Filtering the Future? for Most of Human History the Word "Filter" Has Had an Entirely Unambiguous Meaning

Total Page:16

File Type:pdf, Size:1020Kb

Filtering the Future? for Most of Human History the Word 1. Chapter One -- INTRODUCTION Filtering the Future? For most of human history the word "filter" has had an entirely unambiguous meaning. Ask the average person on the street to name a filter, and they will likely point to one of the following mundane objects of everyday life. For those unfortunate enough to live in cities with poor tasting tap water (Boston and Philadelphia certainly come to mind), the dechlorinating, makes my tea tastes better "water filter" will likely be mentioned. Among the Starbucks, and XandO set -- or for that matter, any caffeine junkie -- the "coffee filter" will be mentioned as an irreplaceable invention for the mourning rush to work, or the late night cram session. Finally, for those unable to kick the nicotine habit, "Marlboro filtered cigarettes" will come to mind, as a cough comes to their mouth. All of these everyday, common knowledge filters deal with physical, atom-based particles. The water filter traps chlorine and lead molecules, the coffee filter keeps ground rhines out of the final product, and the cigarette filter removes some of the harmful carcinogenic compounds about to be inhaled. The physical aspect of these filtering processes is reflected in the Oxford English Dictionary's definition of filter, "To pass (a liquid) through a filter, or some porous medium, for the purpose of removing solid particles or impurities (emphasis added)." The use and definition of filters shows that they are employed to get rid of something unwanted. A byproduct of the last epoch of human history, the Industrial Revolution (focused on manufacturing atoms), has been heavy levels of air and water pollution. As such, we have developed advanced air and water filters to keep our environment more or less livable. 2. In this century, largely following World War II, the Industrial Revolution was replaced by the much hyped "Information Revolution" (Bell, 1973; Toffler, 1980). Negroponte (1995) notes that the central difference between the industrial and information revolutions is the shift from "atoms to bits." By this, Negroponte means, that the economic and cultural forces which shape our society are no longer governed by the manufacture of physical, atom-based goods (planes and cars), but rather the production and dissemination of vast amounts of information (news and entertainment). Due to incredible advances in computing, all of this information can be digitized, thus acquiring the unique characteristics of bits, namely convergence, compression, increased speed of dissemination, and intelligence in the channel (Neuman, 1991), or what Negroponte calls "bits about bits (1995: 18)". All of these factors have coalesced on the network of networks known as the Internet, and its graphical, multimedia counterpart, the World Wide Web. While the net and the web are relentlessly hyped as the answer to all of the world's problems by digital soothe sayers like Negroponte, Howard Rheingold (1993), and Bill Gates (1996, 1999), just like the pollution of the Industrial Revolution, the information society has its own unwanted byproducts. Perhaps the most problematic of unwanted consequences in the Information Revolution, is an overabundance of information. Due to the characteristics of bits described above, literally anyone can become an information producer, and make his/her content, regardless of quality, accuracy, relevance, or appropriateness (all value judgments) available to a world-wide audience on the Internet. While such low barriers to entry may be seen as very democratic, they have produced a situation where the information consumer must sort through more than 5 million web sites (Netcraft, June 1999), 90,000 topical mailing lists (as indexed by Liszt.com, June 1999), 60,000 Usenet 3. newsgroups (as indexed by DejaNews, June 1999), and 51,000 Internet Relay Chat channels (Liszt.com, June 1999), to locate desired material. As anyone who has used an Internet search engine can testify, searching for topical information often produces an overwhelming number of links, many to entirely irrelevant sites. This trend towards more and more information, but less and less meaning and understanding (Baudrillard, 1983) has been called "information glut" by Postman (1992), "data smog" by Shenk (1997), and "garbage information" by Schiller (1976). "All told, the thesis is that enormous amounts of greatly increased information in the modern age are of dubious value. There undoubtedly is more information about today, but its informational quality is suspect in the extreme" (Webster, 1995: 125). What is the solution to all of this unwanted, low quality information? Clearly the answer is filters. However, it is extremely important to note the difference between the physical filters needed for the Industrial Revolution, and the information filters we need today. Atom-based filters deal with physical world objectively defined atoms, molecules, particles, etc. If you do not want chlorine in you tap water, you study the properties of chlorine molecules, and develop a filter system which will prevent these molecules from passing through into the final product. This is in stark contrast to information filters which must sort through ideas which are inevitably subjectively defined artifacts of human experience and knowledge. In other words, describing a bit as relevant, truthful, accurate, appropriate, etc., means making value judgments about the digitized content it represents (with the exception of certain objective characteristics such as time, date, or geographic location). These largely subjective decisions are coded (as we shall see later, who does the coding makes a big difference) into the "headers" of electronic documents, so that machines/individuals on the receiving end of the information can choose what to do with it. Deciding what to do with 4. these bits, means using an information filter itself based on subjective rules about what content to let in, and what content to filter out. Problems arise in such a system when the senders description of his/her bits (an email with "URGENT, MUST READ NOW" as its subject line), does not square with the interpretation of the information filter on the receiving end (which finds the message to be anything but urgent). This information overabundance and description problem is certainly nothing new. Librarians and literary scholars have struggled for thousands of years about how to classify books. To aid in this process, librarians have developed card catalogs, and literary scholars developed the anthology. While these systems have worked well for some time, the advent of the Internet, and the absolute tidal wave of information now available, points to the incredible challenge for, and importance of information filters in the next millennium. Indeed in an age of 500 cable channels, millions of web pages, thousands of printed publications, cell phones, and beepers, information filters will become an absolute necessity for the average citizen navigating his/her path through the wilds of the virtual and real worlds. Our growing dependence on this "filtered future" also means giving up a great deal of power to filters, to define what we will see, hear, and be in the digital future. This new reality points to a fundamental flaw in the logic of the new media mantra that information is power: In the Information Age, we were told, information would be power. It is turning out to be quite the opposite. In the Information Age, it seems, power does not rest with those who have access to information. It rests with those who filter it. (Balkin, 1996) In seeding our information selection power to filters, battles over content definition will inevitably arise. Simply put, people will disagree that this bit means this, and that bit means that. Scaled to the millions of Internet users now on-line, the problem of subjectively defined information filters, means 5. disagreements about content will be pervasive. As such, information filters will become a public, political, legal, and technological problem of massive proportions. The Internet Content Conundrum This thesis will focus on one particular area where the nexus of information filters, public outrage, political policy making, jurisprudence, and technological solutions have converged into a contentious sociopolitical issue. This issue is the filtering of "objectionable" Internet content (mostly pornography) to protect children, an issue I will call the "Internet Content Conundrum." The conundrum is due to the fact that the Internet facilitates easy access to both large amounts of safe and useful information, as well as access to a much smaller amount of "dangerous" material. As Karen Jo Gounaud of Family Friendly Libraries notes, the Internet contains both "gigantic bottomless pits and wonderful playgrounds (cited in Hudson, 1998)." Since the Internet came to the for of public attention around 1994, Americans have been obsessed with the scourge of easily accessed on-line pornography, violence, and hate speech. Newspaper and magazine articles have fed this fear with articles about pornographic web sites, hate groups, and on-line sexual predators (Turow, 1999). This perceived abundance of harmful Internet content, has led Congress to pass two laws, the Communications Decency Act (CDA), and the Child On-line Protection Act (COPA) aimed at defining, and criminalizing Internet content deemed harmful to minors. In conjunction with these legislative solutions, the software industry has developed its own technological solutions, namely content blocking filter
Recommended publications
  • 1 COMMONWEALTH of PENNSYLVANIA HOUSE of REPRESENTATIVES COMMITTEE on JUDICIARY Ouse Bill 1141
    1 COMMONWEALTH OF PENNSYLVANIA HOUSE OF REPRESENTATIVES COMMITTEE ON JUDICIARY ouse Bill 1141 * * * * * Stenographic report of hearing held in Majority Caucus Room, Main Capitol Building, Harrisburg, Pennsylvania Friday, April 28, 1989 10:00 a.m. THOMAS CALTAGIRONE, CHAIRMAN MEMBERS OF COMMITTEE ON JUDICIARY ry Birmelin Hon. Christopher K. McNally hard Hayden Hon. Nicholas B. Moehlmann id W. Heckler Hon. Robert D. Reber ard A. Kosinski sent: antz. Executive Director lley, Minority Counsel Reported by: Ann-Marie P. Sweeney, Reporter ANN-MARIE P. SWEENEY 536 Orrs Bridge Road Camp Hill, PA 17011 2 INDEX PAGE gner, Southeast Regional Dir., 3 Ivamans vs. Pornography st. Esquire, United States Attorney 57 eters, Esquire, Legal Counsel, 74 al Obscenity Law Center wn, Southeast Coordinator, 78 Ivamans vs. Pornography Viglietta, Director, Justice and 96 Department, Pennsylvania Catholic ence 3 CHAIRMAN CALTAGIRONE: We'll start the ngs. Members will be coming in. We do have some Df the Judiciary Committee present - Jerry , Dob Reber, Chris McNally, and the staff a Director, Dave Krantz. There will be others L be coming in as the proceedings go on today. I'd like to introduce myself. I'm State bative Tom Caltagirone, chairman of the House f Committee. Today's hearing is on House Bill 'd like to welcome everybody that's in attendance ay, and I'd like to call as our first witness jner, who is the Southeast Regional Director of 3ylvanians vs. Pornography. Frank. MR. WAGNER: Mr. Chairman and members of the f Committee, I'm here today to testify on behalf flvanians vs. Pornography. PVP is a congress of nography works located here in the Commonwealth ides some 43 county anti-pornography tions, the Pennsylvania Catholic Conference, ania Council of Churches, Pennsylvamans for Morality, Concerned Women of America, the Eagle nd the Pennsylvania Knights of Columbus.
    [Show full text]
  • Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
    Order Code RL32114 Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Updated January 29, 2008 Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Summary Cybercrime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks.1 Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a “botnet,” to help disrupt the computer systems of the Estonian government. DOD officials have also indicated that similar cyberattacks from individuals and countries targeting economic,
    [Show full text]
  • What Every Citizen Should Know About DRM, A.K.A. “Digital Rights Management”
    What Every Citizen Should Know About DRM, a.k.a. “Digital Rights Management” By Mike Godwin Senior Technology Counsel Public Knowledge PUBLIC KNOWLEDGE NEW AMERICA FOUNDATION What Every Citizen Should Know About DRM, a.k.a. “Digital Rights Management” By Mike Godwin Senior Technology Counsel Public Knowledge NEW AMERICA FOUNDATION Washington, DC Acknowledgements This “DRM primer” would not have come about without the author’s having worked with an informal “Risks of Copy Protection” expert group that includes Ed Felten, Matt Blaze, Phil Karn, Steve Bellovin, Bruce Schneier, Alan Davidson, John Morris, Hal Abelson, and Bill Cheswick. Two members of the group — Ed Felten and Matt Blaze — deserve special thanks for framing a number of copy-protection technology issues with such clarity that I have to some extent reproduced that clarity here. Phil Karn similarly deserves special thanks for his discussion of the extent to which peer-to-peer file-sharing is a feature of the Inter- net’s fundamental design. Andy Moss and Aaron Burstein each made a wide range of helpful comments and observations on earlier drafts of this primer. I’m particularly grateful to my boss, Gigi Sohn, for giving me the opportunity to explore the landscape of digital rights management and to develop further some of my ideas about the directions in which DRM may take us. I’m also thankful for the support and feedback of my other fellow staff members at Public Knowledge — Sarah Brown, Alex Curtis, Ann Dev- ille, and Nathan Mitchler. I consider myself fortunate to be backed by such a knowledgeable and resourceful team; each of my colleagues contributed in many ways to the development of this project, and all of them read this paper in various stages of development and offered helpful corrections and suggestions.
    [Show full text]
  • The FCC's Recent Enforcement of Obscenity Laws
    Fordham Intellectual Property, Media and Entertainment Law Journal Volume 15 Volume XV Number 4 Volume XV Book 4 Article 3 2005 PANEL III: Indecent Exposure? The FCC's Recent Enforcement of Obscenity Laws William Davenport Federal Communications Commission Jeffrey Hoeh NBC C. Edwin Baker University of Pennsylvania Law School Paul J. McGeady Morality in Media, Inc. Follow this and additional works at: https://ir.lawnet.fordham.edu/iplj Part of the Entertainment, Arts, and Sports Law Commons, and the Intellectual Property Law Commons Recommended Citation William Davenport, Jeffrey Hoeh, C. Edwin Baker, and Paul J. McGeady, PANEL III: Indecent Exposure? The FCC's Recent Enforcement of Obscenity Laws, 15 Fordham Intell. Prop. Media & Ent. L.J. 1087 (2005). Available at: https://ir.lawnet.fordham.edu/iplj/vol15/iss4/3 This Transcript is brought to you for free and open access by FLASH: The Fordham Law Archive of Scholarship and History. It has been accepted for inclusion in Fordham Intellectual Property, Media and Entertainment Law Journal by an authorized editor of FLASH: The Fordham Law Archive of Scholarship and History. For more information, please contact [email protected]. PANEL 3 11/21/2005 1:10 PM PANEL III: Indecent Exposure? The FCC’s Recent Enforcement of Obscenity Laws Moderator: Abner Greene∗ Panelists: William Davenport† Jeffrey Hoeh‡ C. Edwin Baker§ Paul J. McGeady|| John Fiorini, III# MR. SPARKLER: Good afternoon and welcome back to our final panel, “Indecent Exposure? The FCC’s Recent Enforcement of Obscenity Laws.” Before we get started, I wanted to thank the staff and Editorial Board of the Journal for making this year’s Symposium such a success.
    [Show full text]
  • The Obscenity Terms of the Court
    Volume 17 Issue 3 Article 1 1972 The Obscenity Terms of the Court O. John Rogge Follow this and additional works at: https://digitalcommons.law.villanova.edu/vlr Part of the Constitutional Law Commons, Criminal Law Commons, and the First Amendment Commons Recommended Citation O. J. Rogge, The Obscenity Terms of the Court, 17 Vill. L. Rev. 393 (1972). Available at: https://digitalcommons.law.villanova.edu/vlr/vol17/iss3/1 This Article is brought to you for free and open access by Villanova University Charles Widger School of Law Digital Repository. It has been accepted for inclusion in Villanova Law Review by an authorized editor of Villanova University Charles Widger School of Law Digital Repository. Rogge: The Obscenity Terms of the Court Villanova Law Review VOLUME 17 FEBRUARY 1972 NUMBER 3 THE OBSCENITY TERMS OF THE COURT 0. JOHN ROGGEt I. OVERVIEW OF THE 1970-1971 SUPREME COURT OBSCENITY DECISIONS AT ITS OCTOBER 1970-JUNE 1971 TERM, the Supreme Court of the United States had the incredible number of 61 obscenity cases on its docket,' if one includes two cases which involved the use of the four-letter word for the sexual act, in the one case by itself,' and in the other instance with the further social message that this is what one should do with the draft.' These are more such cases than at any previous term, or number of terms for that matter. No less than five of the 61 cases involved the film, I Am Curious (Yellow). Other cases involved such varied forms of expression and entertainment as the fol- lowing: Language of Love, a Swedish
    [Show full text]
  • Sex Issue 2008
    TUDENT IFE THE SINDEPENDENT NEWSPAPER OF WASHINGTON UNIVERSITY L IN ST. LOUIS SINCE 1878 SPECIAL ISSUE WEDNESDAY, FEBRUARY 13, 2008 WWW.STUDLIFE.COM X2 STUDENT LIFE | NEWS Senior News Editor / Sam Guzik / [email protected] WEDNESDAY | FEBRUARY 13, 2008 Student Life When did you lose Ahh. Another year, another Sex Issue survey. While the results vary each year, the main purpose of survey remains constant: to discover students’ expectations, experiences and your virginity? opinions on relationships and sex. 1.67% However, there were some notable changes made this year. 2008 marked the fi rst time 14 and under Student Life conducted the survey online, leading to an unprecedented 1550 undergradu- 10.11% ate responses collected. The survey has a theoretical margin of error of two percent. 15-16 We also sorted some of the data based on gender, relationship status and other factors to see if there were any interesting delineations. However, no generalizations were made 40.50% based on sexual orientation because the number of respondents who chose options other 28.40% Still a virgin than heterosexual was too low to supply suffi cient data for an accurate analysis. 17-18 Data complied by David Brody and Shweta Murthi Graphic design by Joe Rigodanzo and Anna Dinndorf 17.45% 19-20 1.80% 21-22 The average WU student has sex _______ I do 24% Are you a Virgin? less often than 60% Freshmen 55% 65% Sophmores more often 55% Juniors than Art School 21% Seniors 50% as often sexuality as 45% 40% 88% of Art and Architec- ture students identify as 35% heterosexual, the lowest 30% percentage of any school.
    [Show full text]
  • Men Who Have Sex with Men Management a Management Approach for Gps
    CLINICAL PRACTICE Men who have sex with men Management A management approach for GPs BACKGROUND At least one in 20 Australian men report sexual contact with another man in their lifetime. Men who have sex with other James Baber men have higher rates of sexually transmitted infections, and are more likely to experience mental health problems and BHB, MBChB, is a sexual use recreational drugs and alcohol. health registrar, Department of Sexual Health, Royal North OBJECTIVE Shore Hospital, Sydney, New This article describes the health problems and sexual behaviour of men who have sex with men and provides an outline South Wales. jbaber@nsccahs. health.nsw.gov.au and an approach to discussing sexuality in general practice. Linda Dayan DISCUSSION BMedSc, MBBS, DipRACOG, Sexuality can be difficult to discuss in general practice. A nonjudgmental approach to men who have sex with men may MM(VenSci), FAChSHM, facilitate early identification of the relevant health issues. MRCMA, is Head, Department of Sexual Health, Royal North Shore Hospital, Director, Sexual Health Services, Northern Sydney Central Coast Area Health Service, Clinical Lecturer, Department of A recent Australian study has shown that 1.7% of men GP is a marker of increased numbers of sexual partners Community and Public Health, identify as exclusively homosexual,1 while 5% of all and higher sexual risk.4 University of Sydney, and in private practice, Darlinghurst, men reported genital homosexual experience through Barriers to discussing sexual health matters with New South Wales. their lifetime.2 nonheterosexuals identified by GPs in the United Kingdom in 2005, included a lack of knowledge of sexual practices Men who have sex with men (MSM) face societal prejudice and terminology.5 Several doctors also recognised that in their lives, and many experience discrimination.
    [Show full text]
  • California Hard Core
    UC Berkeley UC Berkeley Electronic Theses and Dissertations Title California Hard Core Permalink https://escholarship.org/uc/item/0g37b09q Author Duong, Joseph Lam Publication Date 2014 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California California Hard Core By Joseph Lam Duong A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in History in the Graduate Division of the University of California, Berkeley Committee in charge: Professor Waldo E. Martin, Chair Professor Kerwin Lee Klein Professor Linda Williams Spring 2014 Copyright 2014 by Joseph Lam Duong Abstract California Hard Core by Joseph Lam Duong Doctor of Philosophy in History University of California, Berkeley Professor Waldo E. Martin, Chair California Hard Core is a narrative history of the pornographic film industry in California from 1967 to 1978, a moment when Americans openly made, displayed, and watched sexually explicit films. Two interrelated questions animate this project: Who moved the pornographic film from the margins of society to the mainstream of American film culture? What do their stories tell us about sex and sexuality in the U.S. in the last third of the twentieth century? The earlier academic literature concentrates on pornographic film and political debates surrounding it rather than industry participants and their contexts. The popular literature, meanwhile, is composed almost entirely of book-length oral histories and autobiographies of filmmakers and models. California Hard Core helps to close the divide between these two literatures by documenting not only an eye-level view of work from behind the camera, on the set, and in the movie theater, but also the ways in which consumers received pornographic films, placing the reader in the viewing position of audience members, police officers, lawyers, judges, and anti-pornography activists.
    [Show full text]
  • Senate Substitute
    2014 SESSION SENATE SUBSTITUTE 14104029D 1 SENATE BILL NO. 14 2 AMENDMENT IN THE NATURE OF A SUBSTITUTE 3 (Proposed by the Senate Committee for Courts of Justice 4 on January 15, 2014) 5 (Patron Prior to Substitute±±Senator Garrett) 6 A BILL to amend and reenact §§ 18.2-67.5:1, 18.2-346, 18.2-348, 18.2-356, 18.2-359, 18.2-361, 7 18.2-368, 18.2-370, 18.2-370.1, 18.2-371, and 18.2-374.3 of the Code of Virginia, relating to 8 sodomy; penalties. 9 Be it enacted by the General Assembly of Virginia: 10 1. That §§ 18.2-67.5:1, 18.2-346, 18.2-348, 18.2-356, 18.2-359, 18.2-361, 18.2-368, 18.2-370, 11 18.2-370.1, 18.2-371, and 18.2-374.3 of the Code of Virginia are amended and reenacted as follows: 12 § 18.2-67.5:1. Punishment upon conviction of third misdemeanor offense. 13 When a person is convicted of sexual battery in violation of § 18.2-67.4, attempted sexual battery in 14 violation of subsection C of § 18.2-67.5, a violation of § 18.2-371 involving consensual intercourse, anal SENATE 15 intercourse, cunnilingus, fellatio, or anilingus with a child, indecent exposure of himself or procuring 16 another to expose himself in violation of § 18.2-387, or a violation of § 18.2-130, and it is alleged in the 17 warrant, information, or indictment on which the person is convicted and found by the court or jury 18 trying the case that the person has previously been convicted within the ten-year 10-year period 19 immediately preceding the offense charged of two or more of the offenses specified in this section, each 20 such offense occurring on a different date, he shall be is guilty of a Class 6 felony.
    [Show full text]
  • Prevalence of and Factors Associated with Oral Sex Among Rural and Urban Malawian Men
    Kerwin et al. 2012 Prevalence of and Factors Associated with Oral Sex among Rural and Urban Malawian Men Jason Kerwin * Department of Economics, University of Michigan Rebecca Thornton Department of Economics, University of Michigan Sallie Foley Graduate School of Social Work, University of Michigan March 2012 ABSTRACT Despite medical evidence that female-to-male oral sex carries a much lower risk of HIV transmission than unprotected vaginal intercourse, there has been little research on the practice of fellatio in Africa. We use a sample of 1216 men in rural Malawi and 1537 uncircumcised men in urban Malawi to examine the prevalence of oral sex. While 97 percent of the rural sample and 87 percent of the urban sample reported having had vaginal sex just 2 percent and 12 percent respectively said they had ever received oral sex. Only half of the rural sample, and less than three quarters of the urban sample, reported having heard of oral sex. We find that education and condom use predict oral sex knowledge; in contrast, media exposure and beliefs about HIV do not significantly predict knowledge about oral sex after controlling for other confounding factors. The large gap between sexual activity and oral sex prevalence implies substantial scope for fellatio as another safer sex strategy in Malawi and potentially in other African countries as well. * Corresponding author: Thornton, Department of Economics, 611 Tappan St., Ann Arbor, MI, 48109. Phone: 734- 763-9238. Email: [email protected] . Kerwin: Department of Economics, 611 Tappan St., Ann Arbor, MI, 48109. Email: [email protected] Foley: School of Social Work 1080 S.
    [Show full text]
  • Lexical Translation in Movies: a Comparative Analysis of Persian Dubs and Subtitles Through CDA
    International Journal on Studies in English Language and Literature (IJSELL) Volume 6, Issue 8, August 2018, PP 22-29 ISSN 2347-3126 (Print) & ISSN 2347-3134 (Online) http://dx.doi.org/10.20431/2347-3134.0608003 www.arcjournals.org Lexical Translation in Movies: A comparative Analysis of Persian Dubs and Subtitles through CDA Saber Noie1*, Fariba Jafarpour2 Iran *Corresponding Author: Saber Noie, Iran Abstract: The impact of translated movies has already been emphasized by quiet a number of researchers. The present study aimed to investigate the strategies of the Iranian subtitlers and dubbers of English movies in rendering English words. To this aim, three theoretical frameworks were employed: The strategies proposed by Venuti, and Newmark's classification used first by researcher and then, researcher went back to the Van Dijk’s Critical Discourse Analysis (CDA), in the part dominance. The aim was to find which strategies were the most prevalently used by Iranian subtitlers and dubbers and to see which model fitted these attempts the best. A movie was investigated: the Girl with the Dragon Tattoo. Through a qualitative content analysis, distribution of strategies was found and reported in frequencies and percentages. They were crossed – compared between the three frameworks. The result showed that which strategies of each model were used more. The results of this study may pave the way for future research in literary translation and help translation instructors and translation trainees as well in translation classes. Keywords: Critical Discourse Analysis (Cda), Domestication, Dub, Foreignization, Subtitle 1. INTRODUCTION In the age of globalization, digitalization, and dominance of media, audiovisual translation (AVT) can play an increasingly important role in communication across cultures and languages.
    [Show full text]
  • KEEPING IT LEGAL a Guide for WV Broadcasters
    KEEPING IT LEGAL A Guide for WV Broadcasters Published by: COLORADO INDIANA KENTUCKY OHIO PENNSYLVANIA WASHINGTON, D.C. WEST VIRGINIA This is an advertsiement. www.jacksonkelly.com TABLE OF CONTENTS TABLE OF CONTENTS i INTRODUCTION 1 ADVERTISING 3 ADVERTISING OF ALCOHOLIC BEVERAGES 3 What was the effect of Liquormart, Inc. v. Rhode Island? .......................................................3 ADVERTISING OF LOTTERIES 5 What is a lottery? 5 How can the “lottery” designation be avoided? .......................................................................6 Is there an exception for charitable lotteries? ...........................................................................7 Are “snow ads” acceptable forms of advertising? ....................................................................7 Can you advertise lottery games which have been made legal by West Virginia state statute? ..................................................................................................................................................7 ADVERTISING OF TOBACCO 9 May television or radio stations advertise stores that specialize in the sale of tobacco products?...................................................................................................................................9 What may television and radio stations advertise? .................................................................10 What about advertisements for vaping? .................................................................................10 ADVERTISING MEDICAL
    [Show full text]