Dissertations / Theses on the topic 'Censorship'

To see the other types of publications on this topic, follow the link: Censorship.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Censorship.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Reineke, Jason Bernard. "Censorship and the individual: an examination of support for public censorship, self-censorship, and personality." The Ohio State University, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=osu1302885908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Winter, Philipp. "Measuring and circumventing Internet censorship." Doctoral thesis, Karlstads universitet, Institutionen för matematik och datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-34475.

Full text
Abstract:
An ever increasing amount of governments, organisations, and companies employ Internet censorship in order to filter the free flow of information.  These efforts are supported by an equally increasing number of companies focusing on the development of filtering equipment. Only what these entities consider right can pass the filters. This practice constitutes a violation of the Universal Declaration of Human Rights and hampers progress.  This thesis contributes novel techniques to measure and to circumvent Internet censorship. In particular, we 1) analyse how the Great Firewall of China is blocking the Tor network by using active probing techniques as well as side channel measurements, we 2) propose a concept to involve users in the process of censorship analysis, we 3) discuss the aptitude of a globally-deployed network measurement platform for censorship analysis, and we 4) propose a novel circumvention protocol. We attach particular importance to practicality and usability. Most of the techniques proposed in this thesis were implemented and some of them are deployed and used on a daily basis.  We demonstrate that the measurement techniques proposed in this thesis are practical and useful by applying them in order to shed light on previously undocumented cases of Internet censorship. We employed our techniques in three countries and were able to expose previously unknown censorship techniques and cooperation between a corporation and a government for the sake of censorship. We also implemented a circumvention protocol which was subsequently deployed and is used to evade the Great Firewall of China.
APA, Harvard, Vancouver, ISO, and other styles
3

Barbieri, Maria. "Film censorship in Hong Kong." Thesis, Hong Kong : University of Hong Kong, 1997. http://sunzi.lib.hku.hk/hkuto/record.jsp?B1947118X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Thünken, Florian. "Internet Censorship in China Recent Developments and Perception of Internet Censorship by Chinese Internet Users /." Würzburg : Univ., Inst. für Kulturwissenschaften Ost- und Südasiens - Sinologie, 2008. http://www.opus-bayern.de/uni-wuerzburg/volltexte/2009/3444/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wong, Marcelle. "Censorship in late nineteenth century Britain." Thesis, University of Edinburgh, 2009. http://hdl.handle.net/1842/25332.

Full text
Abstract:
In his 1859 work, On Liberty, John Stuart Mill asserts that ‘[i] in our times, from the highest class of society down to the lowest, every one lives as under the eye of a hostile and dreaded censorship.’ For Mill, this censorship was implemented not by official institutions, but by social opprobrium, by a less explicit, but no less devastating public opinion. My thesis provides an account of late nineteenth century censorship that does not rely on traditional dichotomised models. These models present censorship as a Manichaean struggle between an aggressive regulatory mechanism that is more diffused and mobile than such rigid binaries suggest. I look at instances of censorship in literature, the visual arts, and other disciplinary fields, placing them in wider social, political, cultural, and intellectual contexts. I take into account recent scholarship which has challenged traditional models on theoretical grounds. These recent developments are useful for investigating particular instances of censorship, but conversely, these instances, despite their specificity, can also provide insights into, and elucidation of, the theories themselves. By moving beyond a state understanding of censorship as silencing and repression, I redress conventional assumptions about Victorian society and popular myths of a draconian regime, while also reassessing the concept of censorship itself.
APA, Harvard, Vancouver, ISO, and other styles
6

Needham, T. "Two problems relating to cosmic censorship." Thesis, University of Oxford, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.379862.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mantell, Emily. "Political Art Censorship: A Productive Power." Ohio University Honors Tutorial College / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ouhonors1492785190400738.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Passannanti, Erminia. "Italian cinema and censorship by religion." Thesis, Brunel University, 2014. http://bura.brunel.ac.uk/handle/2438/13863.

Full text
Abstract:
This thesis discusses clerical censorship against the film industry as a phenomenon encompassing questions of popular education and mass culture, power formation, and ideological struggles. It argues that clerical censorship should be understood not as the undertaking to simply make sins less attractive, in films, but as the Church's efforts to influence the state and police force, magistrates, or government censorship boards to prohibit or remove certain films’ offensive contents, which are believed to be ideologically contrary to the Church’s doctrine. The financial, political and legal sanctions called in force by Church censorship surely go beyond the idea of moral reprimand recommend by the Catholic teachings. They put in action what Gramsci called culturally influential ‘hegemony’. In particular, film boycott will be flagged out as that method which empowers the clergy (composed of high prelates, clergymen, and nuns) to influence their followers (flock of souls) to not even consider watching films, containing representations and ideas unapproved of by the Pope. In implementing its control techniques, by means of its reticular system, the church edits indexes, which set criteria for condemning and banning as ‘immoral’ and ‘harmful’, artistic products and ideological ideas, which threaten its theological standpoints. In this sense, the Catholic’s habit to set film ratings and spread public shaming may be said to contribute towards Church censorship as a wide-ranging practice. In consideration of the fact that the various forms of influence and control over the Catholic communities, exercised at local and national level by the clergy in parish churches, communities, schools, associations, and through the media, are acknowledged in this thesis as methods of clerical censorship, I also discuss the action and the militancy of self-appointed censors of Catholic background, who align themselves with the existing governmental censorship boards. In particular, this thesis conducts and examination of how filmmakers, producers, and distributors may at times witness their films being totally suppressed by state and church censorship, and at others, manage to bypass the trouble of compliance with censorship regulations by negotiating ploys to escape severe confrontation in the field of legal censorship. To reveal facts hidden behind the nation’s façade of liberalism and progressivism, this thesis addresses the conceptions behind constitutional/legal censorship and Church censorship. I demonstrate how the power of film censorship located in the nation's major centres of power, the judiciary and the religious, exercise double-edged forms of censorship, using their authority to influence society and individuals. A focus will be placed on recent reforms, which have aptly solved this impasse, and secured larger margins of freedom for the Italian film industry. Indeed, as my argument supports, cinema, as an art form, is also highly fertile in ideological and artistic dissidence against censorial forms of state and church, which attempts to influence and at times limit both the artists' expressive freedom and the audience's right to be entertained and informed.
APA, Harvard, Vancouver, ISO, and other styles
9

Beck, Brian Douglas. "Self-Censorship in Rural Weekly Newspapers." Thesis, The University of Arizona, 1996. http://hdl.handle.net/10150/292239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fifield, David. "Threat Modeling and Circumvention of Internet Censorship." Thesis, University of California, Berkeley, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10688573.

