• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 208
  • 118
  • 76
  • 58
  • 27
  • 18
  • 12
  • 11
  • 6
  • 5
  • 4
  • 3
  • 3
  • 3
  • 2
  • Tagged with
  • 635
  • 124
  • 109
  • 99
  • 74
  • 73
  • 72
  • 69
  • 68
  • 63
  • 59
  • 50
  • 45
  • 43
  • 38
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
301

The constitutionality of pornography

Van der Poll, Letetia 12 1900 (has links)
Thesis (LLD)--University of Stellenbosch, 2001. / ENGLISH ABSTRACT: The advent of a constitutional democracy in South Africa after the first non-racial democratic elections in 1994 and the subsequent adoption of a final constitution in 1996 introduced a legal order based on "democratic values, social justice and fundamental rights". The inception of a constitutional democracy in South African encourages an assessment of the possible constitutional ramifications of pornography, specifically within a discourse on women's interests in equality, human dignity and physical integrity. Under the strong influence of United States First Amendment doctrine, pornography is defined (and protected in the "marketplace of ideas") as a particular mode of expression, thus allowing pornography to be viewed as part of the fabric of an open, free and democratic society. Within this doctrinal context, the recognition and entrenchment of freedom of expression have firmly placed pornography on both the South African constitutional and political agendas. The objective of this study is to address specific aspects of the debate on adult heterosexual pornography (that is, pornography produced for and targeted at the male heterosexual market) in order to establish its constitutionality. This dissertation is not, however, intended as a discourse on pornography as a possible threat to the moral fibre of society, but rather about pornography as an invasion ofwomen's particular constitutional interests in equality, human dignity as well as security in and control over their bodies. To this end, Chapter 2 serves to establish a suitable theoretical framework that is capable of facilitating a woman-centred analysis of adult heterosexual pornography within the ambit of the Bill of Rights in the South African Constitution. Consequently, the merit ofliberal feminism and radical feminist thought is critically assessed against the particular (constitutional and doctrinal) demands presented by a study of this nature. Chapter three - the first in a trilogy which seeks to evaluate the different conceptualisations of pornography in the United States, Canada and South Africa - critically reflects on the obscenity jurisprudence of the Supreme Court of the United States of America as well as radical feminist campaigns in Minneapolis and Indianapolis to re-conceptualise pornography and its harm. Chapter 4 entails a critical reflection on the capacity of Canadian constitutional jurisprudence to address adult heterosexual pornography either as a patriarchal structure which impacts on women's interests in equality, dignity and physical integrity or as a mode of expression which incites gender hatred. Chapter 5 traces the history of South African censorship law as prelude to a critical discussion of the current Films and Publications Act as well as the first decision of the South African Constitutional Court on the possible human rights implications of sexually explicit material. The chapter concludes with proposals for a suitable conception of the (constitutional) harm as well as a legal definition of adult heterosexual pornography for South African law. The constitutional implications of the proposed conceptions of pornography and harm are evaluated in Chapter 6 with specific reference to sections 9, 10 and 12 as well as subsection 16(2)( c) of the South African Constitution. Chapter 