Entity Linking Aleksander Smywinski-Pohl´

Total Page:16

File Type:pdf, Size:1020Kb

Entity Linking Aleksander Smywinski-Pohl´ Proceedings of the PolEval 2019 Workshop Maciej Ogrodniczuk, Łukasz Kobyliński (eds.) j Institute of Computer Science, Polish Academy of Sciences Warszawa, 2019 Contents PolEval 2019: Introduction Maciej Ogrodniczuk, Łukasz Kobylinski´ . .5 Results of the PolEval 2019 Shared Task 1: Recognition and Normalization of Temporal Expressions Jan Kocon,´ Marcin Oleksy, Tomasz Berna´s, Michał Marcinczuk´ . .9 Results of the PolEval 2019 Shared Task 2: Lemmatization of Proper Names and Multi-word Phrases Michał Marcinczuk,´ Tomasz Berna´s................................. 15 Results of the PolEval 2019 Shared Task 3: Entity Linking Aleksander Smywinski-Pohl´ . 23 PolEval 2019: Entity Linking Szymon Roziewski, Marek Kozłowski, Łukasz Podlodowski . 37 Results of the PolEval 2019 Shared Task 4: Machine Translation Krzysztof Wołk . 47 The Samsung’s Submission to PolEval 2019 Machine Translation Task Marcin Chochowski, Paweł Przybysz . 55 Results of the PolEval 2019 Shared Task 5: Automatic Speech Recognition Task Danijel Koržinek . 73 Automatic Speech Recognition Engine Jerzy Jamro˙zy, Marek Lange, Mariusz Owsianny, Marcin Szymanski´ . 79 Results of the PolEval 2019 Shared Task 6: First Dataset and Open Shared Task for Automatic Cyberbullying Detection in Polish Twitter Michał Ptaszynski,´ Agata Pieciukiewicz, Paweł Dybała . 89 Simple Bidirectional LSTM Solution for Text Classification Rafał Pronko´ .............................................. 111 4 Comparison of Traditional Machine Learning Approach and Deep Learning Models in Automatic Cyberbullying Detection for Polish Language Maciej Biesek . 121 Przetak: Fewer Weeds on the Web Marcin Ciura . 127 Approaching Automatic Cyberbullying Detection for Polish Tweets Krzysztof Wróbel . 135 Exploiting Unsupervised Pre-Training and Automated Feature Engineering for Low-Resource Hate Speech Detection in Polish Renard Korzeniowski, Rafał Rolczynski,´ Przemysław Sadownik, Tomasz Korbak, Marcin Mo˙zejko . 141 Universal Language Model Fine-Tuning for Polish Hate Speech Detection Piotr Czapla, Sylvain Gugger, Jeremy Howard, Marcin Kardas . 149 A Simple Neural Network for Cyberbullying Detection (abstract) Katarzyna Krasnowska-Kiera´s, Alina Wróblewska . 161 PolEval 2019: Introduction Maciej Ogrodniczuk, Łukasz Kobylinski´ (Institute of Computer Science, Polish Academy of Sciences) This volume consists of proceedings of PolEval session, organized during the AI & NLP Day 2019 (https://nlpday.pl), which took place on May 31st, 2019 at the Institute of Computer Science, Polish Academy of Sciences in Warsaw. PolEval (http://poleval.pl) is an evaluation campaign organized since 2017, which focuses on Natural Language Processing tasks for Polish, promoting research on language and speech technologies. As a consequence of the global growth of interest in Natural Language Processing and rising number of published papers, frameworks for an objective evaluation and comparison of NLP-related methods become crucial to support effective knowledge dissemination in this field. Following the initiatives of ACE Evaluation1, SemEval2, or Evalita3, we have observed the need to provide a similar platform for comparing NLP methods, which would focus on Polish language tools and resources. Since 2017 we observe a steady growth of interest in PolEval participation: the first edition has attracted 20 submissions, while in 2018 we have received 24 systems for evaluation. During the 2019 edition of PolEval six different tasks have been announced and teams from both academia and business submitted 34 systems in total (see Figure 1). In 2019 the systems competed in the following tasks: — Task 1: Recognition and normalization of temporal expressions — Task 2: Lemmatization of proper names and multi-word phrases — Task 3: Entity linking — Task 4: Machine translation (EN-PL, PL-RU, RU-PL) — Task 5: Automatic speech recognition — Task 6: Automatic cyberbullying detection (harmful vs non-harmful and detecting type of harmfulness). 