Children and Information Communication Technologies in the Media: a Study Using Moral Panic Theory. Bachelor of Education

Total Page:16

File Type:pdf, Size:1020Kb

Children and Information Communication Technologies in the Media: a Study Using Moral Panic Theory. Bachelor of Education Stacey Card -Thesis Children and Information Communication Technologies in the Media: a study using Moral Panic Theory. Stacey Card Bachelor ofEducation Submitted in fulfilment of the requirement for the degree of Master of Education (Research) Centre for Learning Innovation Faculty of Education Queensland University of Technology 2013 Stacey Card -Thesis Keywords Moral panic, Information Communication Technologies (ICT), digital media, newspapers, intemet, computers, children, parental supervision, education, content analysis, discourse analyse. Stacey Card -Thesis ABSTRACT The impact of Information Communication Technologies (ICT) on society has been widely discussed in both academic and public debates. Recent attention has focused on children, and their ICT use. This thesis is an investigation of the media's representation of children and ICT. The study draws on moral panic theory and Queensland newspaper media, to identity the impact of newspaper reporting on the public's perceptions of young people and ICT. A discourse analysis, using content analysis as a theoretical perspective, was conducted of Queensland newspaper articles between June 2011 to June 2012 to uncover how media attention on children and ICT is represented to the public. Through the use of content analysis a comparison was conducted of reporting styles used by the media to report on ICT in general, compared to ICT and children. There was a significant increase in both the sensationalised and stylised representations of ICT in reporting used in articles addressing children and ICT. This was displayed through a significant increase in the negative representation of ICT and the intensification of suggested social controls measures for children. The sensationalised and destructively stylised representations of ICT and children have the potential to negatively impact on the public perceptions of children and their ICT use. This study draws on moral panic theory to better understand the implications of collective perceptions. It is suggested that the negative sensationalised news reporting of ICT and children creates an unrealistic fear of ICT and the intemet to the public, consequently resulting in a moral panic. These fmdings will contribute to future research into public perceptions and policy development around ICT and children. 2 Stacey Card -Thesis Table of Contents Keywords ............................................................................................................................... ! ABSTRACT ............................................................................ ...................................... ......... 2 Statement of Original Authorship ............................... .......... ................................................. 5 Acknowledgements ................................................................................................................ 6 Chapter 1: Introduction ............................................................................................ 7 1.1 Information Communication Technologies ..................................................................... 7 1.2 Moral Panic ........................................................................... ........................................ II 1.3 Research Aim and Questions .................................. ................................... .................. 12 1.4 Scope ofResearch ........................................................... ............................................... l3 1.5 Research Design........................................................ ..................................................... l4 1.6 Expected Outcomes ....................................................................................................... 15 1.7 Summary............................................................. ........................................................... l5 Chapter 2: Literature Review ................................................................................. 16 2. 1 ICT Integration within a Child Context... ................. ..................................................... l6 2.2 Parental Supervision of Children's ICT use .................................................................. !& 2.3 Social Emotional Benefits ofiCT. ....... ......................................................................... 21 2.4 TheRole oflnformation Communication Technologies in Education.......................... 23 2.5 Perceived PotentialRisks Associated with ICT............................................................. 28 2.5.1 Exposure to Inappropriate Material.... ........ ........................................... ................. 28 2.5.2 Cyber bullying ............. ................................ ........ .................................................... 29 2.5. 3 Risk Associated with Social Networking Sites (SNS)...... ................ ......................... 31 2.5.4 Disclosure of Sensitive Material .................. ............ ....... ......................................... 31 2.5.5 Vulnerability to predators ........................................ ........ .......................... ........... .. 32 2.5.6 Pathological internet use ............................. ......................•..................................•.. 33 2.5. 7 Summary ofPerceived Potential risks .......................... ............................. .............. 