Preview

Assignment 1 COM3702

Powerful Essays
Open Document
Open Document
3982 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Assignment 1 COM3702
Assignment 1: COM3702
Name:
Student no :

Unique no: 886406
Mr K Ndlovu
47004290

Declaration of own work
I, the undersigned, hereby declare that this is my own and personal work, except where the work(s) or publications of others have been acknowledged by means of reference techniques.
I have read and understood Tutorial Letter CMNALLE/301 regarding technical and presentation requirements, referencing techniques and plagiarism.
Name
: Khumbulani Ndlovu
Student Number : 47004290
Date
: 03 August 2014
Witness
: Prisca Ndhlovu
Address
: 126 Dladla Street.Mofolo Village.Soweto.1801

Code
Module
Semester
Number of assignment
Unique number

: COM3702
: Media studies: policy, management and media representation
: 02
: 01
: 886406

1

Assignment 1: COM3702
Name:
Student no :

Unique no: 886406
Mr K Ndlovu
47004290

TABLE OF CONTENTS

PAGE

1 MEDIA POLICY AND REGULATIONS
1.1 Paradigms of communications policy
1.1.1
1.1.2
1.1.3

Emerging communications industry policy
Public service media policy
New media policy

1.2 Freedom of the media
1.2.1
1.2.2
1.2.3

The need for freedom of expression
Threats to it
If , how and why such threats can or cannot be motivated

2 MEDIA MANAGEMENT AND MEDIA MARKETS
2.1 Media Concentration

3
3
3
3
4
4
4
5
5
7

7
2.1.1 The relationship of competition to concentration
7
2.1.2 The dual nature of the media industry
7
2.1.3 The four forms of concentration
7
2.1.4 The dangers of concentration
8
2.1.5 Positive externalities of the media
8
ADDENDUM A : SELF-ASSESSMENT AND SELF- REFLECTION 9

SOURCES CONSULTED
ADDENDUM B: ARTICLE ON THREAT TO FREEDOM OF
EXPRESSION

2

10
11

Assignment 1: COM3702
Name:
Student no :

Unique no: 886406
Mr K Ndlovu
47004290

1.MEDIA POLICY AND REGULATIONS
1.1 Paradigms of communications policy
Fourie J P (2008:18) defines paradigms of communications policy as consensus among policy makers as far as the basics are concerned on which they will base their developing of a policy. There are three most popular paradigms of

You May Also Find These Documents Helpful

  • Good Essays

    comm 450 assignment 1

    • 907 Words
    • 4 Pages

    b) Kleinberg Corporation was sued by a customer for product liability. The customer sought damages of $1,500,000. At the its December 31, 2012, year-end, the company obtained an opinion from their lawyers that the customer had a 75% likelihood of winning the suit with the damages likely to be assessed in the range of $800,000 to $1,200,000. Legal costs were estimated to amount to a further $150,000. In late January, before the company’s financial statements had been finalized, the company settled the claim with the customer for $800,000. The lawyers estimated their fees to be reduced to $80,000 because the matter was settled without going to court.…

    • 907 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Microsoft. (2012, April 26). Window Server Creating A Site Link Design. Retrieved from Tech Net.Microsoft.com: http://technet.microsoft.com/en-us/library/cc732837(v=ws.10).aspx…

    • 670 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Samuel Aggor CSC 1100 3/3/16 Assignment 5 Problem 1 a. Output: 3.94 b. Output: 6.67 c. Output: 15.00 d. Output: -35.00 e. Output: 0 Problem 2 a. Output: 62 b. Output: 20160 c. Output: 20 213837312 d. Output: 1 Problem 3 a. Func1 has two parameters. Func1 is an integer function. b. Func2 has three parameters. Func2 is a double function.…