Full text
Abstract:

Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities—such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations.

My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements. Rather, let us state the assumptions about censor behavior atop which we build circumvention designs, and let those assumptions be based on an informed understanding of censor behavior.

APA, Harvard, Vancouver, ISO, and other styles
11

Feng, Guangchao. "A technical analysis of China's internet censorship." View the Table of Contents & Abstract, 2007. http://sunzi.lib.hku.hk/hkuto/record/B39573989.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Feng, Guangchao, and 馮廣超. "A technical analysis of China's internet censorship." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B39707283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Kozlowski, Lisa. "STUDENT CENSORSHIP IN THE SOCIAL WORK CLASSROOMS." CSUSB ScholarWorks, 2017. https://scholarworks.lib.csusb.edu/etd/459.

Full text
Abstract:
Through the evolution of the field of social work, a divide in its ideologies has emerged and certain political and ideological groups such as the religious and conservatives have become underrepresented. As a result, over the years the liberal philosophies have emerged as the dominant group. This has led to a decrease in diversity within the field. Recognition of biases in the field of social work is difficult. Through a qualitative analysis method, this study was meant to explore if social work students feel they are free to share openly in the classroom, and if they are accepting of all ideologies or are there biases towards any ideologies or beliefs by the students. This study used a qualitative method data collection approach, which consisted of a six-member focus group with a demographics questionnaire. The findings of this research has brought to the surface that there are more liberal ideologies and less moderate or conservative viewpoints being shared in the classrooms because of self-censorship. The potential impact of this study is to increase awareness that there are underrepresented groups within the MSW population, which decreases the diversity in the field of social work.
APA, Harvard, Vancouver, ISO, and other styles
14

Cohen, Mark 1966. "Just judgment : censorship of and in Canadian literature." Thesis, McGill University, 1999. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=35866.

Full text
Abstract:
This thesis is the first major study of censorship of and in English Canadian literature. While there are several reasons scholars have focused on censorship in Europe and the United States, it is the ascendancy in quality and quantity of Canadian writing leading to its further use in institutions where censorship takes place---such as schools and libraries---that necessitates a study of censorship in Canadian literature now. This rise in censorship has prompted Canadian authors increasingly to write about the subject. In this thesis I study censorship issues raised both explicitly md implicitly by Timothy Findley, Margaret Atwood, Margaret Laurence, Beatrice Culleton and Marlene Nourbese Philip. All of these writers have been subjected to censorship attacks and have responded to these attacks and grappled with the philosophical implications of censorship in their fiction and non-fiction. My investigation of censorship in these texts sheds new light on the works of literature themselves, but the literary texts also suggest a new way of looking at censorship. Each of my chapters offers arguments challenging the traditional Enlightenment model of censorship as an oppressive government practice against its citizens, a definition resulting in the mistaken views that censorship has been largely eradicated in the West and that, when it does surface, it is to be condemned on principle. This view can be contrasted with a "constructivist" model of censorship as the delegitimation of expression by social forces. My findings support a definition which draws on both models wherein censorship is the exclusion of some discourse as the result of a judgment by an authoritative agent based on some ideological predisposition. The key word in this definition is "judgment" which, when recognized as the primary activity in censorship, must change the way we approach censorship controversies. For if censorship is the exercise of judgment, and judgment is enmeshed in the fabric of huma
APA, Harvard, Vancouver, ISO, and other styles
15

Cohen, Mark. "Just judgment, censorship of and in Canadian literature." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0026/NQ50133.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Al-Hamad, M. Q. "Translation and censorship with special reference to Jordan." Thesis, University of Edinburgh, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.508440.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Colleoni, Marta. "Gravitational self-force and the weak cosmic censorship." Thesis, University of Southampton, 2016. https://eprints.soton.ac.uk/401825/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Rogers, M. J. "Private and censorship-resistant communication over public networks." Thesis, University College London (University of London), 2011. http://discovery.ucl.ac.uk/1322992/.

Full text
Abstract:
Society’s increasing reliance on digital communication networks is creating unprecedented opportunities for wholesale surveillance and censorship. This thesis investigates the use of public networks such as the Internet to build robust, private communication systems that can resist monitoring and attacks by powerful adversaries such as national governments. We sketch the design of a censorship-resistant communication system based on peer-to-peer Internet overlays in which the participants only communicate directly with people they know and trust. This ‘friend-to-friend’ approach protects the participants’ privacy, but it also presents two significant challenges. The first is that, as with any peer-to-peer overlay, the users of the system must collectively provide the resources necessary for its operation; some users might prefer to use the system without contributing resources equal to those they consume, and if many users do so, the system may not be able to survive. To address this challenge we present a new game theoretic model of the problem of encouraging cooperation between selfish actors under conditions of scarcity, and develop a strategy for the game that provides rational incentives for cooperation under a wide range of conditions. The second challenge is that the structure of a friend-to-friend overlay may reveal the users’ social relationships to an adversary monitoring the underlying network. To conceal their sensitive relationships from the adversary, the users must be able to communicate indirectly across the overlay in a way that resists monitoring and attacks by other participants. We address this second challenge by developing two new routing protocols that robustly deliver messages across networks with unknown topologies, without revealing the identities of the communication endpoints to intermediate nodes or vice versa. The protocols make use of a novel unforgeable acknowledgement mechanism that proves that a message has been delivered without identifying the source or destination of the message or the path by which it was delivered. One of the routing protocols is shown to be robust to attacks by malicious participants, while the other provides rational incentives for selfish participants to cooperate in forwarding messages.
APA, Harvard, Vancouver, ISO, and other styles
19

Weinberg, Zachary. "Toward Automated Worldwide Monitoring of Network-Level Censorship." Thesis, Carnegie Mellon University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13425933.