34 2.6 Influences of Parental Supervision ................................................................................ 36 2.7 Phenomenon of Moral Panic...... ................................................................................... 40 2.8 Four stages of Moral Panic .................. ..........................................................................40 2.9 Three Theories of Moral Panic ..................................................................................... 43 2. 10 Moral Panic and the Media ................ ............................. .............................................44 2.11 Summary ................................................................... ..... .............................................. 46 Chapter 3: Methodology..................................................... ..................................... 47 3 .I Conceptual Framework ................. ............................................. .................................... 47 3.2 Method of Analysis.................................................... .................................................... 50 3.3 Sampling ........................... ,.............................. .............................................................. 53 3.4 The Method of Investigation.................... .................... .................................................. 53 3.4.1 Moral Panic ............................................................................................................. 54 3.5 Key variables descriptors .......................................................................... ..................... 55 3.5.1 Themes ..... ...................... .......................................................................................... 55 3 Stacey Card -Thesis 3. 5. 2 Control Group ..... ............ ........ ...... ....... .................... ... ........... ............... ... .......... ..... 58 3. 5. 3 Persuasive tone and Sub-categories ....... ................. ........ ...... .. .... ... ............ ............. 58 3. 5. 4 Culture of Social Control .................. .................... .. ... .......... .... .... ...... ................... .. 59 3.6 Summary ................................ .......... .............................. ............................. .................. 62 Chapter 4: Results and Analysis......................................... .................................... 63 4.1 Representation oflnformation Communication Technologies... ..... ................ ..............64 4.1.1 Themes ........... ................... ..... ...................... ...................... ...................................... 64 4.1.2 Persuasive tone and Sub-categories ofArticles .. .... .................. ................ ......... ..... 67 4.2 Decontextualization of Articles .................... ................ .. .... ................ ........................... 73 4.3 Analysis of culture of social control .............................. ........ ........................................79 4.4 Four Stages of Moral Panic and Results ......... ........ ...... ............................. .......... .......... 89 4. 4.1 The warning stage ........................... ............... .......................... .... ........................... 90 4. 4. 2 The impact stage .. ............ ........... ............... ....... ....... ... ...... ............................. ........ .. 92 4. 4. 3 The inventory stage ..................................... ..................... ........................................ 93 4. 4. 4 The reaction stage .. ....... .................. .............. ......... ............. ..... ..... .......................... 94 4.5 Summary .......................................... ...... ............... ....... ..... ......................................... .... 97 Chapter 5: Conclusions ........................................................................................... 99 5. 1 Review of research aim.......... ...................................................... ..........
Recommended publications
  • Criminalization Downloads Evil: Reexamining the Approach to Electronic Possession When Child Pornography Goes International
    \\jciprod01\productn\B\BIN\34-2\BIN203.txt unknown Seq: 1 2-JUN-16 14:19 CRIMINALIZATION DOWNLOADS EVIL: REEXAMINING THE APPROACH TO ELECTRONIC POSSESSION WHEN CHILD PORNOGRAPHY GOES INTERNATIONAL Asaf Harduf* INTRODUCTION ................................................... 280 R I. THE LADDER OF CRIMINALIZATION ....................... 281 R A. The Matter of Criminalization ......................... 282 R B. The Rungs of the Ladder of Criminalization ........... 284 R 1. First Rung: Identifying the Conduct, Causation, and Harm ......................................... 285 R 2. Second Rung: Examining the Ability to Achieve Goals ............................................. 286 R 3. Third Rung: Examining Alternatives to Criminalization .................................... 287 R 4. Fourth Rung: Assessing the Social Costs of Solutions and Striking a Balance .................. 288 R C. Towards an Analysis of Child Pornography Possession ............................................. 288 R II. APPLICATION TO THE ELECTRONIC POSSESSION OF CHILD PORNOGRAPHY ............................................ 289 R A. First Rung: The Offensive Conduct of Electronic Possession ............................................. 292 R 1. Conduct of Electronic Possession .................. 292 R 2. Harms to Children ................................ 294 R 3. Causation: Four Possible Links .................... 295 R 4. Offensiveness: Summation ......................... 302 R B. Second Rung: Criminal Law’s Ability to Reduce Harm to Children ...........................................