1https://en.wikipedia.org/wiki/Automatic_content_extraction 2https://en.wikipedia.org/wiki/SemEval 3http://www.evalita.it/ 6 Maciej Ogrodniczuk, Łukasz Kobylinski´ 30 20 10 2017 2018 2019 Submissions per task (avg) Submissions Figure 1: Number of PolEval submissions and average submissions per task in 2017–2019 The number of submissions per each task has varied greatly (see Figure 2): the subject of hate speech and cyberbullying has attracted the most submissions during this edition of the campaign. 16 15 10 6 Submissions 5 4 4 3 1 0 Task 1 Task 2 Task 3 Task 4 Task 5 Task 6 Figure 2: Number of PolEval submissions per task in 2019 We hope you will join us next year for PolEval 2020! Please feel free to share your ideas for improving this competition or willingness to help in organizing your own NLP tasks. Organizers Concept and administrative issues Maciej Ogrodniczuk (Institute of Computer Science, Polish Academy of Sciences) Łukasz Kobylinski´ (Institute of Computer Science, Polish Academy of Sciences and Sages) Task 1: Recognition and normalization of temporal expressions Jan Kocon´ (Wrocław University of Science and Technology) Task 2: Lemmatization of proper names and multi-word phrases Michał Marcinczuk´ (Wrocław University of Science and Technology) Task 3: Entity linking Aleksander Smywinski-Pohl´ (AGH University of Science and Technology) Task 4: Machine translation Krzysztof Wołk (Polish-Japanese Academy of Information Technology) Task 5: Automatic speech recognition Danijel Koržinek (Polish-Japanese Academy of Information Technology) Task 6: Automatic cyberbullying detection Michał Ptaszynski´ (Kitami Institute of Technology, Japan) Agata Pieciukiewicz (Polish-Japanese Academy of Information Technology) Paweł Dybała (Jagiellonian University in Kraków) Results of the PolEval 2019 Shared Task 1: Recognition and Normalization of Temporal Expressions Jan Kocon,´ Marcin Oleksy, Tomasz Berna´s, Michał Marcinczuk´ (Department of Computational Intelligence, Wrocław University of Science and Technology) Abstract This article presents the research in the recognition and normalization of Polish temporal expressions as the result of the first PolEval 2019 shared task. Temporal information extracted from the text plays a significant role in many information extraction systems, like question answering, event recognition or text summarization. A specification for annotating Polish temporal expressions (PLIMEX) was used to prepare a completely new test dataset for the competition. PLIMEX is based on state-of-the-art solutions for English, mostly TimeML. The training data provided for the task is Polish Corpus of Wrocław University of Science and Technology (KPWr) fully annotated using PLIMEX guidelines. Keywords natural language processing, information extraction, temporal expressions, recognition, normalization, Polish 1. Introduction Temporal expressions (henceforth timexes) tell us when something happens, how long some- thing lasts, or how often something occurs. The correct interpretation of a timex often involves knowing the context. Usually, people are aware of their location in time, i.e., they know what day, month and year it is, and whether it is the beginning or the end of week or month. Therefore, they refer to specific dates, using incomplete expressions such as 12 November, Thursday, the following week, after three days. The temporal context is often necessary to determine to which specific date and time timexes refer. These examples do not exhaust the complexity of the problem of recognizing timexes. 