Case Studies of Media Use Among Lower-Income Minority Youth And

Total Page:16

File Type:pdf, Size:1020Kb

Case Studies of Media Use Among Lower-Income Minority Youth And COMMON SENSE RESEARCH CONNECTION AND CONTROL: Case Studies of Media Use Among Lower-Income Minority Youth and Parents CONNECTION AND CONTROL: Case Studies of Media Use Among Lower-Income Minority Youth and Parents Common Sense Research Introduction 3 Methods 5 Key Insights 7 Carla and Jaden: A Brother-Sister Team 12 Andre: A Video Gamer and a Reader 18 Makayla: Reading as Part of a “Weird” Identity 22 Gabe and Samuel: Brothers 26 Markus: A Video Gamer with Equipment “Limitations” 34 Jayla: ”This Lady Blows Up My Phone” 38 Jasmine: Living in Two Worlds 42 Chris: Media Practices Through a Transition 46 Zara: ”I Got Clout” 50 Conclusions 55 References 61 Appendixes 62 Appendix A: Screening Tool . 62 The case studies were conducted with support from the Thrive Foundation for Youth. Appendix B: Youth Media Practices Interview Protocol . .63 Appendix C: Youth “Device Tour” Guide. 64 Appendix D: Parent/Guardian Media Practices Interview Protocol . 65 Appendix E: Experience Sampling Protocol . 65 www.thrivefoundation.org CONNECTION AND CONTROL:CASE STUDIES OF MEDIA USE © COMMON SENSE MEDIA INC. 2016. ALL RIGHTS RESERVED. AMONG LOWER-INCOME MINORITY YOUTH AND PARENTS 1 INTRODUCTION Board of Directors 66 Media experiences and practices among youth are often The recent Common Sense Census: Media Use by Teens and Tweens discussed as if children were a monolithic group. However, the (2015) (referred to as the Census throughout this report) ways in which youth use media are far more complicated and examines the full range of youth media use, including where, how Board of Advisors 67 varied. Simply put, different youth use media differently, often, and in what contexts youth engage with media. Some depending on their age, living circumstances, interests, access, striking results emerged from this study, including the finding that and a range of other considerations. Despite the temptation to teens (13- to 18-year-olds) spend an average of about nine hours label children’s media use as “screen time,” it is inaccurate to a day using media, excluding for homework and in-school use. Yet lump together different forms of screen media use, because each the range of hours is quite broad (from no time at all to over 10 serves different needs. It also would be a mistake to assume that hours), and what precisely these teens are doing during these there is a “typical teen media user” given the many reasons teens hours varies tremendously. The Census also reveals striking engage with media and the varied contexts in which media use information about the digital equality gap between higher- and occurs. Youth watch videos, play games, interact with friends, lower-income families: For instance, over 90 percent of youth in take and share photos, create art, and engage in many other higher-income families have a laptop in the home while just over activities using media and technology. Statistics are helpful for 50 percent of kids in lower-income families do. Youth from painting a broad portrait of youth media use, but case studies can lower-income families also are less likely to have access to a be instrumental in understanding the stories and lives of youth, smartphone or a tablet. Furthermore, lower-income youth and and they can provide a window into what teens’ media use reveals minority youth spend more hours with digital media than their about their development. In this report, we delve into the real higher-income counterparts. Teens from lower-income families lives behind the numbers to understand the “what” and “why” of spend more time with media than those from higher-income the significantly higher hours spent by lower-income minority families: 10 hrs. and 35 mins. (10:35) vs. seven hrs. and 50 mins. youth on media. Responding to recent findings, we focus on (7:50) of total media use. Moreover, the Census indicates African-American and Latino youth in lower-income households. differences across race/ethnicity in media use that we examine. TABLE 1. TWEEN MEDIA PROFILES* Video Social Mobile Heavy All Light Users Gamers Networkers Gamers Readers Viewers Percent of all tweens 100% 27% 23% 15% 14% 11% 