Full text
Abstract:

Although Internet censorship is a well-studied topic, to date most published studies have focused on a single aspect of the phenomenon, using methods and sources specific to each researcher. Results are difficult to compare, and global, historical perspectives are rare. Because each group maintains their own software, erroneous methods may continue to be used long after the error has been discovered. Because censors continually update their equipment and blacklists, it may be impossible to reproduce historical results even with the same vantage points and testing software. Because “probe lists” of potentially censored material are labor-intensive to compile, requiring an understanding of the politics and culture of each country studied, researchers discover only the most obvious and long-lasting cases of censorship.

In this dissertation I will show that it is possible to make progress toward addressing all of these problems at once. I will present a proof-of concept monitoring system designed to operate continuously, in as many different countries as possible, using the best known techniques for detection and analysis. I will also demonstrate improved techniques for verifying the geographic location of a monitoring vantage point; for distinguishing innocuous network problems from censorship and other malicious network interference; and for discovering new web pages that are closely related to known-censored pages. These techniques improve the accuracy of a continuous monitoring system and reduce the manual labor required to operate it.

This research has, in addition, already led to new discoveries. For example, I have confirmed reports that a commonly-used heuristic is too sensitive and will mischaracterize a wide variety of unrelated problems as censorship. I have been able to identify a few cases of political censorship within a much longer list of cases of moralizing censorship. I have expanded small seed groups of politically sensitive documents into larger groups of documents to test for censorship. Finally, I can also detect other forms of network interference with a totalitarian motive, such as injection of surveillance scripts.

In summary, this work demonstrates that mostly-automated measurements of Internet censorship on a worldwide scale are feasible, and that the elusive global and historical perspective is within reach.

APA, Harvard, Vancouver, ISO, and other styles
20

Winter, Philipp. "Enhancing Censorship Resistance in the Tor Anonymity Network." Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-30752.

Full text
Abstract:
Baksidestext The Tor network was originally designed as low-latency anonymity network.However, as the years progressed, Tor earned a reputation as also being a useful tool to circumvent Internet censorship. At times, the network counted 30,000 users only from China. Censors reacted by tightening their grip on the national communication infrastructure. In particular, they developed techniques to prevent people from being able to access the Tor network. This arms race now counts several iterations and no end is in sight. This thesis contributes to a censorship-resistant Tor network in two ways. First, it analyses how existing censorship systems work. In particular, the Great Firewall of China is analysed in order to obtain an understanding of its capabilities as well as to explore circumvention opportunities. Second, this thesis proposes practical countermeasures to circumvent Internet censorship. In particular, it presents a novel network protocol which is resistant to the Great Firewall's active probing attacks.
APA, Harvard, Vancouver, ISO, and other styles
21

Garry, Candi Pierce. "Selection or Censorship? School Librarians and LGBTQ Resources." Miami University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=miami1406589992.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Spilger, Erica L. Spilger. "Expression and Repression: Contemporary Art Censorship in America." Ohio University Honors Tutorial College / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ouhonors1524835404987482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Sorrie, Charles. "Censorship of the press in France 1917-1918." Thesis, London School of Economics and Political Science (University of London), 2014. http://etheses.lse.ac.uk/3110/.

Full text
Abstract:
This thesis examines the development and implementation of media control in France during the First World War. First it describes the evolution of the press control system between 1914 and 1916 and outlines its bureaucratic framework. The study then analyses the extent to which censorship of the press was useful in helping the French government achieve its aims during the particularly turbulent years of 1917 and 1918. The chapters are set out chronologically and contain sections that examine the role of censorship on a case by case basis. The last two years of the war have been chosen for special examination in this thesis because in 1917 and 1918 France’s war effort was increasingly strained simultaneously by both internal and external events. In 1917 France was threatened with rising war weariness, coinciding with the failed Nivelle Offensive, mutinies at the front and international calls for a negotiated peace settlement. In 1918, as Clemenceau began to rally the nation, France faced its most crucial enemy attack since the Marne in 1914. Most of the thesis focuses on censorship of newspapers in Paris. These papers not only had far larger ciculations than their provincial counterparts but often were read in the provinces more than were local papers. Finally by following a few papers specifically through these two years, it is possible to see the evolution of the way in which papers on the left, right and centre were monitored by the government. This thesis argues that France’s censorship system, while not perfect was effective in achieving the aims set out as its goals in 1914 by the War Ministry: to keep military secrets from the enemy and to help maintain public order.
APA, Harvard, Vancouver, ISO, and other styles
24

Naylor, A. P., Edward J. Dwyer, and L. B. Bliss. "Attitudes of Students in Education Classes Toward Censorship." Digital Commons @ East Tennessee State University, 1995. https://dc.etsu.edu/etsu-works/3311.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Dyer, Kevin Patrick. "Novel Cryptographic Primitives and Protocols for Censorship Resistance." PDXScholar, 2015. https://pdxscholar.library.pdx.edu/open_access_etds/2489.