    [Show full text]
  • Staying Moral in an Immoral World Ct Er Understanding What We Face Chara L and How We Can Help Others
    LINKING RHEMA GRADUATES AROUND THE WORLD inside: 4 // A Look at Character, Homosexuality, Pornography, Adultery, and More 9 // Q&A: I Think My Spouse Is Involved in Internet Pornography 11 // Tips: Ten Steps to Freedom in Christ 15 // Suggestions for Safe Use of the Internet 18 // Resources for Freedom and Restoration 19 // Where Are They Now? Staying Moral spring/summer 2009 in an Immoral World Lynette Hagin’s Women’s Conference Lynette Hagin “You, O Lord, keep my lamp burning; my Patsy Cameneti God turns my darkness into light. With your help I can advance against a troop; with my God I can scale a wall.” —Psalm 18:28–29 (NIV) Rhonda Lois Rogers September Taucher 24–26, 2009 On the RHEMA USA Campus • www.rhema.org/ktf The Bottom Line Let’s Take a Look at Morality KAREN JENSEN | RMAI/RAA Staff Minister “The truth is that most of the time kay, bold Connections reader—are you ready to dive into this issue? It deals with some pretty sensitive Othings—things that sometimes get swept under the rug, things that aren’t talked about in polite infidelity doesn’t society or in church! But for us to live powerful, relevant, effective lives as God’s ambassadors on this earth and help people be start below the victorious over everyday issues, it’s time to bring things out into the light. We need to reestablish some boundaries, get knowledge, and face real-life issues head-on. It’s time to talk about morality right in the waist. It starts middle of an immoral world.
    [Show full text]
  • S.T.O.P. Annual Report for 2004 (1 January to 31 December 2004)
    S.T.O.P. ANNUAL REPORT FOR 2004 (1 JANUARY TO 31 DECEMBER 2004) COMMITTEE The Committee comprised Chairperson, Secretary/ Treasurer and three additional members. Three evening meetings were held, the first being our Annual General Meeting on 8 March. This took place in Meadowridge Baptist Church hall with an attendance of approx. 150 and 11 apologies. Two other meetings were held in the Meadowridge Library. On 26 July 40 persons attended with 23 apologies and on 22 November 27 with 17 apologies. Events in 2004 kept us busy at a barely manageable pace. This has once again highlighted the need for more help in routine administrative tasks. Overall results have been encouraging and, even when a final outcome has been disappointing, we have encountered nothing but positive support from everyone involved. The enigma is that, whilst anti-porn sentiment on the ground is everywhere apparent, our country continues to be exploited by the purveyors of porn in every imaginable form - videos, magazines, cinema, films, T.V., the Internet, cell phones and computer games. Indeed the confluence of technology has become the arch-enemy in making porn easily available to every person - and child. Another visible trend is that the ever-increasing incidence of porn/sexual addiction, with its tragic effects on personal relationships and family life, is being recognized world-wide in the media and in scientific publications - and indeed is reflected locally in the number of calls for help received by S.T.O.P. During the year recognition of the harmful effects of exposure to porn, specifically on children and young people in our country, came from media statements by the senior police officer co-ordinating the Gauteng Child Protection and Sexual Offences Unit, the Manager of the Teddy Bear Clinic, Gauteng, and the Tygerberg Unit for traumatised children.
    [Show full text]
  • This File Was Downloaded From
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Queensland University of Technology ePrints Archive This is the author’s version of a work that was submitted/accepted for pub- lication in the following source: McNair, Brian (2014) Rethinking the effects paradigm in porn studies. Porn Studies, 1(1/2), pp. 161-171. This file was downloaded from: http://eprints.qut.edu.au/69160/ c Copyright 2014 Taylor & Francis Notice: Changes introduced as a result of publishing processes such as copy-editing and formatting may not be reflected in this document. For a definitive version of this work, please refer to the published source: http://doi.org/10.1080/23268743.2013.870306 Rethinking the effects paradigm in porn studies Brian McNair Queensland University of Technology One of the core questions for porn studies is that of effects. There are many ways of asking, but the question usually boils down to this: does the production, distribution and consumption of pornography cause harm to a society or not (defined as negative or adverse effects of various kinds on individuals, groups and socio-cultural life in general)? Moral conservative and some religious perspectives (religious believers are not necessarily anti-porn) assert that it does, as do anti-pornography feminist perspectives. The former implicate pornography, in so far as it advocates taboo- breaking, hedonistic, polygamous sex, in the erosion of ‘family values’ and heterosexist socio-sexual relations (specifically, the decline of the nuclear family as a core structure of capitalism, and the erosion of male domination inside and out of the domestic environment, including the bedroom).