10% Total screen media 4:36 1:35a 6:42b 7:54b 4:48c 1:34a 5:55b Total media 5:55 2:16a 7:41b 9:59b 6:17c 3:44d 7:15bc Average time per day with each media activity: a b b c a d Watching TV/DVDs/videos 2:26 1:05 3:00 3:12 2:26 1:00 5:08 a b c d a a Playing games 1:19 :18 3:06 1:12 1:57 :18 :29 a b c a a a Video :35 :04 2:10 :24 :04 :02 :03 Computer :11 :08 :16 :10 :09 :09 :20 a b b c a a Mobile :33 :06 :41 :39 1:44 :07 :06 a ac b c ac ac Listening to music :51 :33 :45 1:44 :48 :36 :50 a b b b c b Reading :29 :09 :17 :21 :43 1:35 :31 Using social media :16 — — 1:43 — — — Note: A dash (“—”) indicates that the mean is zero minutes by definition of the media type. Superscripts are used to denote whether differences between groups are statistically significant (p<.05). Items with different superscripts differ significantly. Items that do not have a superscript, or that share a common superscript, do not differ significantly. * Common Sense Media, 2015 CONNECTION AND CONTROL:CASE STUDIES OF MEDIA USE CONNECTION AND CONTROL:CASE STUDIES OF MEDIA USE 2 AMONG LOWER-INCOME MINORITY YOUTH AND PARENTS © COMMON SENSE MEDIA INC. 2016. ALL RIGHTS RESERVED. © COMMON SENSE MEDIA INC. 2016. ALL RIGHTS RESERVED. AMONG LOWER-INCOME MINORITY YOUTH AND PARENTS 3 TABLE 2. TEEN MEDIA PROFILES* Heavy Gamers/ Social METHODS All Light Users Viewers Computer Users Readers Networkers Percent of all teens 100% 32% 26% 20% 13% 10% Total screen media 6:40 2:26a 13:20c 6:57b 3:00d 7:03b Total media 8:56 3:40a 16:24c 9:17b 5:58d 9:34b The report is based on 11 case studies (Stake, 2006) of ages of 11 and 15 with free and reduced lunch status. We focused Average time per day with each media activity: African-American and Latino teens between the ages of 11 and 15 on a restricted age group (by comparison, the Census looks at a b c c c Watching TV/DVDs/videos 2:38 1:09 6:24 1:34 1:22 1:34 from households receiving free and reduced lunch. We used 8- to 18-year-olds) so that we could better compare participants a b c ac bc Listening to music 1:54 1:15 2:40 1:59 1:32 2:16 quasi-ethnographic research methods, designed to gain depth of with each other analytically. Following our protocol, we began by a b b a a Playing games 1:21 :32 2:11 2:27 :30 :44 understanding of youth media practices, not breadth or obtaining parental consent before asking youth any study-related a b b a a Video :37 :18 :57 1:12 :12 :12 generalization (Patton, 2002). This type of methodology, in which questions. a b the focus is on a detailed investigation and analysis of a small Computer :19 — :28 1:00 — — We used purposeful and snowball sampling to recruit one to two a b a ac bc group of participants, is particularly suited to our research Mobile :25 :14 :46 :15 :18 :31 participants of different media types while also maintaining a a b c d e questions, which focus on the participants’ perspectives and the Using social media 1:11 :15 2:09 :53 :20 3:17 relatively equal number of boys and girls. Interviews were processes that undergird media use. Data were collected between Reading :28 §a :32b :29b 1:31c :22b scheduled either in the family’s home, at Kids’ Rec, or, for one June 13, 2016, and August 12, 2016. family, over Skype, to respect the schedules of the participants § Less than one minute but greater than zero. * Common Sense Media, 2015 Site and Participant Recruitment and Selection. Participants were and the living situation of each family (e.g., whether they had a Note: A dash (“—”) indicates that the mean is zero minutes by definition of the media type. Superscripts are used to denote whether differences between groups are recruited from three branches of a regional nonprofit organization single-family apartment or a shared living space). Some statistically significant (p<.05). Items with different superscripts differ significantly. Items that do not have a superscript, or that share a common superscript, do not (given the pseudonym “Kids’ Rec” here and throughout the interviews took place on a single day, while others were spread differ significantly. report) that serves children and youth primarily through across two or three days. When data collection concluded, For instance, African-American teens use an average of 11:10 of understand which devices they use and which activities they after-school and