Grafični evfemizmi v računalniško posredovani komunikaciji
Issue Date
2017-07-01Author
Michelizza, Mija
Vranjek Ošlak, Urška
Publisher
University of Maribor, Department of Slavic Languages and Literatures
Type
Article
Article Version
Scholarly/refereed, publisher version
Published Version
http://www.ff.um.si/dotAsset/70827.pdfRights
All articles are licensed under a Creative Commons Attribution Non-Commercial 4.0 International License (CC-BY-NC).
Metadata
Show full item recordAbstract
Prispevek predstavlja analizo grafičnih evfemizmov izbranih kletvic v računalniško posredovani komunikaciji (Twitter in komentarji pod novinarskimi prispevki) in skuša ugotoviti, kako jih uporabniki prikrijejo z namenom, da bi se izognili avtomatskemu zaznavanju in izbrisu svojih tvitov ali komentarjev. Najpogostejša tipa grafičnih evfemizmov sta nadomeščanje črke z nečrkovnim znakom in vstavitev nečrkovnega znaka v besedo. Zelo pogosto je tudi zaporedje ponavljajočih se znakov v takih besedah. Manj pogosti so nadomeščanje črkovnega elementa z vizualno podobnim znakom ter zamenjave črk z drugimi črkami in kombinacijami črk s podobno izgovarjavo. Analiza tudi pokaže, da so uporabniki zelo inovativni; sklopi, besedne igre in razne besedotvorne inovacije so zelo pogosti, čeprav je njihov prvotni namen igra z jezikom in ne prikrivanje tabuiziranih besed.The paper presents the analysis of graphic euphemisms of selected swear words in Slovenian computer mediated communication (on Twitter and in online news comments) and identifies different ways in which CMC users disguise taboo words in order to avoid automatic detection and deletion of their tweets or comments. Most common graphic euphemism types are the substitution of a letter with a non-letter symbol and the insertion of a non-letter symbol. Doubled letters are common as well. The substitution of letters with visually similar symbols, other letters or letter combinations with similar pronunciation are less frequent. The analysis also shows that CMC users are very innovative; juxtaposition, puns and various word formation procedures are very common, even though their primary role is language play rather than taboo word encryption.
ISSN
2385-8753Collections
Items in KU ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
We want to hear from you! Please share your stories about how Open Access to this item benefits YOU.