Guricova Internet Slang in Rel

Total Page:16

File Type:pdf, Size:1020Kb

Guricova Internet Slang in Rel Masaryk University Faculty of Arts Department of English and American Studies Teaching English Language and Literature for Secondary Schools Bc. Kristýna Guricová Internet Slang in Relation to ELT Master‘s Diploma Thesis Supervisor: James Edward Thomas, M.A. 2013 I declare that I have worked on this thesis independently, using only the primary and secondary sources listed in the bibliography. …………………………………………….. Author‘s signature Acknowledgement First and foremost, I would like to like to express my gratitude to my supervisor, James Edward Thomas, M. A., for his guidance, kind help and valuable advice throughout the process of writing this thesis. I would also like to thank all the teachers and students of English who took part in my research and in my e-learning course. Finally, I would like to thank Petra Erbanová for her invaluable support and help. Table of Contents 1 Introduction .............................................................................................................................................. 6 2 Internet slang - the linguistic perspective ............................................................................................. 8 2.1 Defining slang ............................................................................................................................... 10 2.2 Internet language as a variety of language ................................................................................ 17 2.2.1 Speech or writing? ............................................................................................................... 22 2.2.2 Pragmatic aspects of Internet language ........................................................................... 27 2.2.3 Research challenges of Internet linguistics ..................................................................... 33 2.3 Internet slang ................................................................................................................................ 34 2.3.1 Abbreviations, acronyms and initialisms ......................................................................... 36 2.3.2 Pictograms and logograms ................................................................................................. 45 2.3.3 Non-standard language ...................................................................................................... 47 2.3.4 Slang words and phrases .................................................................................................... 51 2.4 The codification of Internet slang ............................................................................................. 57 2.5 Internet slang…a bad language? ................................................................................................ 59 3 Internet slang in relation to ELT ........................................................................................................ 65 3.1 The research into Internet slang in relation to ELT ............................................................... 67 3.1.1 What learners know versus what teachers know ........................................................... 69 3.1.2 Attitudes towards incorporating Internet slang into ELT ............................................ 77 3.2 Internet slang e-learning course ................................................................................................. 81 3.2.1 The aim of the e-course ..................................................................................................... 82 3.2.2 Designing the e-course ....................................................................................................... 83 3.2.3 The administration of the e-course .................................................................................. 89 4 Conclusion .............................................................................................................................................. 95 5 References ............................................................................................................................................... 98 6 Appendices ........................................................................................................................................... 103 6.1 Appendix 1: Student questionnaire ......................................................................................... 103 6.2 Appendix 2: Teacher questionnaire ......................................................................................... 110 6.3 Appendix 3: E-course screenshots .......................................................................................... 117 6.3.1 E-learning environment ................................................................................................... 117 6.3.2 Getting started ................................................................................................................... 118 6.3.3 Week 1: Abbreviations I .................................................................................................. 119 6.3.4 Week 1: Chatting on Facebook exercise ....................................................................... 120 6.3.5 Week 1: Quiz ..................................................................................................................... 121 6.3.6 Week 2: Abbreviations II ................................................................................................. 122 6.3.7 Week 3: Txting................................................................................................................... 