10 Jan Kocon,´ Marcin Oleksy, Tomasz Berna´s, Michał Marcinczuk´ The possibility of sharing information about recognized timexes between different information systems is very important. For example, a Polish programmer may create a method that will recognize the expression the ninth of December and normalize it (knowing the context of the whole document) to the form 09.12.2015. A programmer from the United States could create a similar method that normalizes the same expression to a form 12/9/2015. A serious problem is the need to use the information from two such methods, e.g. for the analysis of multilingual text sources, where the expected effect is a certain metadata unification and the application of international standards. Normalization allows to determine the machine- readable form of timexes and requires the analysis of each expression in a broad context (even the whole document), due to the need to make some calculations on relative timexes, such as five minutes earlier, three hours later. TimeML (Saurí et al. 2006) is a markup language for describing timexes that has been adapted to many languages. The specification was created as part of the TERQAS1 workshop, as part of the AQUAINT project2, aimed at improving the quality of methods for question answering(Pustejovsky et al. 2005). The aim of this study was to improve access to information in the text with the focus on in-depth analysis of the content, not only through keywords. A key problem was the recognition of events and their location in time. 2. Task Description The aim of this task is to advance research on the processing of timexes, which are used in other NLP applications like question answering, textual entailment, document classification, summarization, etc. This task follows on from previous TempEval events organized for evaluating time expressions for English and Spanish like SemEval-2013 (UzZaman et al. 2013). This time a corpus of Polish documents fully annotated with temporal expressions was provided. The annotation consists of
Recommended publications
  • Fantamag.Com & Storemags.Com
    A plan for Haiti Massachusetts stuns Obama New rules for banks Dark days for lawyers and consultants JANUARY 23RD–29TH 2010 Economist.com The psychology of power Stop! The backlash against big government www.storemags.com & www.fantamag.com Njetj{fcvtjofttftbsfuif fohjoftpgbtnbsufsqmbofu/ Xfbsfmjwjohpobwfszejggfsfouqmbofugspnuifpofxf JCNboepvsCvtjofttQbsuofstbsfxpsljohxjui mjwfepofwfobgfxzfbstbhp/Upebz-bmnptubozuijohjo uipvtboetpgnjetj{fdpnqbojftbspvoeuifxpsme uifxpsmedbocfjotusvnfoufe-joufsdpoofdufeboenbef upcvjmebtnbsufsqmbofu/XfÖsfqspwjejohuifjotjhiut joufmmjhfouÒuiftztufnt-qspdfttftboeefwjdftuibu boeuppmtuifzoffeupxpslnpsfqspevdujwfmzboe fobcmfqiztjdbmhppetupcfefwfmpqfe-nbovgbduvsfe- qspßubcmzÒqpxfsgvm-bggpsebcmftpmvujpotuibudbo cpvhiuboetpme<tfswjdftupcfefmjwfsfe<boecjmmjpot ifmqdpnqbojftjnqspwffgßdjfodz-epnpsfxjuimftt- pgqfpqmfupcpuixpslboemjwf/Jotipsu-pvsqmbofujt bddfmfsbufSPJboetfj{fofxpqqpsuvojujftgbtufs/ cfdpnjohtnbsufs/ XfÖsfbqqmzjohpvsdpmmfdujwfefquiboecsfbeuipg fyqfsjfodfxpsljohxjuijoopwbupstpgbmmtj{ft-bdsptt Uijtjtqpttjcmf-jombshfqbsu-cfdbvtfuifjoopwbujpo fwfszjoevtusz-upbeesfttkvtubcpvuboztj{fqspcmfn- esjwjohbtnbsufsqmbofujtpsjhjobujohboeqspmjgfsbujoh ubtlpsxpslmpbe/ gspnnpsfwbsjfetpvsdftuibofwfscfgpsf/Jogbdu-xifo zpvmpplbubmmuifofxpqqpsuvojujftfnfshjoh-zpvnjhiu Btpvsqmbofucfdpnfttnbsufs-njetj{fcvtjofttft uijoluibuuifzpomzbqqmzupmbshfsfoufsqsjtft/Cvu xjmmxjfmenpsfpguifjoàvfodfuibupodfcfmpohfeup josfbmjuz-njetj{fdpnqbojftibwfcffouiffohjoft pomzuifmbshftufoufsqsjtftÒ boeJCNboepvsCvtjoftt esjwjohfdpopnjdhspxuiboebtnbsufsqmbofugpstpnf
    [Show full text]
  • RISKS Volume 18
    The Risks Digest Volume 18: Issue 1 Forum on Risks to the Public in Computers and Related Systems ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator Volume 18: Issue 1 Friday 5 April 1996 Contents Sixth Computers, Freedom and Privacy Shabbir J. Safdar A Wiretap Incident in New Orleans Shabbir J. Safdar Computer Error Costs MCI $Millions Scott Lucero Teen Accused of Hacking David M Kennedy Only Americans can contact the AT&T operator Tom Gardner Re: Wrong approach to Java security Frank Stuart Re: Risks of rewritable BIOSes Jeremy J Epstein Re: "This is not a bug" messages: MacsBug David A. Lyons Re: The Queen's Speech Allan Engelhardt Re: Notes on e-mail: Use of diaeresis Dan Hicks http://catless.ncl.ac.uk/Risks/18.01.html (1 of 21)2005-04-14 18:22:01 The Risks Digest Volume 18: Issue 1 Daan Sandee On the meaning of "email" Clive Feather Browser return e-mail addresses Walter Roberson Info on RISKS (comp.risks) Sixth Computers, Freedom and Privacy Shabbir J. Safdar <[email protected]> Thu, 04 Apr 1996 16:05:34 -0500 I attended last week's Sixth Computers, Freedom, and Privacy conference in Cambridge MA, where policy-makers, technical experts, and activists came together to hash out the intersection of the three elements of its title. CFP is an unusual place; the closest thing our community can get to "neutral ground" on many issues. This is best expressed by the fact that in the hallways of the hotel, it's not unusual to see those that supported and those that fought the Communications Decency Act hob-nobbing it up, trading friendly swipes about their take on the bill.