summer activities. All branches were in a parents and children were each given a gift card ($20 and $30 media a day compared with 8:51 among Latinos and 8:27 among engage in, how they use their devices, and the meanings they and metropolitan area in the mid-Atlantic. We recruited local site respectively) to thank them for their participation. whites. There is a significant overlap in the U.S. among the their parents draw from media use. These portraits reveal the directors, each of whom helped us recruit youth between the demographic factors of income and race/ethnicity, which is complexity of their media practices and, perhaps most striking, reflected in the Census.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • A Survey of Food Blogs and Videos: an Explorative Study Lynn Schutte University of South Carolina, [email protected]
    University of South Carolina Scholar Commons Senior Theses Honors College Spring 2018 A Survey of Food Blogs and Videos: An Explorative Study Lynn Schutte University of South Carolina, [email protected] Follow this and additional works at: https://scholarcommons.sc.edu/senior_theses Recommended Citation Schutte, Lynn, "A Survey of Food Blogs and Videos: An Explorative Study" (2018). Senior Theses. 229. https://scholarcommons.sc.edu/senior_theses/229 This Thesis is brought to you by the Honors College at Scholar Commons. It has been accepted for inclusion in Senior Theses by an authorized administrator of Scholar Commons. For more information, please contact [email protected]. Abstract 2 Introduction 3 Methods 6 Results 7 Discussion 10 References 14 Appendices 15 Appendix 1: Summary Guidelines 15 1.1 Video Summary Guidelines 15 1.2 Blog Summary Guidelines 15 Appendix 2: Codebooks 16 2.1 Video Codebook 16 2.2 Blog Codebook 18 1 Abstract This study aimed to explore what types of food blogs and videos exist, what their common practices are and their popularity levels. Through a content analysis of four videos or posts from 25 different producers or blogs, respectively, a total of 200 pieces of content were coded and analyzed. The coding focused on main ingredients, sponsorship, type of video or post and number of views or comments. It was found that blogs were written for a specific audience, in terms of blog types, while video producers were more multi‑purpose. This could be because of sampling method or because blogs are often sought after, while videos tend to appear in viewers’ timelines.
    [Show full text]
  • Is Our Privacy Being Compromised As We Speak? Eavesdropper's Heaven
    IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.10, October 2017 119 Is our privacy being compromised as we speak? Eavesdropper’s heaven or a nightmare? A study of Mobile Voice over Internet Protocol (mVoIP) and Instant Messaging (IM) Applications. Farhan Ahmed Muhammad Ahsan Muhammad Saeed Nasir Touheed Siddiqui Najam Department of Computer Department of Computer Department of Computer Department of Computer Science, University of Science, IBA Karachi Science, University of Science, University of Karachi Pakistan Karachi Karachi Karachi, Pakistan Karachi, Pakistan Karachi, Pakistan Abstract around these applications, these two key areas are not at all In the recent times, mobile voice over internet protocol (mVoIP) explored and there are only a handful of studies if at all applications have been greatly adopted by the masses and have which examine aspect of these so called “perfect really captured much of the attention in the application market applications”. Majority of the people who use these place. These applications not only provide voice communication applications aren’t even aware of the fact that anyone can with little to no cost but also offer instant messaging service. basically intercept their communication and if the People across the world use applications like this and some even communicate daily with others just by using these applications communication is not encrypted, can easily read and misuse rather than the conventional way of text messages and GSM calls. their information. Other than this, is the communication With applications consolidating millions and millions of users, encrypted at the servers or is the privacy of the user in the security and privacy is a topic which many prefer not to discuss.