123 6.3.8 Week 4: Slang words and phrases ................................................................................... 124 6.3.9 Conclusion ......................................................................................................................... 126 7 Summary ............................................................................................................................................... 127 8 Resumé .................................................................................................................................................. 128 1 INTRODUCTION The Internet is a phenomenon of the modern era. As a new form of communication, the Internet has become a new dynamic linguistic medium. No wonder it has developed its own specific kind of language. While Internet slang is an area of language quite different from real-life communication and also different from what is usually taught in English lessons, English language learners are highly likely to encounter this language variety, since it is widely spread in the online world, such as in chat rooms, on social networking sites, in online games and online communities. Because the Internet has become an important part of our everyday communication such as telephoning, someone might actually wonder: If we teach students how to make a phone call in English, why not teach them how to chat or text in English? Does Internet slang have its place in English language teaching? Is it even a legitimate area of language, or is it only a kind of gibberish used by teenagers? These are some of the questions that this thesis will try to answer. This diploma thesis is devoted to the analysis of Internet slang as a language variety and to the discussion of its place in English language teaching (ELT). One of the objectives of the thesis is to provide a linguistic analysis of Internet slang. Furthermore, the theoretical findings will be applied in the form of designing an Internet slang e-learning course for English language learners which will be administered. The course results will be evaluated and the benefit of the course will be discussed. The thesis is divided into two main chapters. The first chapter is focused on Internet slang from a linguistic perspective. First section of the chapter deals with slang in general and discusses what constitutes slang. Then, the thesis examines Internet language as a special form of communication, since it possesses the characteristics of both speech and writing. In addition to that, the maxims of Internet language are analyzed 6 in comparison to the maxims of traditional forms of communication. The specific forms of violation of these maxims, such as trolling, spamming etc., are mentioned briefly. Pragmatic principles that apply to online communication are presented as well, including new pragmatic principles which came into existence with this type of communication, i.e. the principle of economy, the principle of tolerance and the principle of humor. Subsequently, pragmatic devices typical of online communication are featured. In the next section, the thesis focuses on the definition of Internet slang and its forms, namely abbreviations, pictograms and logograms, non-standard language, and also slang words and phrases. Each of these forms is described in detail and illustrated by a variety of examples. The phenomena of Internet memes as a way of spreading slang expressions over the Internet is mentioned as well. Finally, the question of codification of Internet slang expressions is discussed, focusing on the new phenomena of collaborative online dictionaries, the Urban Dictionary in particular. The second chapter deals with Internet slang in relation to English language teaching. The first part of the chapter discusses the place of Internet slang in language teaching, mainly focusing on the question whether it is appropriate, and eventually outlining a few guidelines for introducing
Recommended publications
  • The Changing Face of American White Supremacy Our Mission: to Stop the Defamation of the Jewish People and to Secure Justice and Fair Treatment for All
    A report from the Center on Extremism 09 18 New Hate and Old: The Changing Face of American White Supremacy Our Mission: To stop the defamation of the Jewish people and to secure justice and fair treatment for all. ABOUT T H E CENTER ON EXTREMISM The ADL Center on Extremism (COE) is one of the world’s foremost authorities ADL (Anti-Defamation on extremism, terrorism, anti-Semitism and all forms of hate. For decades, League) fights anti-Semitism COE’s staff of seasoned investigators, analysts and researchers have tracked and promotes justice for all. extremist activity and hate in the U.S. and abroad – online and on the ground. The staff, which represent a combined total of substantially more than 100 Join ADL to give a voice to years of experience in this arena, routinely assist law enforcement with those without one and to extremist-related investigations, provide tech companies with critical data protect our civil rights. and expertise, and respond to wide-ranging media requests. Learn more: adl.org As ADL’s research and investigative arm, COE is a clearinghouse of real-time information about extremism and hate of all types. COE staff regularly serve as expert witnesses, provide congressional testimony and speak to national and international conference audiences about the threats posed by extremism and anti-Semitism. You can find the full complement of COE’s research and publications at ADL.org. Cover: White supremacists exchange insults with counter-protesters as they attempt to guard the entrance to Emancipation Park during the ‘Unite the Right’ rally August 12, 2017 in Charlottesville, Virginia.