7 concludes the present study with some thoughts on the suitability of censorship as legal and political strategy. / AFRIKAANSE OPSOMMING: Die koms van 'n konstitusionele demokrasie in Suid-Afrika ná die eerste nie-rassige demokratiese verkiesings in 1994 en die daaropvolgende aanname van 'n finale grondwet in 1996 het' n regsorde wat op "demokratiese waardes, maatskaplike geregtigheid en basiese menseregte" gegrond is, ingelei. Die aanvang van 'n konstitusionele demokrasie in Suid-Afrika moedig inderwaarheid 'n evaluering van die moontlike grondwetlike gevolge van pornografie, spesifiek binne 'n diskoers oor vroue se belange in gelykheid, menswaardigheid en fisiese integriteit, aan. Onder die sterk invloed van die leerstelling van die Amerikaanse Eerste Amendement word pornografie gedefinieer (en beskerm binne die "markplein van idees") as 'n spesifieke vorm van uitdrukking wat gevolglik meebring dat pornografie noodwendig as deel van 'n oop, vrye en demokratiese gemeenskap beskou word. Binne hierdie dogmatiese konteks het die erkenning en . verskansing van vryheid van uitdrukking pornografie stewig op sowel die Suid-Afrikaanse grondwetlike as politieke agendas geplaas. Die oogmerk van hierdie studie is om spesifieke aspekte rondom die debat oor volwasse heteroseksuele pornografie (naamlik, pornografie geproduseer vir en gerig op die manlike heteroseksuele mark) aan te spreek ten einde die grondwetlikheid daarvan te bepaal. Hierdie proefskrif is egter nie bedoel as 'n diskoers oor pornografie as moontlike bedreiging vir die morele stoffasie van die gemeenskap nie, maar eerder oor pornografie as 'n 'n inbreukmaking op vroue se spesifieke grondwetlike belange in gelykheid, menswaardigheid asook sekerheid in en beheer oor hulle liggame. Gevolglik dien Hoofstuk 2 om 'n gepaste teoretiese raamwerk daar te stel wat oor die vermoë beskik om 'n vroue-gesentreerde analise van volwasse heteroseksuele pornografie binne die raamwerk van die Handves van Menseregte in die Suid-Afrikaanse Grondwet aan te help. Daarom word die meriete van die liberale feminisme en die radikale feministiese denke krities oorweeg teenoor die spesifieke (grondwetlike en dogmatiese) uitdagings wat deur 'n studie van hierdie aard gestel word. Hoofstuk 3 - die eerste in 'n trilogie wat ten doel het om die verskillende opvattings oor pornografie in die Verenigde State, Kanada en Suid-Afrika te ondersoek - bevat 'n kritiese oorweging van die Amerikaanse Hooggeregshofse beskouing van obseniteit asook die radikaal feministies-geïnspireerde veldtogte in Minneapolis en Indianapolis wat ten doel gehad het om pornografie en sy nadeel te herkonseptualiseer. Hoofstuk 4 behels 'n kritiese oorweging van die vermoë van die Kanadese grondwetlike reg om volwasse heteroseksuele pornografie Of as 'n patriargale struktuur wat 'n impak op vroue se belange in gelykheid, menswaardigheid en fisiese integriteit het Of as 'n vorm van uitdrukking wat geslagshaat aanwakker, aan te spreek. Hoofstuk 5 speur die geskiedenis van sensuur in Suid-Afrika na as inleiding tot 'n kritiese bespreking van die huidige Wet op Films en Publikasies asook die eerste beslissing van die Suid- Afrikaanse Grondwetlike Hof oor die menseregte-implikasies van seksueel eksplisiete materiaal. Die hoofstuk sluit afmet voorstelle vir 'n gepaste begrip van sowel die (grondwetlike)nadeel as 'n regsdefinisie van volwasse heteroseksuele pornografie vir die Suid-Afrikaanse reg. Die grondwetlike implikasies van die voorgestelde begrippe van pornografie en gepaardgaande nadeel word in Hoofstuk 6 opgeweeg met besondere verwysing na artikels 9, 10 en 12 asook subartikeI16(2)(c) van die Suid-Afrikaanse Grondwet. Hoofstuk 7 sluit die onderhawige studie af met enkele gedagtes oor sensuur as gepasde regs- en politiese strategie.
302