    • 188 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The free group with two generators a and b is composed of all finite strings that are formed from the four symbols a, a−1, b and b−1 given that no a is directly next to an a−1 and no b is directly next to a b−1. Two such strings can be concatenated and converted into a string of this type by repeatedly replacing the "forbidden" substrings with the empty string. For example: abab−1a−1 concatenated with abab−1a yields abab−1a−1abab−1a, which contains the substring a−1a underlined in the example, and so the “forbidden” string gets cancelled and reduced to abab−1bab−1a, which again contains the substring b−1b underlined in the example, which then gets reduced to abaab−1a. It can be checked that the group formed from the set of those strings with…

    • 493 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    No the supervisor isn't right because Mark and Jean can fill the pool less than ten hours.…

    • 104 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Assignment 1 for CS105

    • 1662 Words
    • 5 Pages

    Jean, a former pharmacist, is now the network administrator for the LM Pharmacy in the town of Paris, Virginia. His duties include enabling the electronic transfer of information between health care providers (i.e., doctors and hospitals), patients, and the pharmacy itself. One of Jean’s most important responsibilities is to protect health information in accordance with federal law and the pharmacy’s privacy policy.…

    • 1662 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    IT302 Assignment 5.1

    • 308 Words
    • 2 Pages

    Setting /etc/vsftpd/ftpusers lists users that are not allowed to log in on the FTP server…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Richman Investment needs and new enterprise encryption strategy. This is for a more secure network. They are wanting to grow to 10,000 employees worldwide. Richman Investment wants to operate out of 20 different countries in the future. This is very easy to do but to have a secure network there are many things that would have to happen which will make this more difficult to do. Have a secure network takes a lot of work and has to be monitored 24 hours a day 7 days a week. There are many different ways to go about this topic the one I am going to pick is a public key infrastructure (PKI).…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    The purpose of this policy is to define standards for connecting to Richman investment’s network from any host. These standards are designed to minimize the potential exposure to Richman investments from damages which may result from unauthorized use of Richman investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman investments internal systems, etc.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Application: Generally, a function on any kind of computer or electronic device that is useful to the user, which can give the user a reason to want to own and use the device. More specifically, software that performs some useful function for a user.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The two main nano-sized particles that may be applied to construction materials in the future are titanium dioxide (TiO2) and carbon nanotubes (CNTs) (Smith, 2012)…

    • 2077 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    There are several roles within the health information management (HIM) profession. A HIM professional gathers, preserves, evaluates and guard’s personal health information within many different health care settings. One of the most important duties in regards to a HIM professional is ensuring compliance and upholding the current regulations in the health care industry. This paper will take a closer look at the specifics of what a HIM professional does to ensure compliance as well as the importance of education and certifications that many employers are now requiring for potential candidates in the HIM field.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Assignment 702 Task A

    • 1663 Words
    • 5 Pages

    The Catering Services industry has struggled during the past five years. Since 2008-09, a severe economic downturn has led businesses and households to spend less on catered events. Businesses faced with plunging profitability cut back sharply on catered events such as office parties, corporate seminars and product launches, and reduced average spend per head for events that did go ahead. The deteriorating consumer climate led consumers to put off discretionary events and choose to cater events themselves or spend less at a restaurant rather than use the industry 's services.…

    • 1663 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    It is not uncommon for people to say that relationships are based upon trust. Although love alone plays a major role in a successful relationship, obstacles found within trust boundaries are often tested and played out. It is equally important to express your self-disclosure as it is to receive your partners. Communication can either make or break a relationship depending on how far one is willing to trust the other. After reading “Can We Talk? Researcher Talks About the Role of Communications in Happy Marriages” and reviewing on my own personal relationship status, I am in conclusion that good communication between interpersonal relations are key to a successful relationship/marriage.…

    • 575 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    1. Go to http://www.cybercrime.gov. Go to the section on computer crimes press release. Select one of the cases randomly. Describe the type of attacker and the type of attack(s), according to the categories that are defined as in the textbook…

    • 542 Words
    • 3 Pages
    Good Essays