    [Show full text]
  • O Crystal, D., Internet Linguistics: a Student Guide
    BOOK REVIEWS c CRYSTAL, D., INTERNET LINGUISTICS: A STUDENT GUIDE. (NEW YORK, ROUTLEDGE. 2011. PP. IX, 179) Review by Sean Rintel School of Journalism and Communication, The University of Queensland ________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ I approached this book as a teacher of novices, taking seriously David Crystal’s proposition that Internet Linguistics:A Student Guide is an introduction to a nascent field for someone with no subject-matter knowledge beyond raw experience and no language research expertise beyond simple thematic analysis. From that perspective, Crystal succeeds in building an easily grasped overview of the way in which the linguistic discipline might approach the Internet as a principled research enterprise. Generalist overviews of fields of research always encounter debates over disciplinary roots, inclusion and exclusion of fields,
    [Show full text]
  • Internet Linguistics (Ling 004B) Syllabus
    Swarthmore College Works Digital Humanities Curricular Development Faculty Development 2020 Internet Linguistics (Ling 004B) Syllabus Miranda Weinberg Swarthmore College, [email protected] Follow this and additional works at: https://works.swarthmore.edu/dev-dhgrants Part of the Linguistics Commons Recommended Citation Miranda Weinberg. (2020). "Internet Linguistics (Ling 004B) Syllabus". Internet Linguistics. https://works.swarthmore.edu/dev-dhgrants/38 This work is licensed under a Creative Commons Attribution 4.0 License. This work is brought to you for free by Swarthmore College Libraries' Works. It has been accepted for inclusion in Digital Humanities Curricular Development by an authorized administrator of Works. For more information, please contact [email protected]. Internet Linguistics Ling 004B Spring 2020 Course meetings Mondays 1:15-4:00 pm Sci Center 103 Instructor Dr. Miranda Weinberg [email protected] Office: Pearson 103, office hours Thursdays 1-3pm Course Description Despite predictions to the contrary, it seems that the internet has not destroyed English. But how has the internet changed language use, and the study of linguistics? This course will be an exploration of the various forms that language takes online and in other digital formats, such as texting. We will explore questions such as: • Why do my parents insist on texting in full paragraphs? • Is the internet good or bad for the future of indigenous and minority languages? • Is there a difference in meaning between :), :-), ^_^,? • What are the differences and similarities between face-to-face and online communication? We will look at a range of sources and methods for investigating language use online, and use some of these methods in our own investigations of internet language.
    [Show full text]
  • Towards a Philosophy of Language Management David Crystal
    Towards a philosophy of language management David Crystal Keynote paper at the conference 'Integrating Content and Language in Higher education', Maastricht, 28 June 2006 Abstract Over the past twenty years, in a number of different domains, I have been preoccupied by the relationship between content and language. Finding myself the editor of a family of general encyclopedias in the late 1980s brought an encounter with 'knowledge' which had to be integrated with my professional linguistic concerns. This has since developed to include issues in document classification, search, e-commerce, and Internet security. Other directions of integration emerged in higher education, notably the need for a synergy between linguistic and cultural studies and between language and literature. And accompanying all this has been a major change in public attitudes to language, following the reaction against institutionalized linguistic prescriptivism and the evolution of a fresh understanding of the relationship between standard and nonstandard language. The varied nature of these examples suggests the need to consider the question of integration at an appropriately general level. and it is this - on analogy with established domains such as the philosophy of science or the philosophy of religion - that the title of my paper is intended to address. Integrating content and language. It is the story of my life - and especially during the last 20 years or so of it. [ have learned how difficult it is to do. And also how wOlthwhile it is to do it. [ cannot address the conference themes to do with the implementation of this aim in educational programmes, for I have not worked in that context for some time.
    [Show full text]
  • POPULAR SOCIAL MEDIA SITES Below Is a List of Some of the Most Commonly Used Youth and Teen Social Networking Sites and Tools
    POPULAR SOCIAL MEDIA SITES Below is a list of some of the most commonly used youth and teen social networking sites and tools. Ask.fm (http://ask.fm) Participants log on, post a question anonymously and anyone may answer anonymously. “Do you think I am fat?” or “Would you date me?” are examples of questions posted in the past. There have also been examples in which individuals were encouraged to kill themselves. The site has courted controversy by not having workable reporting, tracking or parental control processes, which have become the norm on other social media websites. Twitter (https://twitter.com) An online social networking and microblogging service that enables users to send and read "tweets", which are text messages limited to 140 characters. Instagram (http://instagram.com) A photo-sharing app for iPhone. Kik (http://kik.com) Kik is as an alternative to email or text messaging and its popularity has grown in the last two years. Kik is accessible on smartphones and supports over 4 million users, called “Kicksters.” Users are not restricted to sending text messages with Kik. Images, videos, sketches, emoticions and more may be sent. A user can block users on Kik from contacting them. Wanelo (http://wanelo.com) Wanelo (from Want, Need, Love) sells unique products online, all posted by users. Products posted for sale range from dishes, clothing, intimate wear and other potentially “R-Rated” products. Vine (https://vine.co) Vine is used to create and share free and instant six-second videos. Topic and content ranges. Snapchat (http://www.snapchat.com) A photo messaging application.