Full text
Abstract:
Internet users rely on the availability of websites and digital services to engage in political discussions, report on newsworthy events in real-time, watch videos, etc. However, sometimes those who control networks, such as governments, censor certain websites, block specific applications or throttle encrypted traffic. Understandably, when users are faced with egregious censorship, where certain websites or applications are banned, they seek reliable and efficient means to circumvent such blocks. This tension is evident in countries such as a Iran and China, where the Internet censorship infrastructure is pervasive and continues to increase in scope and effectiveness. An arms race is unfolding with two competing threads of research: (1) network operators' ability to classify traffic and subsequently enforce policies and (2) network users' ability to control how network operators classify their traffic. Our goal is to understand and progress the state-of-the-art for both sides. First, we present novel traffic analysis attacks against encrypted communications. We show that state-of-the-art cryptographic protocols leak private information about users' communications, such as the websites they visit, applications they use, or languages used for communications. Then, we investigate means to mitigate these privacy-compromising attacks. Towards this, we present a toolkit of cryptographic primitives and protocols that simultaneously (1) achieve traditional notions of cryptographic security, and (2) enable users to conceal information about their communications, such as the protocols used or websites visited. We demonstrate the utility of these primitives and protocols in a variety of real-world settings. As a primary use case, we show that these new primitives and protocols protect network communications and bypass policies of state-of-the-art hardware-based and software-based network monitoring devices.
APA, Harvard, Vancouver, ISO, and other styles
26

Liu, Shuangquan. "Nonparametric tests for change-point problems with random censorship." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape15/PQDD_0003/NQ34803.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Lu, Jiang 1957. "Some advances of inferences in mixed censorship-truncation models." Thesis, McGill University, 1993. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=41692.

Full text
Abstract:
In this thesis, we are concerned with the asymptotic properties of kernel estimates with variable bandwidth in mixed censorship-truncation models. A new approach has been developed, and the asymptotic normality of the hazard rate estimator $ lambda sbsp{n}{(2)}(x),$ which has not been established even in complete data cases, is established. By the same method, we derive the asymptotic normality of other hazard estimates, such as $ lambda sbsp{n}{(1)}(x), lambda sbsp{n}{(3)}(x),$ and $ lambda sbsp{n}{(5)}(x),$ as well as the density estimator $ f sb{n}(x).$ The second part of this thesis is devoted to the strong consistency and rates of convergence of the estimates mentioned above; these results improve and extend the previous results in Schafer (1985), Mielniczuk (1986), and Uzunogullari and Wang (1992). Lastly, we consider the consistency of the estimates $ beta sb{n}$ and $ Lambda sb0$ in the general relative risk regression (GRRR) models. We also consider the identifiability of $ beta sb0$ in GRRR models, and prove that most GRRR models possess the same properties as in the Cox regression model, and therefore should be used more often in practice.
APA, Harvard, Vancouver, ISO, and other styles
28

Dyck, Karen Rhoads Van. "The poetics of censorship in Greek poetry since 1967." Thesis, University of Oxford, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.305898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Burnett, Samuel Read. "Empowering bystanders to facilitate Internet censorship measurement and circumvention." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52199.

Full text
Abstract:
Free and open exchange of information on the Internet is at risk: more than 60 countries practice some form of Internet censorship, and both the number of countries practicing censorship and the proportion of Internet users who are subject to it are on the rise. Understanding and mitigating these threats to Internet freedom is a continuous technological arms race with many of the most influential governments and corporations. By its very nature, Internet censorship varies drastically from region to region, which has impeded nearly all efforts to observe and fight it on a global scale. Researchers and developers in one country may find it very difficult to study censorship in another; this is particularly true for those in North America and Europe attempting to study notoriously pervasive censorship in Asia and the Middle East. This dissertation develops techniques and systems that empower users in one country, or bystanders, to assist in the measurement and circumvention of Internet censorship in another. Our work builds from the observation that there are people everywhere who are willing to help us if only they knew how. First, we develop Encore, which allows webmasters to help study Web censorship by collecting measurements from their sites' visitors. Encore leverages weaknesses in cross-origin security policy to collect measurements from a far more diverse set of vantage points than previously possible. Second, we build Collage, a technique that uses the pervasiveness and scalability of user-generated content to disseminate censored content. Collage's novel communication model is robust against censorship that is significantly more powerful than governments use today. Together, Encore and Collage help people everywhere study and circumvent Internet censorship.
APA, Harvard, Vancouver, ISO, and other styles
30

Cloonan, Martin John. "Banned! : Censorship of popular music in Britain; 1967-1992." Thesis, University of Liverpool, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.385433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Peterson, Christopher E. S. M. Massachusetts Institute of Technology. "User-generated censorship : manipulating the maps of social media." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/81132.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Comparative Media Studies, 2013.
Cataloged from PDF version of thesis. Vita.
Includes bibliographical references.
The last decade has seen the rise of new technologies for making information more broadly available and accessible. Variously called 'user-generated content,' 'social media,''social news,' 'crowd-curation,' and so on, these design conventions, algorithmic arrangements, and user practices have been widely praised for 'democratizing' media by lowering the barriers to publishing, accrediting, and aggregating information. Intermediary platforms like Facebook, reddit, and Twitter, among others, are generally expected to elicit valuable knowledge through the algorithmic filtering mechanisms broadly distributed among their users. This thesis investigates user-generated censorship: an emergent mode of intervention by which users strategically manipulate social media to suppress speech. It shows that the tools designed to help make information more available have been repurposed and reversed to make it less available. Case studies reveal that these platforms, far from being neutral pipes through which information merely travels, are in fact contingent sociotechnical systems upon and through which users effect their politics through the power of algorithms. By strategically pulling the levers which make links to sites more or less visible, users recompose the representations of the world produced by social media, altering pathways of access and availability and changing the flow of information. This thesis incorporates insights from media studies, sociology, law and policy, information science, and science-technology studies to study user-generated censorship. It contributes to a broader conversation now emerging across fields which seeks to explore and understand the politics of our developing social media systems.
by Christopher E. Peterson.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
32

Hochli, Marc. "The invisible scissors : media freedom and censorship in Switzerland." Thesis, Brunel University, 2010. http://bura.brunel.ac.uk/handle/2438/4526.