    [Show full text]
  • What We Can Learn About China from Research Into Sina Weibo
    CHINESE SOCIAL MEDIA AS LABORATORY: WHAT WE CAN LEARN ABOUT CHINA FROM RESEARCH INTO SINA WEIBO by Jason Q. Ng English Literature, A.B., Brown University, 2006 Submitted to the Graduate Faculty of the Dietrich School of Arts and Sciences in partial fulfillment of the requirements for the degree of Master of Arts of East Asian Studies University of Pittsburgh 2013 fcomfort UNIVERSITY OF PITTSBURGH THE DIETRICH SCHOOL OF ARTS AND SCIENCES This thesis was presented by Jason Q. Ng It was defended on April 9, 2013 and approved by Pierre F. Landry, Associate Professor, Political Science Ronald J. Zboray, Professor, Communication Mary Saracino Zboray, Visiting Scholar, Communication Thesis Director: Katherine Carlitz, Assistant Director, Asian Studies Center ii Copyright © by Jason Q. Ng 2013 iii CHINESE SOCIAL MEDIA AS LABORATORY: WHAT WE CAN LEARN ABOUT CHINA FROM RESEARCH INTO SINA WEIBO Jason Q. Ng, M.A. University of Pittsburgh, 2013 Like all nations, China has been profoundly affected by the emergence of the Internet, particularly new forms of social media—that is, media that relies less on mainstream sources to broadcast news and instead relies directly on individuals themselves to share information. I use mixed methods to examine how three different but intertwined groups—companies, the government, and Chinese Internet users themselves (so-called “netizens”)—have confronted social media in China. In chapter one, I outline how and why China’s most important social media company, Sina Weibo, censors its website. In addition, I describe my research into blocked search terms on Sina Weibo, and explain why particular keywords are sensitive.
    [Show full text]
  • Rachel Coldicutt OBE—Written Evidence (FEO0122)
    Rachel Coldicutt OBE—written evidence (FEO0122) House of Lords Communications and Digital Committee inquiry into Freedom of Expression Online 2. How should good digital citizenship be promoted? How can education help? 2.1 This evidence submission makes the case that good digital citizenship requires a wider choice of platforms, supported by new models of ownership, and increased scrutiny of digital platforms’ business strategies and internal success metrics. Educating users to be better digital citizens is one part of the puzzle, but for education to be effective, digital platforms must be held accountable for creating better civic spaces, and digital citizens must be entitled to exercise due rights and benefit from protections. 2.2 The concept of “good digital citizenship” is not easily defined, and any consideration of it must take into account the differences between life online and life offline. 2.3 Firstly, where is a digital citizen a citizen of? The history and ownership structures of “cyberspace” do not make it easy for individuals to translate the norms that may be expected offline into the online world. Digital governance is a complex topic and, while there is not space to give a complete overview here, it is worth noting that true “digital sovereignty” – the ability of a state or group of states to “act independently in the digital world”1 – is not baked into the products and services that most people use day-to-day. 2.4 It is now generally accepted that a single global Internet has been replaced by the “Splinternet”, a set of discrete socio-political technical territories.2 In 2018, O’Hara and Hall identified four internets – and the cultural values of those four dominant territories define the global digital experience.