    [Show full text]
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Learn How to Use Google Reviews at Your Hotel
    Learn How to Use Google Reviews at your Hotel Guide Managing Guest Satisfaction Surveys: Best Practices Index Introduction 2 Can you explain Google’s rating system? 3 What’s different about the new Google Maps? 5 Do reviews affect my hotel’s search ranking? 6 How can we increase the number of Google reviews? 7 Can I respond to Google reviews? 8 Managing Guest Satisfaction1 Surveys: Best Practices Introduction Let’s be honest, Google user reviews aren’t very helpful And then there’s the near-ubiquitous “+1” button, a way when compared to reviews on other review sites. for Google+ users to endorse a business, web page, They’re sparse, random and mostly anonymous. You photo or post. can’t sort them, filtering options are minimal, and the rating system is a moving target. These products are increasingly integrated, allowing traveler planners to view rates, availability, location, But that’s all changing. photos and reviews without leaving the Google ecosystem. Reviews and ratings appear to play an increasingly critical role in Google’s master plan for world domination This all makes Google reviews difficult to ignore—for in online travel planning. They now show prominently in travelers and hotels. So what do hotels need to know? In Search, Maps, Local, Google+, Hotel Finder and the this final instalment in ReviewPro’s popular Google For new Carousel—and on desktops, mobile search and Hotels series, we answer questions from webinar mobile applications. attendees related to Google reviews. Managing Guest Satisfaction2 Surveys: Best Practices Can you Explain Google’s Rating System? (I) Registered Google users can rate a business by visiting its Google+ 360° Guest Local page and clicking the Write a Review icon.
    [Show full text]
  • Technology Requirements for Using Video Conferencing with Victims
    Technology Requirements for Using Video Conferencing with Victims Videoconferencing can offer survivors an alternative way to meet with a provider or counselor. For survivors who lack transportation or live too far from a program or counselor, videoconferencing may be the only way they can obtain medical, legal, or trauma-informed therapy. There are several free or low cost (if upgraded) web-based conference services, each with different advantages and technical requirements. (For more information on safety and privacy considerations when using video conferencing, read “Tips for Using Video Conferencing for Victim Services.”) Types of Web-Based Services and Technical Requirements There are many factors to consider when choosing a web-based video conferencing system, including cost, operating systems, whether calls can be recorded, and how many people can be on a call at the same time. All web-conferencing systems require a connection to the Internet and can be used with either Windows or Mac. The systems reviewed here include Skype, Google Hangouts, Oovoo, Gruveo, and Zoom. Note that the systems reviewed here are available for free or for minimal costs. Some paid-for services may offer more features, security, and privacy. An important consideration in choosing a web-based conferencing system is the degree to which data is encrypted. This means whether data is encrypted indicating no one but the users can access the data or whether the data can be viewed and accessed by the service provider. This may be critical should the service provider receive a subpoena for your data. All of the systems below offer instant messaging, in-call chat, an unlimited number of meetings, and a telephone call-in option while video conferencing.
    [Show full text]
  • Table of Contents
    2016-2017 PARENT-STUDENT HANDBOOK De Smet Jesuit High School 233 North New Ballas Road Creve Coeur, MO 63141 (314) 567-3500 www.desmet.org DE SMET JESUIT HIGH SCHOOL Parent and Student Handbook Dear Parents: Your knowledge of the information in the Student and Parent Handbook is essential for the efficient operation of the school. Please review this handbook and discuss the guidelines with your son. Each student and his parents must sign a copy of the signature form (that your son will receive the first day of school) and return it to his homeroom teacher. Signing this form indicates that both the student and his parents have read the handbook, including policies regarding acceptable use of computers, and agree to abide by these policies. Additionally, signing this signature page acknowledges your legal and financial responsibility to De Smet Jesuit High School. Also, in an effort to communicate more efficiently, De Smet Jesuit requires at least one current parent/guardian e-mail address. Your son is to return this signed form to his homeroom teacher during the first full week of school. Friday, August 26, 2016 is the deadline. Students will be removed from the De Smet Jesuit network if they have not returned this form by August 26, 2016. There may be a 24-48 hour delay in receiving network privileges if a signed agreement is returned after that date. Additionally, an electronic version of this handbook is available at www.desmet.org. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - HANDBOOK AND COMPUTER POLICY SIGNATURE FORM __________________________________ ________________________________ NAME OF STUDENT (PLEASE PRINT) SR / JR / SO / FR ___________________________________ ______________ ______________ STUDENT SIGNATURE HOMEROOM STUDENT NO.
    [Show full text]
  • Should Google Be Taken at Its Word?