    [Show full text]
  • Too Dark, Too Hairy, Too Much!": Representations of Arab Men And
    NOTE TO USERS This reproduction is the best copy available. UMJ "Too Dark, Too Hairy, Too Much!"1: Representations of Arab Men and "Arabness" in Contemporary Gay Male Pornography EVANGELOS TZIALLAS A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULLFULMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF ARTS GRADUATE PROGRAM IN FILM STUDIES YORK UNIVERSITY TORONTO, ONTARIO, CANADA AUGUST 2009 Library and Archives Bibliotheque et 1*1 Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A0N4 OttawaONK1A0N4 Canada Canada Your file Votre reference ISBN: 978-0-494-53836-4 Our file Notre reference ISBN: 978-0-494-53836-4 NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license allowing Library and permettant a la Bibliotheque et Archives Archives Canada to reproduce, Canada de reproduire, publier, archiver, publish, archive, preserve, conserve, sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par I'lnternet, preter, telecommunication or on the Internet, distribuer et vendre des theses partout dans le loan, distribute and sell theses monde, a des fins commerciales ou autres, sur worldwide, for commercial or non­ support microforme, papier, electronique et/ou commercial purposes, in microform, autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in this et des droits moraux qui protege cette these. Ni thesis. Neither the thesis nor la these ni des extraits substantiels de celle-ci substantial extracts from it may be ne doivent etre imprimes ou autrement printed or otherwise reproduced reproduits sans son autorisation.
    [Show full text]
  • Rhetorical Moves and Identity Performance in Online Child Sexual Abuse Interactions
    Some pages of this thesis may have been removed for copyright restrictions. If you have discovered material in Aston Research Explorer which is unlawful e.g. breaches copyright, (either yours or that of a third party) or any other law, including but not limited to those relating to patent, trademark, confidentiality, data protection, obscenity, defamation, libel, then please read our Takedown policy and contact the service immediately ([email protected]) Rhetorical moves and identity performance in online child sexual abuse interactions Volume One Emily Alice Chiang Doctor of Philosophy Centre for Forensic Linguistics Aston University September, 2018 © Emily Alice Chiang, 2018, asserts her moral right to be identified as the author of this thesis. This copy of the thesis has been supplied on condition that anyone who consults it is understood to recognise that its copyright belongs to its author and that no quotation from the thesis and no information derived from it may be published without appropriate permission or acknowledgement. !1 Centre for Forensic Linguistics Aston University Rhetorical moves and identity performance in online child sexual abuse interactions Emily Chiang Doctor of Philosophy 2018 Thesis Summary Online child sexual abuse (OCSA) is a pervasive problem facilitated by the anonymity afforded to offenders online. From a largely social constructionist perspective, this thesis explores linguistic expressions of identity by participants across a range of OCSA interactions, including offenders and suspected offenders, victims, and undercover police officers. The thesis is structured around three individual studies, each involving a different abusive interaction type. Each study employs Swales’ (1981; 1990) move analysis framework, exploring how participants use rhetorical moves as a resource for identity performance.
    [Show full text]
  • Child Molesters: a Behavioral Analysis for Law-Enforcement Officers Investigating Cases of Child Sexual Exploitation
    If you have issues viewing or accessing this file contact us at NCJRS.gov. ------ ------------ NATIONAL CENTER FOR )11s..~INC. 1~l[IJIJ()I'll~l) ---l...-~CHI LOREN Child Molesters: A Behavioral Analysis For law-Enforcement Officers Investigating Cases of Child Sexual Exploitation In cooperation with the Federal Bureau of Investigation The National Center for Missing and Exploited Children - provides training assistance to law-enforcement and child protection agencies to develop effective procedures to investigate and prosecute cases of missing and exploited children - assists individuals, groups, agencies, and state and local governments involved in inves­ tigating and prosecuting cases of criminally or sexually exploited children - provides information and advice on effective state legislation to assure the safety and protection of children - provides prevention and education programs for parents, schools, action groups, agencies, communities, volunteer organizations, law enforcement, and local, state, and federal institutions - distributes comprehensive instruction packages to aid cOIumunities in protecting children - organizes networks of information among school systems, school boards, parent-teacher organizations, and community organizations about proven techniques for implementing educational programs - conducts an outreach program to alert families, communities, the criminal justice system, and concerned organizations about the nature and extent ot child victimization and exploitation - ensures coordination among parents, missing children groups, and the media to distribute photos and descriptions of missing children - coordinates the exchange of information regarding child exploitation The Center is a primary resource for assistance and expertise in all these areas: Improving the Education Criminal Justice System Advocacy Prevention Public Awareness Legislation Toll-free Hotline The Center maintains a toll-free telephone number for those individuals who have information that could lead to the location and recovery of a missing child.