    [Show full text]
  • Dolphins in the Net: Internet Content Filters and the Advocate General’S Glawischnig-Piesczek V
    STANFORD Dolphins in the Net: Internet Content Filters and the Advocate General’s Glawischnig-Piesczek v. Facebook Ireland Opinion Daphne Keller Director of Intermediary Liability 2019 559 Nathan Abbot Way Stanford, CA 94305 cyberlaw.stanford.edu Dolphins in the Net: Internet Content Filters and the Advocate General’s Glawischnig- Piesczek v. Facebook Ireland Opinion Daphne Keller1 Stanford Center for Internet and Society September 4, 2019 Table of Contents I. Introduction ...................................................................................................... 2 II. Process and Representation Issues .................................................................. 7 III. Making Facebook Monitor and Filter Users’ Posts ......................................... 11 A. Policy Backdrop ........................................................................................... 12 B. Legal Analysis .............................................................................................. 15 1. Fundamental Rights .....................................................................................17 a. What “Identical” or “Equivalent” Content Is to Be Filtered? .................. 19 i. “Identical” Content ................................................................................ 19 ii. “Equivalent” Content ............................................................................ 22 b. How Much of the Filtered Content Will Be Illegal?................................. 23 c. What Happens if Filters Take Down Legal Content?
    [Show full text]
  • Bishop Fox Cybersecurity Style Guide
    BISHOP FOX CYBERSECURITY STYLE GUIDE VERSION 1.1 JUNE 27, 2018 This work is licensed under a Creative Commons Attribution-ShareAlike 2.0 Generic License. Bishop Fox Contact Information: +1 (480) 621-8967 [email protected] 8240 S. Kyrene Road Suite A-113 Tempe, AZ 85284 Contributing Technical Editors: Brianne Hughes, Erin Kozak, Lindsay Lelivelt, Catherine Lu, Amanda Owens, Sarah Owens We want to thank all of our Bishop Fox consultants, especially Dan Petro, for reviewing and improving the guide’s technical content. Bishop Fox™ 2018/06/27 2 TABLE OF CONTENTS Welcome! ................................................................................................................................. 4 Advice on Technical Formatting ........................................................................................................ 5 What to Expect in the Guide .............................................................................................................. 6 The Cybersecurity Style Guide .............................................................................................. 7 A-Z .......................................................................................................................................................... 7 Appendix A: Decision-making Notes .................................................................................. 96 How We Choose Our Terms ............................................................................................................96 How to Codify Your Own Terms ......................................................................................................97
    [Show full text]
  • Pdf Compiledsquare-Manual0109-Proof
    GNU Essentials GNU Linux Manual of Style for Technical Content Creators 2020 Copyright (c) GNU Essentials ISBN: 978-1-71683-468-4 Manufactured in the United States of America You may distribute the GNU Linux Manual of Style and/or modify the GNU Linux Manual of Style under the following terms: Code GNU General Public License (http://www.gnu.org/licenses/gpl.html), version 3 or later Content Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), version 4.0 or later (Other content used in the book was this license, so this became the preferred license) Trademarks: Respecting the choice to trademark by others, we do not have trademark rules for GNU Essentials, FAQ Linux, R00T magazine or A-Z Technical Writing. Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries. Foreword About the Author Overview Dedication Revision History 1. Documentation Development Life Cycle 1.0 Basics of Technical Authoring...........................................................................................................11 1.1 Documentation Development Life Cycle............................................................................................11 1.2 Example: Get Started Guide..............................................................................................................29 Chapter 2. GNU Linux Style Guidelines 2.0 Headings...........................................................................................................................................35 2.1 Images.............................................................................................................................................