Analyzing and Enhancing Routing Protocols for Friend-to-Friend Overlays

Roos, Stefanie 09 August 2016 (has links) (PDF)
The threat of surveillance by governmental and industrial parties is more eminent than ever. As communication moves into the digital domain, the advances in automatic assessment and interpretation of enormous amounts of data enable tracking of millions of people, recording and monitoring their private life with an unprecedented accurateness. The knowledge of such an all-encompassing loss of privacy affects the behavior of individuals, inducing various degrees of (self-)censorship and anxiety. Furthermore, the monopoly of a few large-scale organizations on digital communication enables global censorship and manipulation of public opinion. Thus, the current situation undermines the freedom of speech to a detrimental degree and threatens the foundations of modern society. Anonymous and censorship-resistant communication systems are hence of utmost importance to circumvent constant surveillance. However, existing systems are highly vulnerable to infiltration and sabotage. In particular, Sybil attacks, i.e., powerful parties inserting a large number of fake identities into the system, enable malicious parties to observe and possibly manipulate a large fraction of the communication within the system. Friend-to-friend (F2F) overlays, which restrict direct communication to parties sharing a real-world trust relationship, are a promising countermeasure to Sybil attacks, since the requirement of establishing real-world trust increases the cost of infiltration drastically. Yet, existing F2F overlays suffer from a low performance, are vulnerable to denial-of-service attacks, or fail to provide anonymity. Our first contribution in this thesis is concerned with an in-depth analysis of the concepts underlying the design of state-of-the-art F2F overlays. In the course of this analysis, we first extend the existing evaluation methods considerably, hence providing tools for both our and future research in the area of F2F overlays and distributed systems in general. Based on the novel methodology, we prove that existing approaches are inherently unable to offer acceptable delays without either requiring exhaustive maintenance costs or enabling denial-of-service attacks and de-anonymization. Consequentially, our second contribution lies in the design and evaluation of a novel concept for F2F overlays based on insights of the prior in-depth analysis. Our previous analysis has revealed that greedy embeddings allow highly efficient communication in arbitrary connectivity-restricted overlays by addressing participants through coordinates and adapting these coordinates to the overlay structure. However, greedy embeddings in their original form reveal the identity of the communicating parties and fail to provide the necessary resilience in the presence of dynamic and possibly malicious users. Therefore, we present a privacy-preserving communication protocol for greedy embeddings based on anonymous return addresses rather than identifying node coordinates. Furthermore, we enhance the communication’s robustness and attack-resistance by using multiple parallel embeddings and alternative algorithms for message delivery. We show that our approach achieves a low communication complexity. By replacing the coordinates with anonymous addresses, we furthermore provably achieve anonymity in the form of plausible deniability against an internal local adversary. Complementary, our simulation study on real-world data indicates that our approach is highly efficient and effectively mitigates the impact of failures as well as powerful denial-of-service attacks. Our fundamental results open new possibilities for anonymous and censorship-resistant applications. / Die Bedrohung der Überwachung durch staatliche oder kommerzielle Stellen ist ein drängendes Problem der modernen Gesellschaft. Heutzutage findet Kommunikation vermehrt über digitale Kanäle statt. Die so verfügbaren Daten über das Kommunikationsverhalten eines Großteils der Bevölkerung in Kombination mit den Möglichkeiten im Bereich der automatisierten Verarbeitung solcher Daten erlauben das großflächige Tracking von Millionen an Personen, deren Privatleben mit noch nie da gewesener Genauigkeit aufgezeichnet und beobachtet werden kann. Das Wissen über diese allumfassende Überwachung verändert das individuelle Verhalten und führt so zu (Selbst-)zensur sowie Ängsten. Des weiteren ermöglicht die Monopolstellung einiger weniger Internetkonzernen globale Zensur und Manipulation der öffentlichen Meinung. Deshalb stellt die momentane Situation eine drastische Einschränkung der Meinungsfreiheit dar und bedroht die Grundfesten der modernen Gesellschaft. Systeme zur anonymen und zensurresistenten Kommunikation sind daher von ungemeiner Wichtigkeit. Jedoch sind die momentanen System anfällig gegen Sabotage. Insbesondere ermöglichen es Sybil-Angriffe, bei denen ein Angreifer eine große Anzahl an gefälschten Teilnehmern in ein System einschleust und so einen großen Teil der Kommunikation kontrolliert, Kommunikation innerhalb eines solchen Systems zu beobachten und zu manipulieren. F2F Overlays dagegen erlauben nur direkte Kommunikation zwischen Teilnehmern, die eine Vertrauensbeziehung in der realen Welt teilen. Dadurch erschweren F2F Overlays das Eindringen von Angreifern in das System entscheidend und verringern so den Einfluss von Sybil-Angriffen. Allerdings leiden die existierenden F2F Overlays an geringer Leistungsfähigkeit, Anfälligkeit gegen Denial-of-Service Angriffe oder fehlender Anonymität. Der erste Beitrag dieser Arbeit liegt daher in der fokussierten Analyse der Konzepte, die in den momentanen F2F Overlays zum Einsatz kommen. Im Zuge dieser Arbeit erweitern wir zunächst die existierenden Evaluationsmethoden entscheidend und erarbeiten so Methoden, die Grundlagen für unsere sowie zukünftige Forschung in diesem Bereich bilden. Basierend auf diesen neuen Evaluationsmethoden zeigen wir, dass die existierenden Ansätze grundlegend nicht fähig sind, akzeptable Antwortzeiten bereitzustellen ohne im Zuge dessen enorme Instandhaltungskosten oder Anfälligkeiten gegen Angriffe in Kauf zu nehmen. Folglich besteht unser zweiter Beitrag in der Entwicklung und Evaluierung eines neuen Konzeptes für F2F Overlays, basierenden auf den Erkenntnissen der vorangehenden Analyse. Insbesondere ergab sich in der vorangehenden Evaluation, dass Greedy Embeddings hoch-effiziente Kommunikation erlauben indem sie Teilnehmer durch Koordinaten adressieren und diese an die Struktur des Overlays anpassen. Jedoch sind Greedy Embeddings in ihrer ursprünglichen Form nicht auf anonyme Kommunikation mit einer dynamischen Teilnehmermengen und potentiellen Angreifern ausgelegt. Daher präsentieren wir ein Privätssphäre-schützenden Kommunikationsprotokoll für F2F Overlays, in dem die identifizierenden Koordinaten durch anonyme Adressen ersetzt werden. Des weiteren erhöhen wir die Resistenz der Kommunikation durch den Einsatz mehrerer Embeddings und alternativer Algorithmen zum Finden von Routen. Wir beweisen, dass unser Ansatz eine geringe Kommunikationskomplexität im Bezug auf die eigentliche Kommunikation sowie die Instandhaltung des Embeddings aufweist. Ferner zeigt unsere Simulationstudie, dass der Ansatz effiziente Kommunikation mit kurzen Antwortszeiten und geringer Instandhaltungskosten erreicht sowie den Einfluss von Ausfälle und Angriffe erfolgreich abschwächt. Unsere grundlegenden Ergebnisse eröffnen neue Möglichkeiten in der Entwicklung anonymer und zensurresistenter Anwendungen.
303

