Comm Ii 121 W.A. 4 Essay

908 words - 4 pages

Chance Peterson7/27/2014Mass Communication W.A. 41) Using examples, explain the difference between obscene and indecent materials.The definitions of obscenity and indecency seem to be both very unclear when it comes to a legal, technical meaning for each. As we have moved through centuries of mass media, the ideas of what are obscene and indecent have changed dramatically. What was considered taboo in the 19th century, like the showing of sexually explicit scenes, is now part of one's everyday viewing or lifestyle. As the times have changed, so have we as a society. When it comes to defining and comparing these two words, the legal system seems to have a much more monumental task at hand. What exactly makes something obscene or indecent?Obscenity has had many changes in meaning and legal standing over a period of 150 years. Obscenity was tested for many years by the Hicklin Rule. This standard had the power to deem a book obscene by having a mere passage of the "tendency to deprave or corrupt the mind of the most susceptible person." (Dominck, 2009) This now obscure rule was the standard for nearly a century but was written in the 1860's and has long been repealed. As we moved into the middle and latter parts of the 20th century, the legal meaning of obscenity was altered and made less stringent. One constant that has remained regarding obscenity is its capacity to bring about lewd and lustful thoughts to the individual viewing that material. This seems to be the standard in what has until this day lasted in the eyes of the legal system. While who is to determine what constitutes obscenity and who is to be protected (speaking of children in today's society) by obscenity laws, has mostly been placed in the hands of local juries. There are constantly problems arising as new technology develops and new material is created (Dominick, 2009).Indecency seems to have the same problems as obscenity when the issue is turned to its technical and legal meaning. Indecency also seems to cover more areas of what is inappropriate than does obscenity, such as, music videos displaying females wearing skimpy outfits with no censorship for younger viewers. The Federal Communications Committee (FCC) is the agency which exerts authority over what deemed indecent in terms of its dissemination through mass media. The FCC has issued fines for multiple displays of indecency over the years to many different media outlets. While the FCC exerts control over indecent material, they are in a constant struggle between the rulings of Congress and the federal court system (Dominck, 2009). Unlike obscenity and its connection mostly to lewd and sexual pornographic material, indecency can range from sexual material, cursing, violence or other types of offensive material within the media deemed inappropriate for viewership. It appears...

Find Another Essay On Comm II 121 w.a. 4

ICT in Language Learning Essay

4022 words - 16 pages . College & Research Libraries News, 61.2, (2000): 100-01. Schlembach, M. C. (2001). Trends in current awareness services. Science & Technology Libraries, 20.2/3, 121-132. 2. Barad, D. P. (2009).AsiaCall Online Journal (ISSN 1936-9859) Vol.4 No.1 October 2009, 'EXPERIMENTING ICT IN TEACHING ENGLISH LANGUAGE AND LITERATURE - 3. Bates A.W: (1993) Educational aspects of the telecommunications revolution in Teleteaching North Holland

Outline the major features of the Common Agricultural Policy as it currently operates. Consider the problems posed for the policy by the Enlargement.

2600 words - 10 pages /syntchif2004/en.pdf P17Link 4: 3: Research Service Website.USDA (1999) The European Union's Common Agricultural Policy: Pressures for Change: An Overview, US Department of Agriculture:Link 2: Parliament Website:

The Bengal Tiger: A Memeber of the Big Cat Family

1643 words - 7 pages . Hebblewhite, J.M. Goodrich, D. G. Miquelle. 2010. Review of research methodologies for tigers: Telemetry. Integrative Zoology 5:378-389. Wiedner, E.B., R. Isaza, W.A. Lindsay, A.L. Case, J. Decker, J. Roberts. 2008. Pericardial mesothelioma in a Bengal Tiger (Panthera tigris tigris). Journal of Zoo and Wildlife Medicine 39:121-123. Lambrechts, N.E., W.L. Berry. 2000. Caudal cervical disc protrustion in a Bengal Tiger (Panthera tigris tigris). Journal of Zoo and Wildlife Medicine 31:404-407.

The Economics of Student Performance

1598 words - 6 pages background are essential information to explain characteristics of each student 3. Time allocation is an allocation of time for different activities. In this case, activities can divide into two main group activities which are studying time and leisure. 4. Facebook usage is time spending on Facebook Sign 1. Initial ability: As a student has a higher initial ability, student can understand and remember in contents faster and more efficient which

Linaceae, one of the flowering plant families

1222 words - 5 pages to Light and Calcium, Biol. Plant., vol. 44, pp. 611–613. Murray, B.E., Handyside, R.J., and Keller, W.A. (1977), In Vitro Regeneration of Shoots on Stem Explants of Haploid and Diploid Flax (Linum usitatissimum), Can. J. Genet. Cytol., vol. 19, pp. 177–186. Ockendon, D. J. and Walters, S. M. (1968), Linum. In: Flora Europaea (Tutin T. G., Heywood V. H., Burges N. A., Moore D. M., Valentine D. H., Walters S. M., and Webb D. A., eds.). Cambridge University Press, Cambridge, pp. 206–211. Weiss, S. G., Tin-Wa M., Perdue, R. E., and Farnsworth, N. R. (1975), Potential anticancer agents II. Antitumor and cytotoxic lignans from Linum album (Lina ceae). J. Pharm. Sci. 64, 95–98.