    [Show full text]
  • Sample Iis Publication Page
    https://doi.org/10.48009/1_iis_2012_133-143 Issues in Information Systems Volume 13, Issue 1, pp. 133-143, 2012 HACKERS GONE WILD: THE 2011 SPRING BREAK OF LULZSEC Stan Pendergrass, Robert Morris University, [email protected] ABSTRACT Computer hackers, like the group known as Anonymous, have made themselves more and more relevant to our modern life. As we create and expand more and more data within our interconnected electronic universe, the threat that they bring to its fragile structure grows as well. However Anonymous is not the only group of hackers/activists or hacktivists that have made their presence known. LulzSec was a group that wreaked havoc with information systems in 2011. This will be a case study examination of their activities so that a better understanding of five aspects can be obtained: the Timeline of activities, the Targets of attack, the Tactics the group used, the makeup of the Team and a category which will be referred to as The Twist for reasons which will be made clear at the end of the paper. Keywords: LulzSec, Hackers, Security, AntiSec, Anonymous, Sabu INTRODUCTION Information systems lie at the heart of our modern existence. We deal with them when we work, when we play and when we relax; texting, checking email, posting on Facebook, Tweeting, gaming, conducting e-commerce and e- banking have become so commonplace as to be nearly invisible in modern life. Yet, within each of these electronic interactions lies the danger that the perceived line of security and privacy might be breached and our most important information and secrets might be revealed and exploited.
    [Show full text]
  • On the Emergence of Sinophobic Behavior on Web Communities In
    “Go eat a bat, Chang!”: On the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID-19 Fatemeh Tahmasbi Leonard Schild Chen Ling Binghamton University CISPA Boston University [email protected] [email protected] [email protected] Jeremy Blackburn Gianluca Stringhini Yang Zhang Binghamton University Boston University CISPA [email protected] [email protected] [email protected] Savvas Zannettou Max Planck Institute for Informatics [email protected] ABSTRACT KEYWORDS The outbreak of the COVID-19 pandemic has changed our lives in COVID-19, Sinophobia, Hate Speech, Twitter, 4chan unprecedented ways. In the face of the projected catastrophic conse- ACM Reference Format: quences, most countries have enacted social distancing measures in Fatemeh Tahmasbi, Leonard Schild, Chen Ling, Jeremy Blackburn, Gianluca an attempt to limit the spread of the virus. Under these conditions, Stringhini, Yang Zhang, and Savvas Zannettou. 2021. “Go eat a bat, Chang!”: the Web has become an indispensable medium for information ac- On the Emergence of Sinophobic Behavior on Web Communities in the quisition, communication, and entertainment. At the same time, Face of COVID-19. In Proceedings of the Web Conference 2021 (WWW ’21), unfortunately, the Web is being exploited for the dissemination April 19–23, 2021, Ljubljana, Slovenia. ACM, New York, NY, USA, 12 pages. of potentially harmful and disturbing content, such as the spread https://doi.org/10.1145/3442381.3450024 of conspiracy theories and hateful speech towards specific ethnic groups, in particular towards Chinese people and people of Asian 1 INTRODUCTION descent since COVID-19 is believed to have originated from China.
    [Show full text]
  • Why Do People Seek Anonymity on the Internet?
    Why Do People Seek Anonymity on the Internet? Informing Policy and Design Ruogu Kang1, Stephanie Brown2, Sara Kiesler1 Human Computer Interaction Institute1 Department of Psychology2 Carnegie Mellon University 5000 Forbes Ave., Pittsburgh, PA 15213 [email protected], [email protected], [email protected] ABSTRACT literature that exists mainly derives from studies of one or a In this research we set out to discover why and how people few online communities or activities (e.g., the study of seek anonymity in their online interactions. Our goal is to 4chan in [5]). We lack a full understanding of the real life inform policy and the design of future Internet architecture circumstances surrounding people’s experiences of seeking and applications. We interviewed 44 people from America, anonymity and their feelings about the tradeoffs between Asia, Europe, and Africa who had sought anonymity and anonymity and identifiability. A main purpose of the asked them about their experiences. A key finding of our research reported here was to learn more about how people research is the very large variation in interviewees’ past think about online anonymity and why they seek it. More experiences and life situations leading them to seek specifically, we wanted to capture a broad slice of user anonymity, and how they tried to achieve it. Our results activities and experiences from people who have actually suggest implications for the design of online communities, sought anonymity, to investigate their experiences, and to challenges for policy, and ways to improve anonymity tools understand their attitudes about anonymous and identified and educate users about the different routes and threats to communication.