    [Show full text]
  • Persuasive Communication in Fireproof Ministries' Xxxchurch Anti-Pornography Campaign
    Brigham Young University BYU ScholarsArchive Theses and Dissertations 2012-06-11 We Need to Talk: Persuasive Communication in Fireproof Ministries' XXXchurch Anti-Pornography Campaign Vauna L. Davis Brigham Young University - Provo Follow this and additional works at: https://scholarsarchive.byu.edu/etd Part of the Communication Commons BYU ScholarsArchive Citation Davis, Vauna L., "We Need to Talk: Persuasive Communication in Fireproof Ministries' XXXchurch Anti- Pornography Campaign" (2012). Theses and Dissertations. 3247. https://scholarsarchive.byu.edu/etd/3247 This Thesis is brought to you for free and open access by BYU ScholarsArchive. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of BYU ScholarsArchive. For more information, please contact [email protected], [email protected]. We Need to Talk: Persuasive Communication in Fireproof Ministries’ XXXchurch Anti-Pornography Campaign Vauna Davis A thesis submitted to the faculty of Brigham Young University in partial fulfillment of the requirements for the degree of Master of Arts Kenneth D. Plowman, Chair Steven R. Thomsen Laurie J. Wilson Department of Communications Brigham Young University August 2012 Copyright © 2012 Vauna Davis All Rights Reserved ABSTRACT We Need to Talk: Persuasive Communication in Fireproof Ministries’ XXXchurch Anti-Pornography Campaign Vauna Davis Department of Communications, BYU Master of Arts The growing evidence of harm caused by pornography calls for interventions to counteract the influence of explicit sexual media. Fireproof Ministries conducts a major Christian anti-pornography campaign called XXXchurch. This case analysis of the campaign evaluated if the messages were appropriately designed in light of what persuasion research has discovered about motivating attitudinal and behavioral change.
    [Show full text]
  • Sex, Cell Phones, Privacy, and the First Amendment: When Children Become Child Pornographers and the Lolita Effect Undermines the Law
    SEX, CELL PHONES, PRIVACY, AND THE FIRST AMENDMENT: WHEN CHILDREN BECOME CHILD PORNOGRAPHERS AND THE LOLITA EFFECT UNDERMINES THE LAW Clay Calvert' 1. INTRODUCTION It is a sure-fire recipe for legal trouble: combine hormone-raging teens with image-transmitting technologies, and then stir them together in a sex-saturated society replete with outdated laws and a criminal justice system that never could have anticipated such a combustible confluence of forces. Signs and symptoms of this salacious problem are cropping up across the United States: - In March 2009, a fourteen-year-old boy in Brooksville, Florida, was ar- rested and "accused of sending a picture of his genitalia" to the cell phone of a female high school classmate. - That same month, a fourteen-year-old girl from Passaic County, New Jer- sey, faced child pornography charges "after posting nearly 30 explicit nude pictures of herself on MySpace.com---charges that could force her to register as a sex offender if convicted."2 - In January 2009, three high school girls from Westmoreland County, Pennsylvania "were charged with manufacturing and disseminating or possess- t Professor and Brechner Eminent Scholar in Mass Communication, University of Flor- ida, Gainesville, Fla. B.A., 1987, Communication, Stanford University; J.D. (Order of the Coif), 1991, McGeorge School of Law, University of the Pacific; Ph.D., 1996, Communica- tion, Stanford University. Member, State Bar of California. The author thanks Patrick Hani- fin for his review of early drafts of this article. I Boy Accused of Texting Sexually Explicit Photo, ST. PETERSBURG TIMES (Fla.), Mar. 3, 2009, at Hernando Times 3.