Violence gratuite et adolescents-bourreaux : Réception, traduction et enjeux de deux romans suédois pour adolescents, en France, au début des années 2000 / "Unprovoked violence" and "nasty adolescents" : Reception, translation and challenges of two Swedish novels for adolescents in France in the early 2000s

Alfvén, Valérie January 2016 (has links)
The purpose of this thesis is to contribute to a better understanding of the role of Swedish literature for adolescents in the French literary scene in the early 2000s. The sociology of literature constitutes the main theoretical framework of this thesis. Drawing from examples that broach the sensitive topic of "unprovoked violence" as it is treated in two Swedish novels for teenagers, Spelar död [Play Death] by Stefan Casta and När tågen går förbi (Train Wreck) by Malin Lindroth, this thesis shows how these novels are innovative in Even-Zohar’s sense of the term, as addressed in his Polysystem Theory (1990). By introducing "unprovoked violence" and violent teenagers via a realistic genre, such works filled a vacuum in the French system and injected a new dynamic into it. This dynamic makes it possible for new literary models to be introduced in the system and to change the standards of that system. The analyses of the French and Swedish receptions of the two novels mentioned above show that they gave rise to a moral panic in France, which is not an unusual thing to happen in periods of ongoing change. This also clarifies the differences in norms between the two systems. The French system tends to reject dark topics, while the Swedish wishes to discuss them. The investigations of the translations of unprovoked violence show that adherence to Swedish norms determine the translation’s adequacy (Toury), which may be part of the reason for the stormy reception the two works received in France, and their undergoing censure. The position of translators and publishers in the literary system also plays a major role for a translated text not being censured during the transfer from one system to another. Even if the Swedish titles translated into French are few, this thesis shows that the impact of Swedish literature on adolescents in France is certain. By introducing new and sensitive topics, such novels could be early markers of an evolution of the French field of literature for adolescents.
304

Post tenebras spero lucem : Alquimia y ritos en el Quijote y otras obras cervantinas

