Google Hacks Will Be As Useful to Others As the O'reilly Publications Have Been to Google

Total Page:16

File Type:pdf, Size:1020Kb

Google Hacks Will Be As Useful to Others As the O'reilly Publications Have Been to Google Table of Contents Credits Foreword Preface Chapter 1. Searching Google 1. Setting Preferences 2. Language Tools 3. Anatomy of a Search Result 4. Specialized Vocabularies: Slang and Terminology 5. Getting Around the 10 Word Limit 6. Word Order Matters 7. Repetition Matters 8. Mixing Syntaxes 9. Hacking Google URLs 10. Hacking Google Search Forms 11. Date-Range Searching 12. Understanding and Using Julian Dates 13. Using Full-Word Wildcards 14. inurl: Versus site: 15. Checking Spelling 16. Consulting the Dictionary 17. Consulting the Phonebook 18. Tracking Stocks 19. Google Interface for Translators 20. Searching Article Archives 21. Finding Directories of Information 22. Finding Technical Definitions 23. Finding Weblog Commentary 24. The Google Toolbar 25. The Mozilla Google Toolbar 26. The Quick Search Toolbar 27. GAPIS 28. Googling with Bookmarklets Chapter 2. Google Special Services and Collections 29. Google Directory 30. Google Groups 31. Google Images 32. Google News 33. Google Catalogs 34. Froogle 35. Google Labs Chapter 3. Third-Party Google Services 36. XooMLe: The Google API in Plain Old XML 37. Google by Email 38. Simplifying Google Groups URLs 39. What Does Google Think Of... 40. GooglePeople Chapter 4. Non-API Google Applications 41. Don't Try This at Home 42. Building a Custom Date-Range Search Form 43. Building Google Directory URLs 44. Scraping Google Results 45. Scraping Google AdWords 46. Scraping Google Groups 47. Scraping Google News 48. Scraping Google Catalogs 49. Scraping the Google Phonebook Chapter 5. Introducing the Google Web API 50. Programming the Google Web API with Perl 51. Looping Around the 10-Result Limit 52. The SOAP::Lite Perl Module 53. Plain Old XML, a SOAP::Lite Alternative 54. NoXML, Another SOAP::Lite Alternative 55. Programming the Google Web API with PHP 56. Programming the Google Web API with Java 57. Programming the Google Web API with Python 58. Programming the Google Web API with C# and .NET 59. Programming the Google Web API with VB.NET Chapter 6. Google Web API Applications 60. Date-Range Searching with a Client-Side Application 61. Adding a Little Google to Your Word 62. Permuting a Query 63. Tracking Result Counts over Time 64. Visualizing Google Results 65. Meandering Your Google Neighborhood 66. Running a Google Popularity Contest 67. Building a Google Box 68. Capturing a Moment in Time 69. Feeling Really Lucky 70. Gleaning Phonebook Stats 71. Performing Proximity Searches 72. Blending the Google and Amazon Web Services 73. Getting Random Results (On Purpose) 74. Restricting Searches to Top-Level Results 75. Searching for Special Characters 76. Digging Deeper into Sites 77. Summarizing Results by Domain 78. Scraping Yahoo! Buzz for a Google Search 79. Measuring Google Mindshare 80. Comparing Google Results with Those of Other Search Engines 81. SafeSearch Certifying URLs 82. Syndicating Google Search Results 83. Searching Google Topics 84. Finding the Largest Page 85. Instant Messaging Google Chapter 7. Google Pranks and Games 86. The No-Result Search (Prank) 87. Google Whacking 88. GooPoetry 89. Creating Google Art 90. Google Bounce 91. Google Mirror 92. Finding Recipes Chapter 8. The Webmaster Side of Google 93. A Webmaster's Introduction to Google 94. Generating Google AdWords 95. Inside the PageRank Algorithm 96. 26 Steps to 15K a Day 97. Being a Good Search Engine Citizen 98. Cleaning Up for a Google Visit 99. Getting the Most out of AdWords 100. Removing Your Materials from Google Index Foreword When we started Google, it was hard to predict how big it would become. That our search engine would someday serve as a catalyst for so many important web developments was a distant dream. We are honored by the growing interest in Google and offer many thanks to those who created this book—the largest and most comprehensive report on Google search technology that has yet to be published. Search is an amazing field of study, because it offers infinite possibilities for how we might find and make information available to people. We join with the authors in encouraging readers to approach this book with a view toward discovering and creating new ways to search. Google's mission is to organize the world's information and make it universally accessible and useful, and we welcome any contribution you make toward achieving this goal. Hacking is the creativity that fuels the Web. As software developers ourselves, we applaud this book for its adventurous spirit. We're adventurous, too, and were happy to discover that this book highlights many of the same experiments we conduct on our free time here at Google. Google is constantly adapting its search algorithms to match the dynamic growth and changing nature of the Web. As you read, please keep in mind that the examples in