Full text
Abstract:
At first glance, the very idea of analysing the freedom of the media and of researching censorship in Switzerland seems absurd. After all, the Federal Constitution explicitly guarantees freedom of the media, and censorship is forbidden. Furthermore, this small, federal, multilingual and multicultural landlocked country in the middle of Europe is universally praised as a model of democracy. Indeed, in a country whose people have a far greater say in government than anywhere else, one could easily assume that the freedom of the media is a foregone conclusion. Yet, in reality, this shining image is more than a little tarnished. The "Prototype for Europe" – as the former Federal President of Germany Richard von Weizsäcker once described Switzerland – experiences the same forms and mechanisms of censorship as any other democratic country. Of course, in Switzerland "undesirable" journalists are not threatened with murder, but critically discerning authors do risk becoming social outcasts. Switzerland prohibits governmental pre-censorship, but the advertising industry has on occasion attempted to shape the content of the media by means of post-publication censorship in the form of boycotts. Switzerland is a constitutional state, yet the paragraphs of its penal and civil codes hang over media workers like the sword of Damocles. Then there are structural problems such as the lack of proper journalistic education. However one looks at it, the freedom of the media in Switzerland is officially, materially and structurally restricted. However, most people remain unconcerned by and indeed unaware of this state of affairs. Thomas Jefferson's reminder that, "to preserve the freedom of the human mind then and freedom of the press, every spirit should be ready to devote itself to martyrdom; for as long as we may think as we will, and speak as we think, the condition of man will proceed in improvement”*, has long been forgotten in Switzerland. The Swiss appear to be basking in their country’s reputation as a place without media problems. It therefore came as no surprise to us when, both in our quantitative and qualitative research, many of those interviewed were surprised and even irritated at our 2 questions about possible threats to freedom of the media in Switzerland. Some people even felt that they were being personally attacked and responded along the lines that "Instead of fouling our own nest we ought to describe the advantages of our country and our democratic system". Or: "In comparison with Russia or China we are living in a paradise": It seems that only the most critical among the media personnel, media experts and media scientists are willing to pinpoint the problems faced by the contemporary Swiss media. All the others are convinced that we have the best media on earth. This attitude of part indifference, part ignorance and part wishful thinking, was the catalyst for our research on the freedom of the Swiss media and the potential dangers and mechanisms which threaten it. Our findings reveal that all that glitters is not gold and that the Swiss media scene is, in some ways, reminiscent of a Potemkin village. *Jefferson, Thomas, Letter to William Green Mumford, 18 June 1799 (http://www.positiveatheism.org/hist/quotes/jefferson.htm, consulted 15 June 2006)
APA, Harvard, Vancouver, ISO, and other styles
33

Szucs, Bianca-Henrietta. "Self-censorship by Facebook users – exploration of social considerations." Thesis, Uppsala universitet, Medier och kommunikation, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-297720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Welbourn, Michael. "Censors and society : the Roman censorship, 443-21 BC." Thesis, University of Nottingham, 2018. http://eprints.nottingham.ac.uk/49836/.

Full text
Abstract:
The censorship was one of the Roman Republic's most significant magistracies. The range and importance of their duties – the census, the lectio senatus and recognitio equitum, letting public contracts and initiating public works, and the ceremony of the lustrum – meant that the office had a profound impact on Roman society. There is much modern scholarship on the censorship. But some of the arguments and conclusions put forward by earlier scholars, while valuable, need to be updated and certain misconceptions corrected. In particular, what is required is a greater focus on placing the censorship in its political and social context, into the political culture of the Roman Republic, in order to properly analyse the office, its wider function(s), and its influence on Roman society. At the same time, a careful consideration of what precisely the censors' duties involved and how each pair of censors carried these out is necessary. The present work hopes to address both aspects of this important magistracy. To that end, this thesis is divided into seven chapters. Five of which deal with the censors' individual responsibilities. Chapter 1 is a diachronic survey of the censorship across the whole period of its existence. It aims to highlight the development of the office over time and to ground the subsequent discussion of the magistracy in its proper chronological context. Chapter 2 highlights the infrastructure – assistants, schedule, records, headquarters etc – through which the censors were able to carry out their tasks. Chapter 3 is a study of the censors' most important task, the taking of the census, and its importance for the Roman community. Chapter 4 looks at the censors as guardians of the mos maiorum, and the activities through which this role was expressed. Chapter 5 investigates the censors' responsibility for letting public contracts of various kinds, and the impact this had on the Roman state and its economy. Chapter 6 focuses in more detail on the most significant and costly element of the censors' contracting duties – public works. It attempts to assess what contribution the censors made to the ever-changing face of the city of Rome, as compared to the other magistrates. Finally, Chapter 7 considers the lustrum, the sacred rite which closed each pair of censors' term in office. It asks both what the ceremony involved, and what its meaning and significance for the community might have been.
APA, Harvard, Vancouver, ISO, and other styles
35

Kuhn, Annette Frieda. "Censorship, sexuality and the regulation of cinema, 1909-1925." Thesis, University College London (University of London), 1987. http://discovery.ucl.ac.uk/10006539/.

Full text
Abstract:
This thesis deals with film censorship as a strategy of regulation; with the discourses, practices and powers involved in the censorship of films; with relations between these; and with what is produced in these relations. It is also a social history of film censorship. The inquiry's starting point is the birth of film censorship in Britain, and it focusses on the years between 1909 and 1925.. This was a period of uncertainty, Indeed of struggle, over what the new medium of cinema was to become: how it would be understood, defined, constituted, regulated, as a public sphere. In looking at the instrumentality of film censorship in the emergence of a public sphere of cinema during the earlier part of this century, this inquiry also draws in institutions, practices and discourses which at first sight might appear to have little or nothing to do with the censorship of films. Important among these are 'new' forms of knowledge about sexuality and society,and organisations devoted to the promotion of 'social purity'. At the centre of this study are three case histories involving specific films or groups of films-- commercial fiction features, both British and American--which were caught LIP fl various ways in processes of censorship during the 1909-1925 period. When each case is investigated with a view to revealing the power relations involved, prevailing understandings of censorship are opened up to critical scrutiny and reformulation. More than merely a series of fixed institutional practices of prohibition, film censorship emerges here as a set of processes, as in a play of shifting and contradictory forces. It also emerges as 2roductiv, in that, at a particular historical moment, processes of censorship were actively involved in the constitution of a public sphere of cinema, of cinema as an object of regulation.
APA, Harvard, Vancouver, ISO, and other styles
36