    [Show full text]
  • Online Safety and Media Sobriety Manual for Parents, Pastors, and Ministry Leaders
    Online Safety and Media Sobriety Manual for Parents, Pastors, and Ministry Leaders www.safefamilies.org About this Manual, TechMission, and Safe Families Safe Families is a program of TechMission, Inc. that was formed to assist parents in protecting their children from pornography and other dangers on the Internet. TechMission started in 2000 with its first program, the Association of Christian Community Computer Centers (AC4) with the goal addressing the digital divide, which is the gap between those who have access and training with computers and those without. AC4 is the largest association of faith-based community computer centers in the world with over 500 member serving over 50,000 individuals each year. As AC4 assisted in getting people across the digital divide, it became clear that it was one thing to get people across the digital divide, but it was another thing to get them across safely. Our vision for AC4 is "Computer Skills to Make a Living—A Spiritual Foundation to Make a Life." With many low-income families buying their first computer second-hand for $50, it is not reasonable to expect them to pay another $50 for Internet filtering software. Because of this, Safe Families has committed to distributing over 100,000 copies of free Internet filtering software in the next year. As we move into the information age, society is experiencing changes unlike ever before. We believe that it is important for all individuals to take an active role in addressing the social issues of the information age (like the digital divide) as well as the moral issues (like online safety and media sobriety).
    [Show full text]
  • Eyes of Integrity : the Porn Pandemic and How It Afects You / Craig Gross Retrieval System, Or Transmitted in Any Form Or by Any Means—For Example, with Jason Harper
    XXXchurch.com resource EYE S O F INTE GRI TY T H E P O R N PA N D E M I C AND H OW IT A FFECT S YOU CRAI G G R O S S W I TH JASON H ARPE R C Do not copy or distribute _Grss_Integrity_BB_djm.indd 3 6/10/10 12:47:54 PM Library of Congress Cataloging-in-Publication Data XXXXXXXXX XXXXXXXXXXXXXXXXXXXXXX p. cm. Includes bibliographical references. ISBN 978-0-0000-0000-0 (pbk.) 1. XXXXXXXXXXXXXXXXXXXXXX XX####### 2010 ##### ####—dc22 ########## © 2010 by Craig Gross 10 11 12 13 14 15 16 7 6 5 4 3 2 1 Published by Baker Books a division of Baker Publishing Group P.O. Box 6287, Grand Rapids, MI 49516-6287 E-book copyright sample. www.bakerbooks.com © 2000 by Copyright holder Printed in the United States of America Published by Baker All rights reserved. No part of this publication may be reproduced, stored in a retrieval a division of Baker Publishing Group system, or transmitted in any form or by any means—for example, electronic, photocopy, P.O. Box 6287, Grand Rapids, MI 49516-6287 recording—without the prior written permission of the publisher. The only exception is www.website.com brief quotations in printed reviews. E-book edition created 2010 Library of Congress Cataloging-in-Publication Data Gross, Craig, 1975– All rights reserved. No part of this publication may be reproduced, stored in a Eyes of integrity : the porn pandemic and how it afects you / Craig Gross retrieval system, or transmitted in any form or by any means—for example, with Jason Harper.
    [Show full text]
  • Imagereal Capture
    PORNOGRAPHY -AN ARGUMENT FOR CENSORSHIP Senior Lecturer in Law, University of Canterbury I. INTRODUCTION The Films, Videos, and Publications Classification Bill 1992 has once again focused public attention on the issues of the desirability and imple- mentation of censorship law in New Zealand. With these issues of censor- ship, which have been recognised by New Zealand judges to raise notoriously difficult questions of social policy,' academics have tradition- ally favoured the freedom of circulation side of the case. My own personal view once was that the dangers of censorship outweighed the dangers of pornography, but study of the various Commissions of Inquiry and re- searchers in the area has persuaded me otherwise. Hence, the purpose of this article is not to examine in detail either the criteria or the mechanics of the new legislation, which is assured of enactment, but to show why I believe that the Classification Office and Board of Review, when making classification decisions in the future, should reflect current community standards demanding strong censorship. Thirty years ago, discussion about pornography and censorship revolved around such titles as Baldwin's 'Another Country', Lawrence's 'Lady Chatterley's Lover', and Nabokov's 'L~lita'.~There may then have been legitimate grounds for concern over the effects of censorship on artistic and intellectual freedom, and over an alleged ''... puritanical protectionism ofNew Zealanders of amazing rigidity".3 But the nature of material under discussion in the debate on censorship has changed dramati~ally,~and debate now revolves around such titles as 'Asses' and 'Legs', to select the least offensive. In the contemporary New Zealand context, there is, in my view, simply no realistic risk of a work with an artistic, literary intent, or with a socially serious purpose, being subject to censorship.
    [Show full text]