.”

With billions of devices connected together security becomes a big issue.

The IoT holds great promise for cybercriminals who can use our homes´ routers, televisions, refrigerators, and other Internet-connected devices to launch large and distributed attacks. Internet-enabled devices represent an enormous threat because they are easy to penetrate, consumers have little incentive to make them more secure, the rapidly growing number of devices can send malicious content almost undetected, few vendors are taking steps to protect against this threat, and the existing security model simply will not work to solve the problem (Behmann & Wu 2015). Do not buy devices which have default passwords. Once you connect the device is exposed on the internet so anyone could find an address to a machine and connect to it and do whatever they please.

All IoT devices should have authentication. The password needs to be unique for every device so only the owner can log into it. Every IoT device should use encryption while uploading to the cloud, sharing data etc. so only the people that are meant to are getting the information. Protect your privacy. we don´t want these IoT devices to reveal things about where they are or who the owner is and how long they´ve been running. That sort of information needs to be hidden so only the right people can see it.

Attacks launched using IoT devices

We´ve already heard stories of Malware which searches for IoT devices and tries to take them over. Why is it so simple to do this? Computers have built-in security features, they have firewalls and antiviruses. But all these IoT devices have no security what so ever and most of them have a default access. In other words, the same set of password for all the devices from the manufacturer. If I buy a coffee maker and connect it to my Wi-Fi my new IoT device is exposed to the internet. Every IoT device has some sort of mini-computer inside it. Hackers are able to take over and use the device to launch DDoS attacks. Therefore, reasonable security measures need to be made.



Behmann, F & Wu, K (2015). Collaborative Internet of Things (C-IoT): For Future Smart Connected Life and Business. United Kingdom: John Wiley & Sons Ltd. 7-36.

Beaver, K & Rouse, M. (-). distributed denial of service (DDoS) attack. Available: http://searchsecurity.techtarget.com/definition/distributed-denial-of-service-attack. Last accessed 13th May 2017.

Hanson, J. (2015). Internet of Things Security Risks and Challenges. Available: https://www.pubnub.com/blog/2015-06-05-internet-of-things-security-risks-and-challenges/. Last accessed 11th May 2017.

Weber, R.H. & Weber , R (2010). Internet of Things Legal Perspectives . London, New York: Springer. 44.

-. (2016). DDoS Attack Against Dyn Managed DNS Incident Report for Dyn, Inc.. Available: https://www.dynstatus.com/incidents/nlr4yrr162t8. Last accessed 12th May 2017.

-. (-). Big Data and the Internet of Things. Available: https://www.infragistics.com/community/blogs/mobileman/archive/2015/12/15/big-data-and-the-internet-of-things.aspx. Last accessed 12th May 2017.