McElligott, Gerard Jason. "Propaganda and censorship : the underground royalist newsbooks, 1647-1650." Thesis, University of Cambridge, 2000. https://www.repository.cam.ac.uk/handle/1810/272176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Lyster, Rosa Frances. "Space and censorship in Nadine Gordimer : a literary geography." Master's thesis, University of Cape Town, 2013. http://hdl.handle.net/11427/13942.

Full text
Abstract:
In South Africa, questions of space and censorship are inseparable. It is impossible to discuss one without discussing the other. The apartheid censors set themselves up as "guardians of the literary", purporting to create a protected space where a particularly South African literature could flourish. In this thesis, my argument is that to be a "guardian of the literary" meant to be a guardian of space in literature, the way it was represented and the way characters moved through it. In order explore this argument I have focused on the censors' response to one writer in particular, Nadine Gordimer. My argument will show that in Gordimer, some spaces seem to be more acceptable than others, as evidenced by the censors' response to her work. Six of her novels were submitted for scrutiny by the Censorship Board. Three were banned, and three were passed. In The Literature Police: Apartheid Censorship and its Cultural Consequences, Peter McDonald asks "If all her novels ... engaged with the historical circumstances of apartheid South Africa in especially powerful and critical ways, then why were they not all deemed equally threatening to the established order?" My argument is that while it is difficult to provide a definitive answer, it is possible to make sense of the censors' decisions regarding her work by undertaking an analysis of the novels' literary geography. Focusing on the prevalence of certain spaces and the absence of others, and the way that characters move through these spaces, it is clear that they represent differing degrees of threat to the established order. In the censors' reports on Gordimer's work, crossing a physical boundary was the equivalent of crossing a moral boundary. Both the apartheid planners and the censors were fixated on boundaries and borders, on the importance of keeping some people in and more people out. My argument is that what the architects of apartheid tried to do in reality, the censors tried to do in fiction. Their attempt to police the borders of the imaginary meant that some spaces were more acceptable than others, that some stories were told while others were ignored. In my final chapter, I argue that the effects of this can still be seen in contemporary novels written about South Africa. The censors had such a powerful hand in "deforming" literature that their fingerprints can still be detected today. A close analysis of certain elements of Patrick Flanery's Absolution (2012) will show that the structure and form of the novel corresponds in interesting ways with the apartheid censors' ideas of what literature should do and be.
APA, Harvard, Vancouver, ISO, and other styles
38

Kemp, Randall B. "Towards a theology of censorship for the theological library." Online full text .pdf document, available to Fuller patrons only, 2000. http://www.tren.com.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Vrabel, Terri Boucher. "Texas school librarians' perceptions on censorship and intellectual freedom." Thesis, University of North Texas, 1997. http://catalog.hathitrust.org/api/volumes/oclc/39258858.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Bowes, Dominic. "Exposing Indecency: Censorship and Sydney's Alternative Press 1963-1973." Thesis, Department of History, 2012. http://hdl.handle.net/2123/8825.

Full text
Abstract:
The ‘alternative press’ arose in the Sixties as a medium of protest that gave voice to the concerns of the emergent youth revolt. This thesis uses these magazines as a lens through which to analyse how censorship was challenged. The thesis begins by examining how the act of producing the alternative press reflected a form of direct action. An anti-authoritarian gesture borne particularly out of the politics of Sydney Libertarianism they challenged the style and focus of the mainstream media. Their most dramatic realignment focussed on the politics of sexuality. I demonstrate for the first time how the sexual revolution was theorised by its self-assigned agents. By publishing otherwise taboo material the editors predictably became entangled with the state’s censorship apparatus. The final portion of this thesis analyses these often- neglected clashes over ‘obscenity.’ It demonstrates the centrality of these contests to the demise of censorship regimes at both the state and federal level.
APA, Harvard, Vancouver, ISO, and other styles
41

Horton, Nancy Spence. "Young Adult Literature and Censorship: A Content Analysis of Seventy-Eight Young Adult Books." Thesis, North Texas State University, 1986. https://digital.library.unt.edu/ark:/67531/metadc331381/.

Full text
Abstract:
The purpose of this study was to analyze a representative seventy-eight current young adult books to determine the extent to which they contain items which are objectionable to would-be censors. Seventy-eight books were identified which fit the criteria of popularity and literary quality. Content analysis was selected as the quantitative method of research. Each of the seventy-eight young adult books was analyzed for the six categories which were established through prior research. The six categories include profanity, sex, violence, parent conflict, drugs, and condoned bad behavior. These categories were tallied each time they occurred in the books. Reliability was assured with a rating of .98 by a committee of six professionals. The data reveal that profanity occurred more times in the seventy-eight books than the other five categories with a total of 5,616. The category of drugs was noted 4,171 times. References to sex followed in number with 3,174. The categories which occurred the least were violence with 1,849 occurrences and condoned bad behavior with only 489 occurrences. By applying a frequency index formula to determine the number of objections in each book in relation to the number of pages, a comparison among the books could be made. The analysis, synthesis, and interpretation of the data led to several conclusions. Local school systems should establish and follow procedures for book selection and removal. The interests of young adults are met by the presentation of a variety of ideas and realistic plots and settings. The books, even with objectionable items, are chosen by teachers and students to read; therefore, they should be accessible in secondary school libraries as they provide valuable reading experiences for young adults. This study established that young adult literature serves an important function in providing quality reading material of interest to teenagers. These reading experiences help broaden the learning environment for young adults.
APA, Harvard, Vancouver, ISO, and other styles
42

Hassani, Alireza. "Censorship of poetry in post-revolutionary Iran (1979 to 2014) ; Growing up with censorship (a memoir), and, 'The Kindly Interrogator' (a collection of poetry)." Thesis, University of Newcastle upon Tyne, 2016. http://hdl.handle.net/10443/3133.