    [Show full text]
  • The Scunthorpe Problem
    THE SCUNTHORPE PROBLEM Darryl Francis Brampton, Cumbria, England [email protected] Scunthorpe is an industrial town in North Lincolnshire, England, with a population of about 80,000. So, what’s the Scunthorpe problem? According to Wikipedia: “The Scunthorpe problem is the blocking of websites, e-mails, forum posts or search results by a spam filter or search engine because their text contains a string of letters that appear to have an obscene or unacceptable meaning. Names, abbreviations, and technical terms are most often cited as being affected by the issue. The problem arises since computers can easily identify strings of text within a document, but interpreting words of this kind requires considerable ability to interpret a wide range of contexts, possibly across many cultures, which is an extremely difficult task for computers at present. As a result, broad blocking rules may result in false positives affecting innocent phrases.” The four letters at the heart of the Scunthorpe problem were the basis for the research in this article. There are many dictionaries of slang which list numerous words beginning with those four letters. An extensive source is the excellent three-volume Green’s Dictionary of Slang, published in 2010; also available at www.greensdictofslang.com. However, the thrust of this article is to document some of the types of words that just coincidentally contain the Scunthorpe tetragram appearing together and in order. Let’s take a look at what can be found in traditional paper dictionaries. Webster’s Second Edition contains two such words: • placuntitis: the same as placentitis, inflammation of the placenta; • placuntoma: the same as placentoma, a tumor developed from the placenta or placental remnants.
    [Show full text]
  • Walk the Line
    Walking the Line in Computational Creativity: Paradox and Pitfall in the Mitigation of Automated Offense Tony Veale School of Computer Science, University College Dublin, Ireland. [email protected] Abstract or land too far away to be valued as meaningful or useful. Social media is now the megaphone of choice for many While the “ugly” represents the worst of the rest, the set of digital-age provocateurs. Social networks offer a wealth outputs most likely to cross the line and cause real offense, of examples of egregious misbehaviour by humans, but it also overlaps as much with the “good” as with the “bad.” perhaps more worryingly, they also serve to magnify and Ugliness is not the absence of beauty, nor is it its opposite. weaponize the automated outputs of generative systems. These are complementary qualities that can sit side by side So what responsibilities do the creators of these systems in the same outputs. One can craft an elegant turn of phrase bear for the offenses caused by their creations, and what or a masterly image to express a truly abhorrent viewpoint. can they do to prevent, or mitigate, the worst excesses? If the ugly were just a subset of the bad, we could reduce For those who “make things that make things,” the issue the potential for offense by simply making a system better is further complicated by the potential of our systems to at what it is meant to do. However, as one can sit cheek by accidentally tread on the feelings of others. When does a norm become a troubling stereotype, and how should jowl with the other, an appealing surface is no guarantee a system built on social norms avoid crossing the line? that an appalling message is not lurking beneath.
    [Show full text]
  • Censorship, Privacy and Internet
    Censorship, privacy and Internet Kaido Kikkas SPEAIT 2016/2017 2016 Kaido Kikkas. This document is dual-licensed under the GNU Free Documentation License (v l.2 or newer) and the Creative Commons Attribution-ShareAlike (BY-SA) 3.0 Estonia or newer license "There is nothing new under the sun" (Ecclesiastes) • Censorship has been tracked back to Ancient Egypt • Classical Greek and Roman civilizations had it too • Mentioned in the Bible (persecution of prophets) • Index librorum prohibitorum • The USSR outlawed all religious literature • ... 15.11.16 America the Beautiful • On the one hand, strives to be a model democracy • On the other hand, has a history of hard censorship • Comstock Act (Federal Anti-Obscenity Act) - signed in 1873, has not been voided yet ● Voltaire, Boccaccio, Chaucer.... ● 1001 Nights (considered “youth literature” in the USSR!) ● Dr Dolittle by Hugh Lofting ● Uncle Tom's Cabin by Harriet Beecher Stowe ● Tom Sawyer and Huckleberry Finn by Mark Twain 15.11.16 Internet censorship • A relatively new phenomenon, starting mostly in the nineties • A reason: stems from radically different roots and culture than censorship hardliners – the latter just were not aware of it for awhile 15.11.16 Importance of the issue • Access to information is a condition for being full citizens • Limitations put it under question • Information ==> power ==> money • Suppression of dissent <==> democracy • But recently has been most notable in the “democratic West” 15.11.16 Depends on how you call it • Filtering => "remove dirt, keep the clean stuff“ • Blocking => "denying access“ • Censoring => "(ab)using power to deny access" SAME MEANING, DIFFERENT ATTITUDES 15.11.16 The world in 2011 https://commons.wikimedia.org/wiki/File:Internet_Censorship_and_Surveillance_World_Map.svg 15.11.16 Beginning • 1990 – U.S.