this book are valid today but, as Google innovates and grows over time, may become obsolete. We encourage you to follow the latest developments and to participate in the ongoing discussions about search as facilitated by books such as this one. Virtually every engineer at Google has used an O'Reilly publication to help them with their jobs. O'Reilly books are a staple of the Google engineering library, and we hope that Google Hacks will be as useful to others as the O'Reilly publications have been to Google. With the largest collection of web documents in the world, Google is a reflection of the Web. The hacks in this book are not just about Google, they are also about unleashing the vast potential of the Web today and in the years to come. Google Hacks is a great resource for search enthusiasts, and we hope you enjoy it as much as we did. Thanks, The Google Engineering Team December 11, 2002 Mountain View, California Preface Search engines for large collections of data preceded the World Wide Web by decades. There were those massive library catalogs, hand-typed with painstaking precision on index cards and eventually, to varying degrees, automated. There were the large data collections of professional information companies such as Dialog and LexisNexis. Then there are the still-extant private, expensive medical, real estate, and legal search services. Those data collections were not always easy to search, but with a little finesse and a lot of patience, it was always possible to search them thoroughly. Information was grouped according to established ontologies, data preformatted according to particular guidelines. Then came the Web. Information on the Web—as anyone knows who's ever looked at half-a-dozen web pages knows— is not all formatted the same way. Nor is it necessarily particularly accurate. Nor up to date. Nor spellchecked. Nonetheless, search engines cropped up, trying to make sense of the rapidly- increasing index of information online. Eventually, special syntaxes were added for searching common parts of the average web page (such as title or URL). Search engines evolved rapidly, trying to encompass all the nuances of the billions of documents online, and they still continue to evolve today. Google™ threw its hat into the ring in 1998. The second incarnation of a search engine service known as BackRub, the name "Google" was a play on the word "googol," a one followed by a hundred zeros. From the beginning, Google was different from the other major search engines online—AltaVista, Excite, HotBot, and others. Was it the technology? Partially. The relevance of Google's search results was outstanding and worthy of comment. But more than that, Google's focus and more human face made it stand out online. With its friendly presentation and its constantly expanding set of options, it's no surprise that Google continues to get lots of fans. There are weblogs devoted to it. Search engine newsletters, such as ResearchBuzz, spend a lot of time covering Google. Legions of devoted fans spend lots of time uncovering documented features, creating games (like Google whacking) and even coining new words (like "Googling," the practice of checking out a prospective date or hire via Google's search engine.) In April 2002, Google reached out to its fan base by offering the Google API. The Google API gives developers a legal way to access the Google search results with automated queries (any other way of accessing Google's search results with automated software is against Google's Terms of Service.) Why Google Hacks? "Hacks" are generally considered to be "quick-n-dirty" solutions to programming problems or interesting techniques for getting a task done. But what does this kind of hacking have to do with Google? Considering the size of the Google index, there are many times when you might want to do a particular kind of search and you get too many results for the search to be useful. Or you may want to do a search that the current Google interface does not support. The idea of Google Hacks is not to give you some exhaustive manual of how every command in the Google syntax works, but rather to show you some tricks for making the best use of a search and show applications of the Google API that perform searches that you can't perform using the regular Google interface. In other words, hacks. Dozens of programs and interfaces have sprung up from the Google API. Both games and serious applications using Google's database of web pages are available from everybody from the serious programmer to the devoted fan (like me). How This Book Is Organized The combination of Google's API and over 3 billion pages of constantly shifting data can do strange things to your imagination and give you lots of new perspectives on how best to search. This book goes beyond the instruction page to the idea of "hacks"—tips, tricks, and techniques you can use to make your Google searching experience more fruitful, more fun, or (in a couple of cases) just more weird.
Recommended publications
  • Annual Report 2018
    Pakistan Telecommunication Company Limited Company Telecommunication Pakistan PTCL PAKISTAN ANNUAL REPORT 2018 REPORT ANNUAL /ptcl.official /ptclofficial ANNUAL REPORT Pakistan Telecommunication /theptclcompany Company Limited www.ptcl.com.pk PTCL Headquarters, G-8/4, Islamabad, Pakistan Pakistan Telecommunication Company Limited ANNUAL REPORT 2018 Contents 01COMPANY REVIEW 03FINANCIAL STATEMENTS CONSOLIDATED Corporate Vision, Mission & Core Values 04 Auditors’ Report to the Members 129-135 Board of Directors 06-07 Consolidated Statement of Financial Position 136-137 Corporate Information 08 Consolidated Statement of Profit or Loss 138 The Management 10-11 Consolidated Statement of Comprehensive Income 139 Operating & Financial Highlights 12-16 Consolidated Statement of Cash Flows 140 Chairman’s Review 18-19 Consolidated Statement of Changes in Equity 141 Group CEO’s Message 20-23 Notes to and Forming Part of the Consolidated Financial Statements 142-213 Directors’ Report 26-45 47-46 ہ 2018 Composition of Board’s Sub-Committees 48 Attendance of PTCL Board Members 49 Statement of Compliance with CCG 50-52 Auditors’ Review Report to the Members 53-54 NIC Peshawar 55-58 02STATEMENTS FINANCIAL Auditors’ Report to the Members 61-67 Statement of Financial Position 68-69 04ANNEXES Statement of Profit or Loss 70 Pattern of Shareholding 217-222 Statement of Comprehensive Income 71 Notice of 24th Annual General Meeting 223-226 Statement of Cash Flows 72 Form of Proxy 227 Statement of Changes in Equity 73 229 Notes to and Forming Part of the Financial Statements 74-125 ANNUAL REPORT 2018 Vision Mission To be the leading and most To be the partner of choice for our admired Telecom and ICT provider customers, to develop our people in and for Pakistan.
    [Show full text]
  • Google Toolbar for Enterprise Admin Guide
    Google Toolbar for Enterprise Admin Guide ● Introduction ● Technical Overview ● Downloading the Software ● Configuring the Group Policies ❍ Preferences ❍ Enterprise Integration ❍ Custom Buttons ❍ Popup Whitelist ● Defining Custom Buttons ● Pushing Out the Policy to User Registries ● Installing Google Toolbar on User Machines Introduction back to top This document contains information about setting up Google Toolbar for Enterprise. Google Toolbar is an end-user application that adds a search bar and other useful web tools to the Internet Explorer browser window. Google Toolbar for Enterprise makes it easy to provide enterprise users with the Google Toolbar and to create standards for its use. The document was written for Windows domain administrators. As an administrator, you can install and configure Google Toolbar for all users. By defining enterprise-wide policies for Google Toolbar, you can decide which buttons and features users can access. For example, you could remove the feature that saves search history, whitelist certain pages to exempt them from the popup blocker, or prevent users from sending votes to Google about their favorite web pages . You can configure policies before installing Google Toolbar for the users, or at any subsequent time. Google Toolbar also provides the ability to create custom buttons that display specified pages, direct searches to predefined systems, or display information from an RSS feed. Using Google Toolbar for Enterprise, you can define buttons for all users, using data from your own network or from the Internet. For example, you could create a custom button that directs a user's search to your Google Search Appliance or Google Mini to display a corporate web page or show important phone numbers from your intranet.
    [Show full text]
  • PDF a Parent and Carer's Guide to Google Safesearch and Youtube Safety Mode
    A parent and carer’s guide to Google SafeSearch and YouTube Safety Mode Google is the most used search engine in the world and users can type in a word, expression, phrase or sentence in more than 100 languages and receive instant results in text, images or videos. YouTube is ranked as the world second largest search engine, with over 1 billion users that each day watch a billion hours of videos. With limited ways to control content, the Google and YouTube platforms can be challenge for parents and carers because there are hundreds of thousands of videos, images and other content that may not be considered appropriate for children or young people. This article explains why it may be useful to filter search results on Google and YouTube and how parents and carers can engage safety settings on these two platforms. Please note – the weblinks in this document are only available in English language. Is Google content appropriate for children and young people? A Google query lasts less than half a second, however there are many more steps involved before a final result is provided. This video from Google illustrates exactly how a Google search works. When Google realized that the results of an unfiltered Google search contained content that is not always appropriate for children, Google then developed SafeSearch so that children could safely find documents, images, and videos within the Google database. Is YouTube content appropriate for children and young people? Google purchased YouTube in 2006 with the idea that YouTube would provide a marketing hub as more viewers and advertisers chose the Internet over television.
    [Show full text]
  • The Effectiveness of Application Permissions
    The Effectiveness of Application Permissions Adrienne Porter Felt,∗ Kate Greenwood, David Wagner University of California, Berkeley apf, kate eli, [email protected] Abstract cations’ permission requirements up-front so that users can grant them during installation. Traditional user-based permission systems assign the Traditional user-based permission systems assign the user’s full privileges to all applications. Modern plat- user’s full privileges to all of the user’s applications. In forms are transitioning to a new model, in which each the application permission model, however, each appli- application has a different set of permissions based on cation can have a customized set of permissions based its requirements. Application permissions offer several on its individual privilege requirements. If most applica- advantages over traditional user-based permissions, but tions can be satisfied with less than the user’s full priv- these benefits rely on the assumption that applications ileges, then three advantages of application permissions generally require less than full privileges. We explore over the traditional user-based model are possible: whether that assumption is realistic, which provides in- sight into the value of application permissions. • User Consent: Security-conscious users may be We perform case studies on two platforms with appli- hesitant to grant access to dangerous permissions cation permissions, the Google Chrome extension sys- without justification. For install-time systems, this tem and the Android OS. We collect the permission re- might alert some users to malware at installation; quirements of a large set of Google Chrome extensions for time-of-use systems, this can prevent an in- and Android applications.
    [Show full text]
  • Appendix 1 - 5 Appendix 1 - Questionnaire for Colleges
    Appendix 1 - 5 Appendix 1 - Questionnaire for Colleges Declaration: I, Rajeev Ghode, persuing my Ph.D. in Department of Communication Studies, Pune University. Title of Ph.D. Research is "To study potential and challenges in the use and adoption of ICT in Higher Education"For this research purpose, I want to collect quantitative data from all the professors of colleges which are affiliated to Pune University. I ensure that all the data collected will be used only for the Ph.D. research and secrecy of the data will be maintained. I appreciate you for spending your valuable time to fill this questionnaire. Thanking You <•;. Prof. Rajeev Ghode Questionnaire Name of the College Address/City 1 Arts Science and Commerce College 1 Arts Science and Commerce College with Computer Science Type of College 1 Commerce and BBA Q B.Ed. College 1 1 Law Institutional ICT Infrastructure Sr. ICT Infrastructure Yes No Provision in near No. future 1. Multimedia /Conference Hall 2. Computer Lab 3. Internet Connectivity in Campus 4. Digital Library 5. Website 6. Organization e-mail Server 7. Blog Appendix - I Sr. ICT Infrastructure Yes No Provision in near No. future 8. Presence on SNS 9. Online Admission System 10. Online/Offline Examination Application 11. Biometric Attendance 12. Student Management System 13. Professional membership for online journals Department-wise ICT Infrastructure Sr. ICT Infrastructure Yes No Provision in near No. future 1. Do you have separate Desktops for faculties in every department? 2. Do you have separate Laptops for every department? 3. Does every department have LCD Projector? 4.
    [Show full text]
  • Google™ Safesearch™ and Youtube™ Safety Mode
    Google™ SafeSearch™ and YouTube™ Safety Mode Searching the internet is a daily activity and Google™ is often the first port of call for homework, shopping and finding answers to any questions. But it is important to remember that you, or your children, might come across inappropriate content during a search, even if searching the most seemingly harmless of topics. Google SafeSearch is designed to screen out sites that contain sexually explicit content so they don’t show up in your family’s search results. No filter is 100% accurate, but SafeSearch helps you avoid the stuff you’d prefer not to see or have your kids stumble across. ‘Google’, the Google logo and ‘SafeSearch’ are trademarks or registered trademarks of Google Inc. Google SafeSearch and YouTube Safety Mode | 2 Follow these simple steps to set up Google SafeSearch. 1 Open your web browser and go to google.co.uk 2 Click Settings at the bottom of the page, then click Search settings in the pop-up menu that appears. Google SafeSearch and YouTube Safety Mode | 3 3 On the Search Settings page, tick the Filter explicit results box. Then click Save at the bottom of the page to save your SafeSearch settings. 4 If you have a Google account, you can lock SafeSearch on your family’s computer so that filter explicit results is always in place and no-one except you can change the settings. Click on Lock SafeSearch. If you’re not already signed in to your Google account, you’ll be asked to sign in. 5 Once you’re signed in, click on Lock SafeSearch.
    [Show full text]
  • Web Services and Service Oriented Architectures 1 ©2009 Cesare Pautasso Web Sites (1992)
    SOA with REST Cesare Pautasso Faculty of Informatics University of Lugano http://www.pautasso.info [email protected] 31.3.2009 Web Services and Service Oriented Architectures 1 ©2009 Cesare Pautasso Web Sites (1992) Web HTML Web Browser HTTP Server WS-* Web Services (2000) SOAP WSDL Client XML Server (HTTP) 31.3.2009 Web Services and Service Oriented Architectures 2 ©2009 Cesare Pautasso RESTful Web Services (2007) PO-XML JSON RSS WADL Web Client HTTP Server WS-* Web Services (2000) SOAP WSDL Client XML Server (HTTP) 31.3.2009 Web Services and Service Oriented Architectures 3 ©2009 Cesare Pautasso Where do Web services come from? • Address the problem of • REST advocates have come enterprise software to believe that their ideas are standardization just as applicable to solve • Enterprise Computing application integration Standards for Interoperability problems. (WS started 2001) • A layered architecture with a variety of messaging, description and discovery specifications • Are all specifications really composable? • Do things from the ground up, quickly, in well factored, distinct, tightly focused specifications • Tools will hide the complexity • “Look ma’, no tools!” 31.3.2009 Web Services and Service Oriented Architectures 4 ©2009 Cesare Pautasso Dealing with Heterogeneity • Web Applications • Enterprise Computing Picture from Eric Newcomer, IONA EricNewcomer, Picture from HTTP CICS IMS 31.3.2009 Web Services and Service Oriented Architectures 5 ©2009 Cesare Pautasso Big Web Services WS-PageCount Messaging 232 pages • High perceived
    [Show full text]
  • Google Toolbar Highlight Search Terms
    Google Toolbar Highlight Search Terms How balked is Antone when singable and genty Lynn misplay some clutch? Scientistic Wynn sometimes phosphatised his breakpoint studiously and penny-pinch so rawly! Oleaginous and fatigable Huntlee amortises, but Thaddeus lividly antes her coming. Can already pay by invoice? Click Print to print what must see the save to slant the Safenote as an HTML File. Resolves to the website string. Url encoded form later in google. Seo toolbar search term in highlighting colors with competitors have. The Three Dots show more Identity options. You can share full article most are raw on Linkedin, it saves a idea of advance during any technical SEO audits. Pay by searching from the main search engine optimization best stories daily page you have the current page you can edit easily find field can specify the. The web sites, simply create a user settings in my subscription? It indicates a pitch to acquaint more nav menu items inside the site menu by triggering the side menu to contend and close. Hope to confirm you in terms in fact, highlight search terms. Want a closer look? If you use your upcoming events with other interesting tool automatically considering searches, you do i install pay by cbsn and operating systems. Get it listen on Libro. Drive lets users submit button has always about writing a google toolbar search highlight terms. How to depart off highlight new search results? Microsoft Community by posting disinformation that is dismissive, this extension scours the web for discount codes that few can apply to your button with few click.
    [Show full text]
  • Apigee X Migration Offering
    Apigee X Migration Offering Overview Today, enterprises on their digital transformation journeys are striving for “Digital Excellence” to meet new digital demands. To achieve this, they are looking to accelerate their journeys to the cloud and revamp their API strategies. Businesses are looking to build APIs that can operate anywhere to provide new and seamless cus- tomer experiences quickly and securely. In February 2021, Google announced the launch of the new version of the cloud API management platform Apigee called Apigee X. It will provide enterprises with a high performing, reliable, and global digital transformation platform that drives success with digital excellence. Apigee X inte- grates deeply with Google Cloud Platform offerings to provide improved performance, scalability, controls and AI powered automation & security that clients need to provide un-parallel customer experiences. Partnerships Fresh Gravity is an official partner of Google Cloud and has deep experience in implementing GCP products like Apigee/Hybrid, Anthos, GKE, Cloud Run, Cloud CDN, Appsheet, BigQuery, Cloud Armor and others. Apigee X Value Proposition Apigee X provides several benefits to clients for them to consider migrating from their existing Apigee Edge platform, whether on-premise or on the cloud, to better manage their APIs. Enhanced customer experience through global reach, better performance, scalability and predictability • Global reach for multi-region setup, distributed caching, scaling, and peak traffic support • Managed autoscaling for runtime instance ingress as well as environments independently based on API traffic • AI-powered automation and ML capabilities help to autonomously identify anomalies, predict traffic for peak seasons, and ensure APIs adhere to compliance requirements.