Full text
Abstract:
The thesis comprises a dissertation, a linking piece and a collection of poems. The dissertation is an analysis of state-imposed censorship in Iranian poetry from 1979 through 2014. It investigates the state's rationale for censorship, its mechanism and its effects in order to show how censorship has influenced the trends in poetry and the creativity of poets during the period studied. The introduction outlines attitudes towards censorship in three different categories: Firstly, censorship as "good and necessary", then censorship as "fundamentally wrong yet harmless or even beneficial to poetry", and lastly, censorship as a force that is always destructive and damages poetry. Chapter one investigates the relevant laws, theories and cultural policies in order to identify the underlying causes for censorship of poetry. Chapter two looks at the structure and mechanism of the censorship apparatus and examines the role of cultural organizations as well as judicial and security forces in enforcing censorship. Chapter three contemplates and explores the reaction of Iranian poets to censorship and different strategies and techniques they adopt to protest, challenge and circumvent censorship. Chapter four analyses the outcome of the relationship between the censorship apparatus and the poets, providing a clear picture of how censorship defines, shapes and presents the poetry produced and published in Iran. Chapter five compares the type of censorship in Iran with two historical cases of Tsarist Russia and the Soviet Bloc to conclude that every censorship regime has particular characteristics and affects creativity in a unique way. It revisits the previous arguments in light of findings of the research and concludes that censorship in Iran has highly influenced the contemporary Iranian poetry, and that it leaves a lasting effect on creativity of the Iranian poets. Growing up with Censorship is a self-reflective memoir which chronicles the author’s personal encounters with censorship both as a reader and a writer from 1979 to 2014. It links the dissertation to the poems and provides an intimate narrative of the role censorship has played in shaping the author’s poetic life and his poetry. The Kindly Interrogator is a portfolio of 57 poems concerned with the themes of censorship, surveillance and persecution.
APA, Harvard, Vancouver, ISO, and other styles
43

Fox, Christine. "Conduct unbecoming : Noel Coward, censorship and the fallacy of inconsequence." Thesis, University of Sussex, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.321445.

Full text
Abstract:
This thesis is based on material from two sources : the drama, criticism and autobiography of Noel Coward (1899-1973), and the manuscript collection of the Lord Chamberlain's correspondence files on play censorship (1900-1968), currently held at the British Library. The critique proposes a common advocacy of anti-realist representation for the British public stage, particularly during the interwar period, and relates this characteristic form to the possibility of value production. Chapter One associates anti-realism with power, economy and advantage, but from the diverse perspectives of Coward's satire and censorship policy. The discussion is topical, comparing Coward's critiques of artistic and socio-cultural value with censorship criteria, and the function of stage censorship by a Lord Chamberlain. Chapter Two regards only the censorship correspondence on plays banned between 1900 and 1930. Files are presented to show the sponsorship of unrealistic ideals and suppression of subjectively social realism, which might `become' value; also, peculiar areas of `special' permission, or 'extra' licence, produced by censorship reasoning. This provides an historicalpolitical precedent, against which the radical import of Coward's interwar plays is traced in Chanter Three. Finally, Chapter Four applies the critical findings from the interwar, Coward-Chamberlain comparison, to the contention between the Lord Chamberlain and the Royal Court Theatre in the mid-nineteen sixties, concentrating on specific methods and consequences of reclaiming realistic representation. Appendix One lists plays banned 1900-1968, according to the censorship collection; Appendix Two lists private productions mentioned in the files.
APA, Harvard, Vancouver, ISO, and other styles
44

Johnson, Daniel P. "Censorship and publishing in Ireland in the 1930s and 40s." Thesis, University of Ulster, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268594.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Mizuno, Ryousuke. "Violation of Weak Cosmic Censorship in a Gravitational Dust Collapse." 京都大学 (Kyoto University), 2017. http://hdl.handle.net/2433/225401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Hughes, Cathryn. "The censorship of D.H. Lawrence in England : (" ... that dirty man!") /." Title page and conclusion only, 1992. http://web4.library.adelaide.edu.au/theses/09AR/09arh893.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Yang, Hanfang. "Empirical Likelihood Confidence Intervals for ROC Curves Under Right Censorship." Digital Archive @ GSU, 2010. http://digitalarchive.gsu.edu/math_theses/91.

Full text
Abstract:
In this thesis, we apply smoothed empirical likelihood method to investigate confidence intervals for the receiver operating characteristic (ROC) curve with right censoring. As a particular application of comparison of distributions from two populations, the ROC curve is constructed by the combination of cumulative distribution function and quantile function. Under mild conditions, the smoothed empirical likelihood ratio converges to chi-square distribution, which is the well-known Wilks's theorem. Furthermore, the performances of the empirical likelihood method are also illustrated by simulation studies in terms of coverage probability and average length of confidence intervals. Finally, a primary biliary cirrhosis data is used to illustrate the proposed empirical likelihood procedure.
APA, Harvard, Vancouver, ISO, and other styles
48

Clark, Joshua. "The business of censorship : content management and the Chinese economy." Thesis, University of British Columbia, 2010. http://hdl.handle.net/2429/27822.