Magrinyà Badiella, Carles January 2014 (has links)
This study focuses on two areas: alchemy (Part I) and rituals of initiation (Part II) in the works of Miguel de Cervantes, focusing on Don Quijote de la Mancha as my main case study. The first part analyses the function of alchemy and how it can be interpreted throughout the works and various literary genres of Cervantes. It will demonstrate that the texts of Cervantes contain both explicit and implicit allusions to, as well as different aspects of alchemy, such as operative and spiritual alchemy and how these are ultimately used by Cervantes as a means of expression. The author draws from this rich source and modifies these means of expression in order to achieve various results: sometimes with wit or in relation to fraud; at other times it focuses on inner alchemy relating to chivalry in what I have called spiritual chivalry, which has the aim of self-improvement and ultimately, gnosis. Regarding the chivalric rituals of initiation, according to this investigation chivalry serves as both satire and representation of the alchemical process in the case of Don Quijote, which finds its key moments during the rituals. In this sense alchemy and chivalry are studied as two sides of the same coin, in which the search for something higher, an object (the philosopher stone, the beloved), subjects the protagonist to continuous transmutations and puts him in contact with the transitory, that is, liminal states, people and spaces. From this perspective Don Quixote de la Mancha is built upon liminal poetics. My approach, which follows the tenets of analogical hermeneutics, is included within the framework of the Western Esotericism Studies. The 16th and 17th centuries were a fertile age for alchemy throughout Europe. In Spain, alchemy and other esoteric disciplines co-existed with the Spanish Inquisition and its body for the control of ideas and texts: censorship. By being ambiguous and putting into dialogue different ideas of alchemy, Cervantes not only allowed readers to reach their own conclusions, he also protected his work from censorship.
305

Mediální obraz vylodění v Zátoce sviní na Kubě v československém dobovém tisku / The media image of the Bay of pigs invasion of Cuba in the czechoslovakia contemporary press

Applová, Jana January 2015 (has links)
This Master Thesis is called Media Image of the Bay of Pigs Invasion of Cuba in the Czechoslovakia Contemporary Press. Its aim is to show overall picture of how was the Invasion characterized by four contemporary daily newspapers - Rudé právo, Lidová demokracie, Mladá fronta a Obrana lidu. The first part of this thesis describes the historical background of the Bay of Pigs Invasion and the Invasion itself, relationship between Cuba and Czechoslovakia, what was the media situation, censorship, propaganda and short introduction of the newspapers. Next part analyses the contemporary newspaper articles, which puts together media image of the Invasion. During the Cold War, the Invasion of the Bay of Pigs was the first serious conflict between Cuba and the USA.
306

Hlasatelky v Československém rozhlase a rozhlas pro ženy ve třicátých letech 20.století / Women in radioand radio for women in thirties

Fabianová, Petra January 2015 (has links)
The master thesis with topic "Female broadcasters in Czechoslovakian radio and radio for women" is describing, based on historical events during thirties in the twentieth century, development of radios broadcasting in Czechoslovakia. In the first chapter the author devotes to technical development, new inventions, international broadcasting and further censorship and radios reorganizations. By signature of Munich's agreement emerged special institution for censorship, which caused problems to some employees of Radiojournal. Important part of this chapter is also introducing Prague's program conception and Brno's studio, which became a big rival to the capital. Second chapter is devoted to the analysis of program called "Radio for women". The most important part of master thesis introduces topics, which were typical for examined period and which were prepared mainly for female listeners. Lectures were connected with cooking, household, upbringing or studies. Woman was understood mainly as expectant mother taking care of babies and household. Life of first female broadcasters of Radiojournal, for example Zdeňka Walló, Marie Magdalena Tomanová, Helena Kronská and others, describes last and third chapter. Besides other things is there explained what does job of broadcaster mean and what kinds of problems this...
307

Zobrazení boha ve filmu / The Manifestation of God in Film

Duda, Miroslav January 2012 (has links)
Anotation The main gaol of this study is to systematically map the manifestation of God in film with the focus on Hollywood production because it influences the whole western cinematography from its beginning to the present day. It systematically reveals various approaches to adaptation of the topic with regard to the time, cultural and social kontext. It expounds the development of the main aspects and ground of film censorship, which is considerably influenced by religion in secularized societies. It describes the techniques and approaches of individual directors to the topic.
308