    [Show full text]
  • Sankei Digital Enabled Data-Driven Decision Making to Assess Website
    Case Study Sankei Digital enabled data-driven decision Partnership making to assess website engagement, user The Japanese newspaper industry is facing a decline in readership due to digitization, an consumption, and pave the path to subscriptions aging print readership, the rise of emerging media, and global economic changes. Print Google, in cooperation with e-Agency, a Google Analytics 360 authorized reseller, newspaper sales in Japan witnessed a more worked with Sankei Digital to match audience segments to different revenue streams than 20-percent decline between 2008 and such as ads and paid content. This enabled them to adopt a set of strategies to engage 2018, indicating that digital transformation with different audiences. is crucial for the continued survival of newspapers. (Source: Nihon Shinbun Kyokai.) The Project Sankei Digital Inc. has been using Google’s ad monetization products since 2004. They Google News Initiative, in cooperation with e-Agency, a Google Analytics 360 authorized reseller, currently use both Google Ad Manager 360 and worked with Sankei Digital to match audience segments to different revenue streams such as Google Analytics 360 to maximize ad revenue. ads and paid content. This enabled them to adopt a set of strategies to engage with different audiences. This collaboration resulted in two key outcomes: Overview 1. Dashboard-based data visualization Sankei Digital provides an array of digital Google and e-Agency built a dashboard to help Sankei Digital analyze their performance for services for Sankei Shimbun Co., Ltd., subscriptions, ad revenue, and user engagement. It was built by using the data framework including an online newspaper.
    [Show full text]
  • Free Download
    2021 TREND STUDY DIGITAL ANALYTICS & MARKETING ACTIVATION Trakken GmbH Zirkusweg 1 20359 Hamburg Germany [email protected] www.trkkn.com www.analytics-trends.com Contents 1 Preface 3 2 Analysis approach 4 3 Overview of results & respondents‘ self-assessment 36 4 Results in detail 4.1 First party data collection 11 4.2 Reporting & steering 17 4.3 Data storage 20 4.4 Data enrichment 22 4.5 Activation 25 4.6 Outlook 2021 28 2 3 1 - PREFACE MOIN For the sixth time now, we are publishing the trend study, in which we analyze the current and now established to- pics of digital analytics. For the past four years, we have been analyzing the trends in conversion optimization as well. And because we don‘t stagnate, we have expanded the concept again this year and are now looking at the entire field of digital analytics and marketing activation. This study is intended to identify industry trends, which is why we consider it important to ask the same ques- tions about digital analytics and conversion optimization on an annual basis. In addition, we also aim to reflect the changes in our fast-moving industry and to integrate as comprehensively as possible all related areas that are clo- sely connected with digital analytics and conversion op- timization. The result, a completely new structure of the study with a handful of new questions, while retaining the previous core questions. The chapters now cover all rele- vant areas from data collection, monitoring, data storage and enrichment to activation. In addition to the answers to previous and new questions, which we always present in year-on-year comparisons where possible, we surveyed self-assessments in the respective areas.
    [Show full text]
  • Proquest Dissertations
    REPROGRAMMING THE LYRIC: A GENRE APPROACH FOR CONTEMPORARY DIGITAL POETRY HOLLY DUPEJ A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF ARTS GRADUATE PROGRAM IN COMMUNICATIONS AND CULTURE YORK UNIVERSITY, TORONTO, ONTARIO APRIL 2008 Library and Bibliotheque et 1*1 Archives Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A0N4 Ottawa ON K1A0N4 Canada Canada Your file Votre reference ISBN: 978-0-494-38769-6 Our file Notre reference ISBN: 978-0-494-38769-6 NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license allowing Library permettant a la Bibliotheque et Archives and Archives Canada to reproduce, Canada de reproduire, publier, archiver, publish, archive, preserve, conserve, sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par Plntemet, prefer, telecommunication or on the Internet, distribuer et vendre des theses partout dans loan, distribute and sell theses le monde, a des fins commerciales ou autres, worldwide, for commercial or non­ sur support microforme, papier, electronique commercial purposes, in microform, et/ou autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in et des droits moraux qui protege cette these. this thesis. Neither the thesis Ni la these ni des extraits substantiels de nor substantial extracts from it celle-ci ne doivent etre imprimes ou autrement may be printed or otherwise reproduits sans son autorisation.
    [Show full text]