Full text
Abstract:
Content control and censorship on the Internet are increasingly important topics for scholars of democratization, media and communications. Most studies have examined the relationship between the Internet, content management and various elements important to democratization such as the formation of civil society organizations. This thesis attempts to expand this discussion by examining the effects of online content management on economic systems, using the People's Republic of China as an example. China features a globally integrated economy that is increasing dependent on manufacturing and services while simultaneously maintaining one of the most extensive online content management systems in the world. This paper attempts to show how the Communist Party of China is able to reconcile the need for connectivity in order to drive their economy while maintaining political control. It also discusses the long-term implications of this strategy. The first section consists of a series of quantitative and qualitative tests to determine how various classes of websites are managed. These tests reveal that in order to maintain the flow of information necessary for a globally integrated economy, the Chinese Communist Party utilizes strategies that manage but not block the information flows related to business. This survey is followed by a case study examining the relationship between Google and China, and the implications of Chinese regulation and control for the broader economy. The results indicate that the Chinese regulatory strategy, which is designed to meet political goals, is creating a divergent technology industry that caters to the party's needs. This development may have serious implications for the future of the Chinese globalization effort as it poses a threat to interoperability and exchange between Chinese online presences and those in the rest of the world.
APA, Harvard, Vancouver, ISO, and other styles
49

Mahar, Karen E., and University of Lethbridge Faculty of Arts and Science. "Comstockery and censorship in early American modernism / Karen E. Mahar." Thesis, Lethbridge, Alta. : University of Lethbridge, Dept. of English, 2011, 2011. http://hdl.handle.net/10133/2601.

Full text
Abstract:
Anthony Comstock was a moral crusader who abhorred all things lewd and obscene, and who was successful in introducing the Comstock Law to help his fight against it. His lifelong battle against vice at the end of the nineteenth-century had an impact on literature and the literary world as it transitioned from Victorian prudery to modernist realism. Comstock’s influence negatively affected publishers, distributers, and writers, in particular, canonical Americans Walt Whitman and Theodore Dreiser. His methods were unconventional, and in the name of morality, Comstock often behaved immorally to achieve his goals of protecting youth from being corrupted by obscenity. The question of the value of censorship was present then, as it still endures today, and centered on the potential harm of viewing or reading obscene materials. Although Comstock presented an impressive record of confiscations and arrests, his crusade did not have a lasting effect beyond the fin de siècle.
vi, 99 leaves ; 29 cm
APA, Harvard, Vancouver, ISO, and other styles
50

DeVuono, Adrian. "Before the law: rethinking censorship in late modernist American fiction." Thesis, McGill University, 2011. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=104831.

Full text
Abstract:
This study examines Djuna Barnes' Nightwood, Henry Miller's Tropic of Cancer, and William S. Burroughs' Naked Lunch within the contextual framework of censorship. In particular, the three texts are studied as providing unique challenges to the way that obscenity has been determined and governed by the trials that defined the modernist period in America. Therefore, the objective of this study is twofold: to investigate the complex, multidirectional and productive mechanisms of censorship; to recuperate the transgressive potential in the obscenity of Barnes, Miller and Burroughs from the afterlife of the legalized text. Situating these texts in the concept of E.S. Burt's "reading pact" – a sociohistoric contract of rules and regulations that governs the way a text is to be received within a given culture – reveals a intricate relationship between aesthetic form and the interconnected methods through which power and knowledge are secured. Within this interpretive scheme, I explore how obscenity ("the unspeakable") operates as a serious violation of the contract, one that works to widen the field of legitimate discourse ("The speakable"). In the first chapter, the "non case" of Barnes' Nightwood is proposed to be a result of the T.S. Eliot's intervention, reflecting a strategic effort to disguise Barnes' obscenity under the legitimating veil forged by Judge Woolsey's verdict in the 1933 Ulysses trial. The second chapter features an analysis of the epistolary origins of Tropic of Cancer and argues that the letter provides Miller with both a material base to dismantle the constraints of 'the well-made work of art' and a space to write the sexual body back into Woolsey's "l'homme moyen sensuel." Finally, an exploration of the monstrous unspeakability of Naked Lunch illustrates how Burroughs employs the figure of the double agent to deconstruct the allegorical method at the foundation of the legal codes that authorize literature under pre-fabricated moral precepts and bring about the end of censorship.
Cette étude examine «Nightwood» par Djuna Barnes, «Tropic of Cancer» par Henry Miller, et «Naked Lunch» par William S. Burroughs dans le cadre contextuel de la censure. En particulier, les trois textes sont étudiées en fournissant des défis uniques pour le moyen que l'obscénité a été déterminée et régie par les essais qui ont défini la période moderniste en Amérique. Par conséquent, l'objectif de cette étude est double: d'enquêter les mécanismes complexes, productifs et multidirectionnelle de la censure; de récupérer le potentiel transgressif de l'obscénité de Barnes, Miller, et Burroughs de la vie après la mort légalisée de texte. Situer ces textes dans le concept « pacte de lecture » de E.S. Burt, un contrat socio-historiques de règles et de règlements qui régissent la façon dont la littérature est reçu dans une culture donnée, révèle la relation embrouillé entre la forme esthétique et les méthodes par lesquelles le pouvoir et la connaissance sont fixé. Dans ce cadre, j'explore la façon dont l'obscénité («non dicible») est une violation grave du contrat, qui élargisse le domaine de ce qui peut être inclus dans le domaine du discours légitime («dicible»). Dans le premier chapitre, le «non case» de «Nightwood» de Barnes est proposé d'être à la suite de l'intervention de TS Eliot qui reflète un essai stratégique pour cacher l'obscénité de Barnes sous le voile de légitimation du juge Woolsey's verdict dans le procès historique 1933 Ulysse. Le deuxième chapitre analyse les origines épistolaire du «Tropic of Cancer» et suggère que la lettre fournit Miller avec un matériau de base pour lutter contre les contraintes du «grand art» et un espace pour écrire le corps sexuelle de «l'homme moyen sensuel» de Woolsey dans la littérature. Enfin, une exploration de la indicible monstrueux de «Naked Lunch» illustre comment Burroughs emploie l'agent-double de déconstruire la méthode allégorique à la base des codes juridiques qui a autorisé le roman et aider à amener la fin du contrôle de la censure.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography