1-20 of 809 Search Results for

security

Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Image
Published: 01 March 2022
Figure 2 The security AI *Mute in Analogue: A Hate Story . Screenshot by the author, 2020 More
Image
Published: 01 March 2022
Figure 4 A flowchart of operations at US airport security checkpoints from the US Customs and Border Protection website: https://www.cbp.gov/frontline/frontline-preclearance . Screenshot taken by author More
Journal Article
American Literature (2014) 86 (1): 194–197.
Published: 01 March 2014
...Daniel Grausam The Covert Sphere: Secrecy, Fiction, and the National Security State . By Melley Timothy . Ithaca, NY : Cornell Univ. Press , 2012 . x , 289 pp. Cloth , $75.00 ; paper , $26.95 . No Accident, Comrade: Chance and Design in Cold War American Narratives...
Journal Article
American Literature (2014) 86 (3): 619–621.
Published: 01 September 2014
...William J. Maxwell Liberalism and the Culture of Security: The Nineteenth-Century Rhetoric of Reform . By Henry Katherine . Tuscaloosa : Univ. of Alabama Press . 2011 . xiv , 213 pp. Cloth , $36.50 ; e-book , $36.50 . Downwardly Mobile: The Changing Fortunes of American...
Journal Article
American Literature (2020) 92 (4): 820–824.
Published: 01 December 2020
...Aarthi Vadde Enumerations: Data and Literary Study . By Andrew Piper . Chicago : Univ. of Chicago Press . 2018 . xiii, 243. Cloth, $90.00 ; paper, $27.50 ; e-book available. Passwords: Philology, Security, Authentication . By Brian Lennon . Cambridge, MA : Harvard...
Journal Article
American Literature (2007) 79 (3): 605–607.
Published: 01 September 2007
...Duncan Faherty Duke University Press 2007 Securing the Commonwealth: Debt, Speculation, and Writing in the Making of Early America . By Jennifer J. Baker. Baltimore: Johns Hopkins Univ. Press. 2005. x, 218 pp. $50.00. The Backcountry and the City: Colonization and Conflict...
Journal Article
American Literature (2014) 86 (1): 61–86.
Published: 01 March 2014
... absorbed into a new, federally configured social order that promises but ultimately fails to deliver security. When Bigger kills Mary Dalton in her bed and then uses her dead body to heat her parents’ home, he makes a mockery of the very idea of domestic security. Through his recourse to physical violence...
Journal Article
American Literature (2016) 88 (1): 159–184.
Published: 01 March 2016
...Lindsay Thomas This essay examines two kinds of speculative fiction focused on the management of climate change: preparedness documents on climate change as a threat to national security, and Kim Stanley Robinson's Mars trilogy (1993–96), a science fiction trilogy about the terraformation...
Journal Article
American Literature (2014) 86 (1): 87–115.
Published: 01 March 2014
... that Brown uses signifying ethnography to craft a radical counterhistory: as he dismantles glorified depictions of the South, Brown locates alternative geographies of dissent in which to secure modern black political identities. © 2014 by Duke University Press 2014 References Anderson David R...
Journal Article
American Literature (2020) 92 (4): 697–706.
Published: 01 December 2020
... of marginalized, historically disenfranchised populations to secure supply chains and ensure access to basic goods, foodstuffs, and medicines for those sheltering at home. Structuring its claims within the critical race theories of Saidiya V. Hartman, Achille Mbembe, and Elizabeth Maddock Dillon, it draws...
Journal Article
American Literature (2022) 94 (1): 181–209.
Published: 01 March 2022
...Figure 4 A flowchart of operations at US airport security checkpoints from the US Customs and Border Protection website: https://www.cbp.gov/frontline/frontline-preclearance . Screenshot taken by author ...
FIGURES | View All (6)
Journal Article
American Literature (2008) 80 (4): 769–797.
Published: 01 December 2008
... shaped a dominant practice of reading that had a regulative effect, narrowing what counted as acceptable antiracism. Melamed reads Chester Himes's End of a Primitive as a novel where we see satire deliberately misfired in an attempt to dehegemonize racial liberal meanings secured through the discourse...
Journal Article
American Literature (2013) 85 (2): 217–246.
Published: 01 June 2013
... and of conflict itself—that is, conflict as an aesthetic device within narrative as well as the thing being narrated, the manifestation of force between actors aboard the slave ship. Because the enforcement of US law and security by 1850 tended toward something supra-territorial if not transnational in scope...
Journal Article
American Literature (2009) 81 (2): 253–279.
Published: 01 June 2009
... ambivalence about the plenitudes secured by materialist thinking. © 2009 by Duke University Press 2009 Mark Whitman’s Atom and the Crisis of Materiality Noble in the Early Leaves of Grass When Justus von Liebig’s Organic Chemistry in Its Application...
Journal Article
American Literature (2010) 82 (3): 553–581.
Published: 01 September 2010
... the sometimes monolithic focus on modernist or experimental writing in assessments of the postwar moment as an antiwar watershed. Vincent emphasizes war narrative's continuities with prior Progressive-Era longings for compulsory civic foundations as well as the bourgeoning culture of national security...
Journal Article
American Literature (2020) 92 (1): 159–161.
Published: 01 March 2020
...Lindsay Thomas One of the book’s strengths is this advocacy for a more expansive understanding of security and insecurity. Voelz emphasizes that fear is not the only affect insecurity produces, showing in each chapter how “security and insecurity are multifaceted in ways that go far beyond...
Journal Article
American Literature (2015) 87 (1): 79–105.
Published: 01 March 2015
... video, 1:00:37. From an interview streamed by Google on February 27. Posted March 4 . www.youtube.com/watch?v=pBDARw5fdrg . NARA (National Archives and Records Administration) . 1947 . National Security Act of 1947. Pub. L. No. 80–253, 61 Stat. 495 . ———. 1949 . National Security Act...
Journal Article
American Literature (2017) 89 (1): 155–184.
Published: 01 March 2017
... as much control over their data profiles as they do over financial markets. Sure, we can post only the most prudent pics under the most restrictive security settings or pick only the most prudent investments, but ultimately, the algorithms and systems that govern both are largely opaque (see Pasqual 2015...
Journal Article
American Literature (2019) 91 (2): 435–437.
Published: 01 June 2019
... ). In complementary ways, then, these texts illustrate the evolution of modern governmentality that, as Michel Foucault describes in Security, Territory, Population (2004), transformed from exercising power over individual subjects to counting, documenting, assessing, and governing an entire population...
Journal Article
American Literature (2019) 91 (2): 385–416.
Published: 01 June 2019
... things as the redistribution of matter rather than the imposition of form on matter. By redefining making , Heizer’s and Smithson’s earthworks first invoke the premodernist problematic of the artifact and then overwrite one of its most basic tenets. In Aristotelian technics, form secures the artifact’s...
FIGURES