    CAN GOOGLE BE TRUSTED? SHOULD GOOGLE BE TAKEN AT ITS WORD? IF SO, WHICH ONE? GOOGLE RECENTLY POSTED ABOUT “THE PRINCIPLES THAT HAVE GUIDED US FROM THE BEGINNING.” THE FIVE PRINCIPLES ARE: DO WHAT’S BEST FOR THE USER. PROVIDE THE MOST RELEVANT ANSWERS AS QUICKLY AS POSSIBLE. LABEL ADVERTISEMENTS CLEARLY. BE TRANSPARENT. LOYALTY, NOT LOCK-IN. BUT, CAN GOOGLE BE TAKEN AT ITS WORD? AND IF SO, WHICH ONE? HERE’S A LOOK AT WHAT GOOGLE EXECUTIVES HAVE SAID ABOUT THESE PRINCIPLES IN THE PAST. DECIDE FOR YOURSELF WHO TO TRUST. “DO WHAT’S BEST FOR THE USER” “DO WHAT’S BEST FOR THE USER” “I actually think most people don't want Google to answer their questions. They want Google to tell them what they should be doing next.” Eric Schmidt The Wall Street Journal 8/14/10 EXEC. CHAIRMAN ERIC SCHMIDT “DO WHAT’S BEST FOR THE USER” “We expect that advertising funded search engines will be inherently biased towards the advertisers and away from the needs of consumers.” Larry Page & Sergey Brin Stanford Thesis 1998 FOUNDERS BRIN & PAGE “DO WHAT’S BEST FOR THE USER” “The Google policy on a lot of things is to get right up to the creepy line.” Eric Schmidt at the Washington Ideas Forum 10/1/10 EXEC. CHAIRMAN ERIC SCHMIDT “DO WHAT’S BEST FOR THE USER” “We don’t monetize the thing we create…We monetize the people that use it. The more people use our products,0 the more opportunity we have to advertise to them.” Andy Rubin In the Plex SVP OF MOBILE ANDY RUBIN “PROVIDE THE MOST RELEVANT ANSWERS AS QUICKLY AS POSSIBLE” “PROVIDE THE MOST RELEVANT ANSWERS AS QUICKLY
    [Show full text]
  • School District Earns Top Scores: Ranked 3
    The Serving our Community Since 1888 Item Municipal positions filled. August 31, 2006 New faces in DPW, construction departments. Page A2. 75 cents weekly of Millburn and Short Hills www.theitemonline.com EDUCATION School district earns top scores: ranked 3 By Harry Trumbore Child Left Behind Act (NCLB). At percent participation rate for each Brodow said the figure should ly guarded reviewing the New Jer- School during the 2004-05 school ofTheItem the same time, more than a quarter grade at the school. be 100 percent for the middle sey Monthly rankings, which year was 16.6 pupils. The average of the state’s 2,422 schools did not In Millburn, all five elementary school as well. appear in the magazine’s Septem- SAT score was 1,232 and the per- Although the new school year achieve AYP and have been placed schools, the middle school and Although he was pleased with ber issue. He said he could not see centage of students achieving doesn’t begin until next week, Mill- on an early warning list. Should high school met proficiency and Millburn’s perfect grades in the how the criteria determined the advanced proficiency on the burn public schools already have they fail to achieve AYP for two participation targets in standard- state reports, the superintendent final rankings and asked what the HSPA was 62 percent. Approxi- earned high grades on several years in a row, they are labeled ized tests administered last spring. remained guarded in his appraisal difference is between being ranked mately 95 percent score 3 or high- fronts.