    [Show full text]
  • Accessed Here
    Notes These notes cite sources I consulted while writing Euphemania. A page number from Euphemania appears at left, followed by a keyword or keywords from the relevant passage, then the source. Because most of these sources are listed in the bibliography of Euphemania, only brief citations are given here. If a source is not included in the bibliography, complete publication information is provided. 1. Mincing Words 3 Haruf: Kent Haruf, Plainsong (New York: Knopf, 1999), 127. 4 Churchill: Holder, 404. Although Langworth, 581, questions the authenticity of this episode, as do others, Churchill’s granddaughter Celia Sandys recounts it in a Daily Mail interview, September 6, 2008. 5 environmentalist: Elizabeth Kolbert, “Green Like Me,” New Yorker, August 31, 2009, 73. 5 FBI agent: NBC Nightly News, January 17, 2009. 5 homosexuals: Ayto, 105–7; Bertram, 163, 197, 270–71; Holder, 181, 285; George Pelecanos, The Big Blowdown (New York: St. Martin’s Press, 1996), 193; McHenry, 533–48; Anthony, 202. 6 Müller: Müller, Land of Green Plums, 71. 7 Eupheme, euphemism: David Kravitz, Who’s Who in Greek and Roman Mythology (New York: Clarkson Potter, 1975), 95; Burchfield, “An Outline,” 13; OED. 9 Cape of Good Hope: Griffin, 32; Cape Point, http://www.capepoint.co.za/flying_dutchman/follow_the_map/ (accessed March 25, 2010). 9 emerging consumers: New Yorker, December 21 & 28, 2009, 96. 9 Greeks and Romans: Griffin, 33–34. 9 execution: Griffin, 34; OED. 10 BBC correspondent: Mark Doyle, The World (PRI), November 25, 2008. 12 2008 press account: New Yorker, July 21, 2008. 12 Holder: R. W. Holder, A Dictionary of Euphemisms: How Not to Say What You Mean.
    [Show full text]
  • Cenzura Internetu
    LISTOPAD 2016 BACKGROUND REPORT| XXII | OSN | UNESCO | 01 AMO.CZ Cenzura internetu Konstantin Sulimenko PRAŽSKÝ STUDENTSKÝ SUMMIT | WWW.STUDENTSUMMIT.CZ 1 Úvod Internet za posledních několik desetiletí způsobil revoluci v oblasti komunikace. Zvláštní zpravodaj Rady pro lidská práva ostatně nedávno přístup k internetu dokonce označil za jedno ze základních lidských práv.1 Rozvoj jeho možností však naráží na pokusy o jejich regulaci. V drtivé většině států světa regulace zahrnuje cenzuru nemorálního a nelegálního materiálu, například dětské pornografie, v dalších se pak reguluje i obsah chráněný autorským právem nebo nepovolené zveřejňování osobních údajů. Hlavní část tohoto dokumentu se však zaměřuje na cenzuru informací, které lze skrze internet sdílet, a na cenzuru přístupu k nim. Nejeden autoritářsky řízený stát svobodu vyjadřování i svobodný přístup k informacím v rozporu s platným mezinárodním právem potlačuje. Na UNESCO jakožto na organizaci, která si vzala za cíl chránit svobodu slova, tedy leží úkol určit rámce svobodného pohybu online. Cenzuru pro účely tohoto dokumentu chápeme jako znepřístupnění informace nebo zamezení možnosti tvořit informaci, která je cenzorem považována za škodlivou nebo nežádoucí. 1.1 Historie internetu Původ internetu můžeme odvodit od ARPAnetu (ARPA je odvozeno od Advanced Research Projects Agency) Ministerstva obrany Spojených států amerických.2 Zároveň s tímto projektem vznikaly i další sítě, ať už jako prostředky komerční nebo veřejné sféry, dlouho se je však nedařilo propojit mezi sebou. Zlom nastal
    [Show full text]