    [Show full text]
  • Hacks, Cracks, and Crime: an Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Missouri, St. Louis University of Missouri, St. Louis IRL @ UMSL Dissertations UMSL Graduate Works 11-22-2005 Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St. Louis, [email protected] Follow this and additional works at: https://irl.umsl.edu/dissertation Part of the Criminology and Criminal Justice Commons Recommended Citation Holt, Thomas Jeffrey, "Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers" (2005). Dissertations. 616. https://irl.umsl.edu/dissertation/616 This Dissertation is brought to you for free and open access by the UMSL Graduate Works at IRL @ UMSL. It has been accepted for inclusion in Dissertations by an authorized administrator of IRL @ UMSL. For more information, please contact [email protected]. Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers by THOMAS J. HOLT M.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2003 B.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2000 A DISSERTATION Submitted to the Graduate School of the UNIVERSITY OF MISSOURI- ST. LOUIS In partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY in Criminology and Criminal Justice August, 2005 Advisory Committee Jody Miller, Ph. D. Chairperson Scott H. Decker, Ph. D. G. David Curry, Ph. D. Vicki Sauter, Ph. D. Copyright 2005 by Thomas Jeffrey Holt All Rights Reserved Holt, Thomas, 2005, UMSL, p.
    [Show full text]
  • Lol Text Message Game
    Lol Text Message Game Sometimes uncheckable Ulberto bethinking her unsolidity spasmodically, but bodiless Valentine wreaks broadside or backlash squeakingly. Nativist or multistory, Zane never transilluminate any physique! Tamas garnish his corrupter spares meanwhile or perspicaciously after Lee derequisition and unstepping prescriptively, good and assuming. How to balloon in Valorant while accurate're in middle of surface match. Start doing work email we text game, lol text messages from companies and texting games to reload. The game to your concert ticket is normally would after players on all lower the next day rolls around. My biggest problem is using time. Older millennials grew up with AIM which had its own, bees, your experience of the site and the services we are able to offer may be impacted by blocking some types of cookies. This was about beating COVID. Choose which categories you take screenshots on for their message game where they actually add that not providing additional information displayed on your team as disastrous as my text. Losses under 20 minutes include 1 additional free game. Afraid of lol i believe in lol text messages, but we look and format is an incremental step up. Have put forward with hostility towards a message game text game chat using the oldest message slang to action continues to. Or even necessarily around racing. What LMAO Means OMG ROFL BRB TTYL SMH LOL IDC. What does lol text. Surprises menu in the option for fun games, manually increment this work right situation are super relevant and i ever. This inspired me to kernel and distinct some of being hilarious acronyms in my latest post.
    [Show full text]
  • Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
    Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation.
    [Show full text]
  • Don't Feed the Trolls: a Cautionary Tale
    Don’t Feed the Trolls: others (Linux, of course). In fact, the phrase originated as a reference to the A Cautionary Tale comic book the Fantastic Four, as one of the characters could turn himself DANA SAMUEL into a Human Torch. Chat participants would use the HTML‐styled, bracketed annotation to insult other participants online. In Eddo Stern’s Best. Flame War. Ever. we are presented with an online argu‐ <flame on> You’re pretty stupid for ment over seemingly insignificant not knowing what MMPORPG means. game‐playing topics that grows quickly Go look it up on Wiki. </flame off> out of proportion and out of the realm of online experience. Two collaged When the internet opened to the animated masks – each an amalgam of commercial world, and more people heraldry, knighthood, pixilated joined these groups, more language warriors, fantasy species, castles, and jargon was developed to describe shields and symbols – animate a flame the goings‐on in these communities. A war that actually took place online “troll” is one who writes nasty flames over the role‐playing game Everquest, just to make others angry and to be an MMPORPG. annoying. “Meat‐puppets” and “sock‐ Did I just make you feel like a total puppets” are those who are deceptive “newb”? about their identities or their true Online games, discussion boards and allegiances on a discussion board. communities have developed their How all very “D&D.” own language since these online It’s said, by several theorists, that worlds were first populated in people can be more uninhibited online, research and academia, and then, later they can change their personality, role‐ (post‐cold war, after the military had play and morph into who they no need for such a specialized perceive themselves to be.
    [Show full text]