Rozprawy doktorskie na temat „Censorship”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Censorship”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Reineke, Jason Bernard. "Censorship and the individual: an examination of support for public censorship, self-censorship, and personality". The Ohio State University, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=osu1302885908.
Pełny tekst źródłaWinter, Philipp. "Measuring and circumventing Internet censorship". Doctoral thesis, Karlstads universitet, Institutionen för matematik och datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-34475.
Pełny tekst źródłaBarbieri, Maria. "Film censorship in Hong Kong". Thesis, Hong Kong : University of Hong Kong, 1997. http://sunzi.lib.hku.hk/hkuto/record.jsp?B1947118X.
Pełny tekst źródłaThünken, Florian. "Internet Censorship in China Recent Developments and Perception of Internet Censorship by Chinese Internet Users /". Würzburg : Univ., Inst. für Kulturwissenschaften Ost- und Südasiens - Sinologie, 2008. http://www.opus-bayern.de/uni-wuerzburg/volltexte/2009/3444/.
Pełny tekst źródłaWong, Marcelle. "Censorship in late nineteenth century Britain". Thesis, University of Edinburgh, 2009. http://hdl.handle.net/1842/25332.
Pełny tekst źródłaNeedham, T. "Two problems relating to cosmic censorship". Thesis, University of Oxford, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.379862.
Pełny tekst źródłaMantell, Emily. "Political Art Censorship: A Productive Power". Ohio University Honors Tutorial College / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ouhonors1492785190400738.
Pełny tekst źródłaPassannanti, Erminia. "Italian cinema and censorship by religion". Thesis, Brunel University, 2014. http://bura.brunel.ac.uk/handle/2438/13863.
Pełny tekst źródłaBeck, Brian Douglas. "Self-Censorship in Rural Weekly Newspapers". Thesis, The University of Arizona, 1996. http://hdl.handle.net/10150/292239.
Pełny tekst źródłaFifield, David. "Threat Modeling and Circumvention of Internet Censorship". Thesis, University of California, Berkeley, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10688573.
Pełny tekst źródłaResearch on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities—such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations.
My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements. Rather, let us state the assumptions about censor behavior atop which we build circumvention designs, and let those assumptions be based on an informed understanding of censor behavior.
Feng, Guangchao. "A technical analysis of China's internet censorship". View the Table of Contents & Abstract, 2007. http://sunzi.lib.hku.hk/hkuto/record/B39573989.
Pełny tekst źródłaFeng, Guangchao, i 馮廣超. "A technical analysis of China's internet censorship". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B39707283.
Pełny tekst źródłaKozlowski, Lisa. "STUDENT CENSORSHIP IN THE SOCIAL WORK CLASSROOMS". CSUSB ScholarWorks, 2017. https://scholarworks.lib.csusb.edu/etd/459.
Pełny tekst źródłaCohen, Mark 1966. "Just judgment : censorship of and in Canadian literature". Thesis, McGill University, 1999. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=35866.
Pełny tekst źródłaCohen, Mark. "Just judgment, censorship of and in Canadian literature". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0026/NQ50133.pdf.
Pełny tekst źródłaAl-Hamad, M. Q. "Translation and censorship with special reference to Jordan". Thesis, University of Edinburgh, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.508440.
Pełny tekst źródłaColleoni, Marta. "Gravitational self-force and the weak cosmic censorship". Thesis, University of Southampton, 2016. https://eprints.soton.ac.uk/401825/.
Pełny tekst źródłaRogers, M. J. "Private and censorship-resistant communication over public networks". Thesis, University College London (University of London), 2011. http://discovery.ucl.ac.uk/1322992/.
Pełny tekst źródłaWeinberg, Zachary. "Toward Automated Worldwide Monitoring of Network-Level Censorship". Thesis, Carnegie Mellon University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13425933.
Pełny tekst źródłaAlthough Internet censorship is a well-studied topic, to date most published studies have focused on a single aspect of the phenomenon, using methods and sources specific to each researcher. Results are difficult to compare, and global, historical perspectives are rare. Because each group maintains their own software, erroneous methods may continue to be used long after the error has been discovered. Because censors continually update their equipment and blacklists, it may be impossible to reproduce historical results even with the same vantage points and testing software. Because “probe lists” of potentially censored material are labor-intensive to compile, requiring an understanding of the politics and culture of each country studied, researchers discover only the most obvious and long-lasting cases of censorship.
In this dissertation I will show that it is possible to make progress toward addressing all of these problems at once. I will present a proof-of concept monitoring system designed to operate continuously, in as many different countries as possible, using the best known techniques for detection and analysis. I will also demonstrate improved techniques for verifying the geographic location of a monitoring vantage point; for distinguishing innocuous network problems from censorship and other malicious network interference; and for discovering new web pages that are closely related to known-censored pages. These techniques improve the accuracy of a continuous monitoring system and reduce the manual labor required to operate it.