Propaganda v československém tisku při olympijských hrách v letech 1980 a 1984 / Propaganda in czechoslovak press during the Olympic games in 1980 and 1984

Hlucháň, Martin January 2013 (has links)
This work offers analysis of propaganda used in Czechoslovak daily journal Rude Pravo, that focused on the topic of the Moscow 1980 and Los Angeles 1984 Olympic Games. Both Games were notably affected by Cold War related boycott. Therefore, theoretical part of this work describes major circumstances of the conflict along with socio-historical and media context of Czechoslovakia in its period of normalization. The emphasis is focused mainly on description of censorship mechanisms. The research part of this work analyses the main theme units, found in Rude Pravo and searches for their connection with available documents of censoring authorities ÚV KSČ, ČÚTI and FÚTI.
309

Un exotisme à l’italienne. Représentations, usages politiques et réceptions de l’altérité non-européenne sur la scène de la Scala (1778-1946) / Exoticism all’italiana. Representations, political usages and receptions of non-European alterity on La Scala’s stage (1778-1946)

Lhâa, Alexandre 28 March 2013 (has links)
Cette thèse s'attache à analyser les ballets et les opéras exotiques représentés sur la scène du Teatro alla Scala, de la création du théâtre, en 1778, à sa réouverture, en 1946, période au cours de laquelle plus de trois cents œuvres mettant en scène l'ailleurs non européen et ses habitants furent données à voir au public du plus prestigieux théâtre lyrique milanais. L'approche des représentations de l'autre non européen, retenue ici, accorde une très large place aux livrets, en même temps qu'elle s'articule à la réception des œuvres dans la presse, afin de pouvoir saisir un sens public de ces représentations. Après avoir, dans un premier temps, dressé un panorama des lieux et des thèmes exotiques mis en scène, où dominent un Orient tout à la fois polymorphe et placé sous le signe de la répétition, ainsi que les mises en scène de la découverte et de la conquête du continent américain, cette recherche aborde la question de la création, librettistique et scénique, d'une altérité non européenne, qui apparaît désirée autant qu'elle est moquée et critiquée. Enfin, dans un troisième temps, cette étude tente de mettre au jour les usages politiques des œuvres exotiques, que celles-ci soient utilisées pour contester le pouvoir en place ou qu'au contraire ce dernier fasse d'elles des véhicules idéologiques. / This thesis analyses the exotic operas and ballets staged at the Teatro alla Scala from its inauguration in 1778 to its reopening in 1946 – a period during which the audiences of Milan's most prestigious opera house were offered more than three hundred productions representing non-European countries and their inhabitants. My approach integrates close readings of the librettos with a focus on the reception of these works in the press, in order to understand how these representations made sense to the public. The first part presents an overview of the exotic places and themes that were staged. A polymorphous but repetitive Orient and the discovery and conquest of the New World predominate. The second part focuses on the librettos and staging in order to address the construction of a non-European alterity that is desired as much as it is denigrated. Finally, the third part brings to light the political usages of these exotic works, asking whether they served to avoid censorship and contest the authorities or, on the contrary, functioned as vehicles for the ideology of the regimes of their time.
310

Real and imagined readers: censorship, publishing and reading under apartheid

Matteau, Rachel 21 August 2012 (has links)
Ph.D. University of the Witwatersrand, Faculty of Humanities, 2012 / This thesis studies the readership of literature that was banned under the various laws that comprised the censorship system, focusing on the apartheid period, from the 1950s until the early 1990s. It investigates the conditions under which banned and subversive literature existed in the underground network despite the ever-looming censorship apparatus. It is based on theories drawn from the history of the book, sociology of literature, South African literary histories, and on data from secondary and primary sources such as archival material and interviews with, and testimonies from, readers. This thesis focuses on the roles of readers in alternative circuits, by examining the modalities of sourcing, distributing, reading and sharing of imported and local banned publications. It seeks to demonstrate that readers did read banned books and books likely to be banned, showing creativity in the various strategies used to get these books into the country and to share them amongst the largest number of readers, using texts in various fashions, and actively participating to the South African literary industry and broader socio-political affairs.

Page generated in 0.0462 seconds