The End of the Great Depression

1660 words - 7 pages unable to decode the Navajo’s messages to others Allied troops during the war. The Marine Corps helped developed the code talkers’ use of comprehensive and secure system of codes. During World War II, here were approximately 400 Navajo code talkers severing in the military. This gave even the Native Americans jobs in the hardest of times through the Great Depression and the war. (Gilbert 4-15) Therefore, the Great Depression was ended through World

Image Reintegration

2339 words - 9 pages Quirinale’ (Conti, 2007, p.121). Maratta found himself in a quandary, as he did not want to manipulate a masterpiece. Hence, he came up with an idea of using ‘pastels of earth colours ground with gum, with them he painted the veil over the breast of the Virgin as the Pope wished’. Since then, it seems that Maratta used this technique for ‘retouching’ other paintings; ‘anyone more worthy than I to match his brush against that of Raphael to rub out my


6042 words - 24 pages myopia: Being the well-wrapped package with brains is not enough. Human Resources Management, 15 (4).Veiga, J.F. 1974. Getting the mail questionnaire returned: Some practical research considerations. Journal of Applied Psychology, 59 (2).Veiga, J.F. 1974. Phases of career mobility. Harvard Business Review. In : Executives in Mid‑Career. (September‑October): 121‑27.Veiga, J.F. 1973. The mobile manager at mid‑career. Harvard

Analysis of a Classroom Incident Involving Cultural Insensitivity

1274 words - 6 pages Executive Summary This report provides an analysis and evaluation   Table of Contents Title page i Executive Summary ii Table of Contents iii Introduction p1 - 1. Purpose p1 - 2. Scope p1 - 3. Method p1 Complaint p1 Findings p1 Recommendations p3 - 1. Recommendations for the parties p3 - 2. Recommendations

Designing high-leverage strategies and tactics

6483 words - 26 pages [4] tried to reduce this intellectual chaos with a framework that achieved paradigm status [22,57]. It decomposed managerial decision making into three parts: strate- gic planning, tactical planning and operational con- trol (Fig. 1). Resembling Boulding's hierarchy of com- plexity [8], these organizational components also form a hierarchy along several dimensions: time horizon, 0167-2533/03/$8.00  2003 - IOS Press. All rights reserved 2

Reconstruction of Image with Hebcot Compression Technique

2420 words - 10 pages Systems, vol. 11, pp. 205-225, Aug. 1993. [2] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. ACM Conf. Computer and Comm. Security, pp. 598- 609, 2007. [3] E. Barka and A. Lakas, “Integrating Usage Control with SIP-Based Communications,” J. Computer Systems, Networks, and Comm., vol. 2008, pp. 1-8, 2008. [4] D. Boneh and M.K. Franklin, “Identity-Based

Similar Essays

Software Applications Essay

1347 words - 5 pages detailed information about certain software modules reviewed above is given in the next chapter in connection with the description of the experimental procedure. Works Cited Yano, D., C. Korach, J. Streator, S. Danyluk. “Nonvibrating Contact Potential Difference Probe Measurement of a Nanometer-Scale Lubricant on a Hard Disk,” Journal of Tribology, Transactions of the ASME, v 121, n 4, Oct 1999, p 980-983. [2] Yang, Y., T. Kurfess, S. Liang, S

Fair Debt Collection Practices Act Of 1977

1218 words - 5 pages Pharmacology for Nursing 3 NRSG 110 Medical Surgical Nursing II 3 NRSG 111 Medical Surgical Nursing II Clinical 2 Select 1 of the following courses. COMM 101 Fundamentals of Public Speaking 3 COMM 102 Introduction to Interpersonal Communication 3 Select 1 of the following courses. APHY 201 Advanced Human Physiology 4 V BIOL 201 General Microbiology 4 V BIOL 211 Microbiology I 3

Strategic Marketing Plan Of E Tours 2007

3125 words - 13 pages Factors w.a. E-Tours Competitors Travelex Expedia Luxtravel Price 40 8 320 6 240 8 320 5 200 Payment terms 25 8 200 7 175 8 200 6 150 Destinations 20 5 100 5 100 6 120 5 100 Services 10 7 70 6 50 7 70 8 80 Customer relations 5 4 20 4 20 4 20 8 40 Total 100 710 595 730 570 Analyzing the chart we can realize that in the

Dynamic Key Management System For Improving Security In Three Tier Environment

1807 words - 7 pages Network with Mobile sink”, Parallel and Distributed System, vol.23,no.5, May 2012 [4]A. Rasheed and R. Mahapatra, “A Key Pre-Distribution Scheme for Heterogeneous Sensor Networks,” Proc. Int’l Conf. Wireless Comm. And Mobile Computing Conf. (IWCMC ’09), pp.263-268, June 2009. [5]L. Eschenauer and V. D. Gilgor, A Key-management scheme for distributed sensor networks,” Proc. Of the ACM Conference Computer Communication Security (CCS’02), pp.41-47