This research has, in addition, already led to new discoveries. For example, I have confirmed reports that a commonly-used heuristic is too sensitive and will mischaracterize a wide variety of unrelated problems as censorship. I have been able to identify a few cases of political censorship within a much longer list of cases of moralizing censorship. I have expanded small seed groups of politically sensitive documents into larger groups of documents to test for censorship. Finally, I can also detect other forms of network interference with a totalitarian motive, such as injection of surveillance scripts.
In summary, this work demonstrates that mostly-automated measurements of Internet censorship on a worldwide scale are feasible, and that the elusive global and historical perspective is within reach.
Winter, Philipp. "Enhancing Censorship Resistance in the Tor Anonymity Network". Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-30752.
Pełny tekst źródłaGarry, Candi Pierce. "Selection or Censorship? School Librarians and LGBTQ Resources". Miami University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=miami1406589992.
Pełny tekst źródłaSpilger, Erica L. Spilger. "Expression and Repression: Contemporary Art Censorship in America". Ohio University Honors Tutorial College / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ouhonors1524835404987482.
Pełny tekst źródłaSorrie, Charles. "Censorship of the press in France 1917-1918". Thesis, London School of Economics and Political Science (University of London), 2014. http://etheses.lse.ac.uk/3110/.
Pełny tekst źródłaNaylor, A. P., Edward J. Dwyer i L. B. Bliss. "Attitudes of Students in Education Classes Toward Censorship". Digital Commons @ East Tennessee State University, 1995. https://dc.etsu.edu/etsu-works/3311.
Pełny tekst źródłaDyer, Kevin Patrick. "Novel Cryptographic Primitives and Protocols for Censorship Resistance". PDXScholar, 2015. https://pdxscholar.library.pdx.edu/open_access_etds/2489.
Pełny tekst źródłaLiu, Shuangquan. "Nonparametric tests for change-point problems with random censorship". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape15/PQDD_0003/NQ34803.pdf.
Pełny tekst źródłaLu, Jiang 1957. "Some advances of inferences in mixed censorship-truncation models". Thesis, McGill University, 1993. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=41692.
Pełny tekst źródłaDyck, Karen Rhoads Van. "The poetics of censorship in Greek poetry since 1967". Thesis, University of Oxford, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.305898.
Pełny tekst źródłaBurnett, Samuel Read. "Empowering bystanders to facilitate Internet censorship measurement and circumvention". Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52199.
Pełny tekst źródłaCloonan, Martin John. "Banned! : Censorship of popular music in Britain; 1967-1992". Thesis, University of Liverpool, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.385433.
Pełny tekst źródłaPeterson, Christopher E. S. M. Massachusetts Institute of Technology. "User-generated censorship : manipulating the maps of social media". Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/81132.
Pełny tekst źródłaCataloged from PDF version of thesis. Vita.
Includes bibliographical references.
The last decade has seen the rise of new technologies for making information more broadly available and accessible. Variously called 'user-generated content,' 'social media,''social news,' 'crowd-curation,' and so on, these design conventions, algorithmic arrangements, and user practices have been widely praised for 'democratizing' media by lowering the barriers to publishing, accrediting, and aggregating information. Intermediary platforms like Facebook, reddit, and Twitter, among others, are generally expected to elicit valuable knowledge through the algorithmic filtering mechanisms broadly distributed among their users. This thesis investigates user-generated censorship: an emergent mode of intervention by which users strategically manipulate social media to suppress speech. It shows that the tools designed to help make information more available have been repurposed and reversed to make it less available. Case studies reveal that these platforms, far from being neutral pipes through which information merely travels, are in fact contingent sociotechnical systems upon and through which users effect their politics through the power of algorithms. By strategically pulling the levers which make links to sites more or less visible, users recompose the representations of the world produced by social media, altering pathways of access and availability and changing the flow of information. This thesis incorporates insights from media studies, sociology, law and policy, information science, and science-technology studies to study user-generated censorship. It contributes to a broader conversation now emerging across fields which seeks to explore and understand the politics of our developing social media systems.
by Christopher E. Peterson.
S.M.
Hochli, Marc. "The invisible scissors : media freedom and censorship in Switzerland". Thesis, Brunel University, 2010. http://bura.brunel.ac.uk/handle/2438/4526.
Pełny tekst źródłaSzucs, Bianca-Henrietta. "Self-censorship by Facebook users – exploration of social considerations". Thesis, Uppsala universitet, Medier och kommunikation, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-297720.
Pełny tekst źródłaWelbourn, Michael. "Censors and society : the Roman censorship, 443-21 BC". Thesis, University of Nottingham, 2018. http://eprints.nottingham.ac.uk/49836/.
Pełny tekst źródłaKuhn, Annette Frieda. "Censorship, sexuality and the regulation of cinema, 1909-1925". Thesis, University College London (University of London), 1987. http://discovery.ucl.ac.uk/10006539/.
Pełny tekst źródłaMcElligott, Gerard Jason. "Propaganda and censorship : the underground royalist newsbooks, 1647-1650". Thesis, University of Cambridge, 2000. https://www.repository.cam.ac.uk/handle/1810/272176.
Pełny tekst źródłaLyster, Rosa Frances. "Space and censorship in Nadine Gordimer : a literary geography". Master's thesis, University of Cape Town, 2013. http://hdl.handle.net/11427/13942.