    [Show full text]
  • JAPAN CUTS: Festival of New Japanese Film Announces Full Slate of NY Premieres
    Media Contacts: Emma Myers, [email protected], 917-499-3339 Shannon Jowett, [email protected], 212-715-1205 Asako Sugiyama, [email protected], 212-715-1249 JAPAN CUTS: Festival of New Japanese Film Announces Full Slate of NY Premieres Dynamic 10th Edition Bursting with Nearly 30 Features, Over 20 Shorts, Special Sections, Industry Panel and Unprecedented Number of Special Guests July 14-24, 2016, at Japan Society "No other film showcase on Earth can compete with its culture-specific authority—or the quality of its titles." –Time Out New York “[A] cinematic cornucopia.” "Interest clearly lies with the idiosyncratic, the eccentric, the experimental and the weird, a taste that Japan rewards as richly as any country, even the United States." –The New York Times “JAPAN CUTS stands apart from film festivals that pander to contemporary trends, encouraging attendees to revisit the past through an eclectic slate of both new and repertory titles.” –The Village Voice New York, NY — JAPAN CUTS, North America’s largest festival of new Japanese film, returns for its 10th anniversary edition July 14-24, offering eleven days of impossible-to- see-anywhere-else screenings of the best new movies made in and around Japan, with special guest filmmakers and stars, post-screening Q&As, parties, giveaways and much more. This year’s expansive and eclectic slate of never before seen in NYC titles boasts 29 features (1 World Premiere, 1 International, 14 North American, 2 U.S., 6 New York, 1 NYC, and 1 Special Sneak Preview), 21 shorts (4 International Premieres, 9 North American, 1 U.S., 1 East Coast, 6 New York, plus a World Premiere of approximately 12 works produced in our Animation Film Workshop), and over 20 special guests—the most in the festival’s history.
    [Show full text]
  • Vintage Game Consoles: an INSIDE LOOK at APPLE, ATARI
    Vintage Game Consoles Bound to Create You are a creator. Whatever your form of expression — photography, filmmaking, animation, games, audio, media communication, web design, or theatre — you simply want to create without limitation. Bound by nothing except your own creativity and determination. Focal Press can help. For over 75 years Focal has published books that support your creative goals. Our founder, Andor Kraszna-Krausz, established Focal in 1938 so you could have access to leading-edge expert knowledge, techniques, and tools that allow you to create without constraint. We strive to create exceptional, engaging, and practical content that helps you master your passion. Focal Press and you. Bound to create. We’d love to hear how we’ve helped you create. Share your experience: www.focalpress.com/boundtocreate Vintage Game Consoles AN INSIDE LOOK AT APPLE, ATARI, COMMODORE, NINTENDO, AND THE GREATEST GAMING PLATFORMS OF ALL TIME Bill Loguidice and Matt Barton First published 2014 by Focal Press 70 Blanchard Road, Suite 402, Burlington, MA 01803 and by Focal Press 2 Park Square, Milton Park, Abingdon, Oxon OX14 4RN Focal Press is an imprint of the Taylor & Francis Group, an informa business © 2014 Taylor & Francis The right of Bill Loguidice and Matt Barton to be identified as the authors of this work has been asserted by them in accordance with sections 77 and 78 of the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this book may be reprinted or reproduced or utilised in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers.
    [Show full text]
  • Vertical Integration and Antitrust in Search Markets
    Vertical Integration and Antitrust in Search Markets Lesley Chiou∗ y April 7, 2016 Abstract Antitrust regulators are concerned that vertical integration may allow a dominant firm in one market to lever market power into another market, and a broad theoretical literature has developed to show that in fact, the effects of vertical integration on other firms in the market are ambiguous. This paper studies how a dominant search engine Google in the upstream market of Internet search enters into different downstream markets. I find that Google's vertical integration either decreases or increases clicks to other sites, depending upon whether firms compete in pricing or quality and whether consumers are very price-sensitive. The results have direct public policy implications as regulators determine antitrust policy in newly emerging markets. JEL classification: L40, L86 Keywords: antitrust, tying, online, Internet, consumer search, vertical integration, Google ∗Economics Department, Occidental College, CA yI thank Emek Basker, Benjamin Edelman, Joanna Lahey, and Catherine Tucker for valuable comments and feedback. I would like to thank Mary Bemis, Jessica May, and Anthony Quach for excellent research assistance. 1 1 Introduction The organization of production has long attracted the attention of economists and regulators across a broad range of industries. A rich theoretical literature has illustrated that the economic consequences of a firm’s boundaries can be ambiguous. On one hand, if a firm provides both the upstream and downstream products, the firm may use dominance in one market to leverage market power into another market (Whinston, 1990; Carlton and Waldman, 2002). Antitrust regulators are concerned that a vertically integrated firm may foreclose rivals by raising their costs.
    [Show full text]