Pełny tekst źródłaKemp, Randall B. "Towards a theology of censorship for the theological library". Online full text .pdf document, available to Fuller patrons only, 2000. http://www.tren.com.
Pełny tekst źródłaVrabel, Terri Boucher. "Texas school librarians' perceptions on censorship and intellectual freedom". Thesis, University of North Texas, 1997. http://catalog.hathitrust.org/api/volumes/oclc/39258858.html.
Pełny tekst źródłaBowes, Dominic. "Exposing Indecency: Censorship and Sydney's Alternative Press 1963-1973". Thesis, Department of History, 2012. http://hdl.handle.net/2123/8825.
Pełny tekst źródłaHorton, Nancy Spence. "Young Adult Literature and Censorship: A Content Analysis of Seventy-Eight Young Adult Books". Thesis, North Texas State University, 1986. https://digital.library.unt.edu/ark:/67531/metadc331381/.
Pełny tekst źródłaHassani, Alireza. "Censorship of poetry in post-revolutionary Iran (1979 to 2014) ; Growing up with censorship (a memoir), and, 'The Kindly Interrogator' (a collection of poetry)". Thesis, University of Newcastle upon Tyne, 2016. http://hdl.handle.net/10443/3133.
Pełny tekst źródłaFox, Christine. "Conduct unbecoming : Noel Coward, censorship and the fallacy of inconsequence". Thesis, University of Sussex, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.321445.
Pełny tekst źródłaJohnson, Daniel P. "Censorship and publishing in Ireland in the 1930s and 40s". Thesis, University of Ulster, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268594.
Pełny tekst źródłaMizuno, Ryousuke. "Violation of Weak Cosmic Censorship in a Gravitational Dust Collapse". 京都大学 (Kyoto University), 2017. http://hdl.handle.net/2433/225401.
Pełny tekst źródłaHughes, Cathryn. "The censorship of D.H. Lawrence in England : (" ... that dirty man!") /". Title page and conclusion only, 1992. http://web4.library.adelaide.edu.au/theses/09AR/09arh893.pdf.
Pełny tekst źródłaYang, Hanfang. "Empirical Likelihood Confidence Intervals for ROC Curves Under Right Censorship". Digital Archive @ GSU, 2010. http://digitalarchive.gsu.edu/math_theses/91.
Pełny tekst źródłaClark, Joshua. "The business of censorship : content management and the Chinese economy". Thesis, University of British Columbia, 2010. http://hdl.handle.net/2429/27822.
Pełny tekst źródłaMahar, Karen E., i University of Lethbridge Faculty of Arts and Science. "Comstockery and censorship in early American modernism / Karen E. Mahar". Thesis, Lethbridge, Alta. : University of Lethbridge, Dept. of English, 2011, 2011. http://hdl.handle.net/10133/2601.
Pełny tekst źródłavi, 99 leaves ; 29 cm
DeVuono, Adrian. "Before the law: rethinking censorship in late modernist American fiction". Thesis, McGill University, 2011. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=104831.
Pełny tekst źródłaCette étude examine «Nightwood» par Djuna Barnes, «Tropic of Cancer» par Henry Miller, et «Naked Lunch» par William S. Burroughs dans le cadre contextuel de la censure. En particulier, les trois textes sont étudiées en fournissant des défis uniques pour le moyen que l'obscénité a été déterminée et régie par les essais qui ont défini la période moderniste en Amérique. Par conséquent, l'objectif de cette étude est double: d'enquêter les mécanismes complexes, productifs et multidirectionnelle de la censure; de récupérer le potentiel transgressif de l'obscénité de Barnes, Miller, et Burroughs de la vie après la mort légalisée de texte. Situer ces textes dans le concept « pacte de lecture » de E.S. Burt, un contrat socio-historiques de règles et de règlements qui régissent la façon dont la littérature est reçu dans une culture donnée, révèle la relation embrouillé entre la forme esthétique et les méthodes par lesquelles le pouvoir et la connaissance sont fixé. Dans ce cadre, j'explore la façon dont l'obscénité («non dicible») est une violation grave du contrat, qui élargisse le domaine de ce qui peut être inclus dans le domaine du discours légitime («dicible»). Dans le premier chapitre, le «non case» de «Nightwood» de Barnes est proposé d'être à la suite de l'intervention de TS Eliot qui reflète un essai stratégique pour cacher l'obscénité de Barnes sous le voile de légitimation du juge Woolsey's verdict dans le procès historique 1933 Ulysse. Le deuxième chapitre analyse les origines épistolaire du «Tropic of Cancer» et suggère que la lettre fournit Miller avec un matériau de base pour lutter contre les contraintes du «grand art» et un espace pour écrire le corps sexuelle de «l'homme moyen sensuel» de Woolsey dans la littérature. Enfin, une exploration de la indicible monstrueux de «Naked Lunch» illustre comment Burroughs emploie l'agent-double de déconstruire la méthode allégorique à la base des codes juridiques qui a autorisé le roman et aider à amener la fin du contrôle de la censure.