Skip Nav Destination
Close Modal
Search Results for
privacy
Update search
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Subjects
Journal
Article Type
Date
Availability
1-20 of 44 Search Results for
privacy
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
1
Sort by
Journal Article
boundary 2 (2002) 29 (1): 177–222.
Published: 01 February 2002
...Sundeep Bisla Duke University Press 2002 The Return of the Author: Privacy, Publication,
the Mystery Novel, and The Moonstone
Sundeep Bisla
1
What might it mean to me for you to be reading these words? This
mystery...
Journal Article
boundary 2 (2004) 31 (3): 101–124.
Published: 01 August 2004
...Laikwan Pang Duke University Press 2004 Piracy/Privacy: The Despair of Cinema and Collectivity in China
Laikwan Pang
China’s ‘‘barbarous’’ copyright offenses are generally considered one
of the manifestations...
Journal Article
boundary 2 (2020) 47 (4): 199–212.
Published: 01 November 2020
... on strong leaders, but not essentially anti-Semitic, sits uncomfortably with his more personal horror at the Nazi invasion of individual privacy. Defiant analysis yields to tragedy as the memoir goes on to represent individual capitulations to Nazi tactics, including Haffner’s own. Reflecting our current...
Journal Article
boundary 2 (2000) 27 (2): 83–111.
Published: 01 May 2000
... of the private to the public life.
This was so for early Republican leaders, who felt that public duty super-
seded inclinations toward the private life, as well as for those whose socio-
geographical circumstances lent privacy...
Journal Article
boundary 2 (2024) 51 (2): 5–18.
Published: 01 May 2024
... issues and orientations is at best opaque. While words like privacy and rights and free and freedom occur repeatedly in the names these issues are given, it is frequently less than clear exactly how we are to line them up against other non-digital or pre-digital uses of these terms. When...
Journal Article
boundary 2 (2017) 44 (4): 95–112.
Published: 01 November 2017
... . https://www.monticello.org/site/jefferson/tyranny-defined-which-legal-government-quotation . Bertrand Natasha . 2015 . “‘American WikiLeaks Hacker’ Reveals an Astonishing Contradiction about Who Has a Right to Privacy.” Business Insider , May 1 . http://www.businessinsider.com/jacob...
Journal Article
boundary 2 (2007) 34 (1): 25–33.
Published: 01 February 2007
... to
be public; it wants to erase the very possibility of privacy. Reducing us to our
material common denominator, it wants us to be conscious of our relation
to the sewer. Kundera, on the other hand, defends privacy and freedom.
Yet his explanation of how love happens takes precisely...
Journal Article
boundary 2 (2000) 27 (2): 217–218.
Published: 01 May 2000
... A Poetics of American Privacy: Edgar Allan Poe and Wallace Stevens
(1923).
Tseng 2000.5.26 09:03 OCV:1 ...
Journal Article
boundary 2 (2006) 33 (3): 227–228.
Published: 01 August 2006
... Thinking. Durham, N.C.: Duke University
Press, 2006.
Paras, Eric. Foucault 2.0: Beyond Power and Knowledge. New York: Other Press,
2006.
Reed, Brian M. Hart Crane: After His Lights. Modern and Contemporary Poetics.
Tuscaloosa: University of Alabama Press, 2006.
Shamir, Milette. Inexpressible Privacy...
Journal Article
boundary 2 (2019) 46 (1): 133–156.
Published: 01 February 2019
... of Digital Humanities .” Los Angeles Review of Books , May 1 , 2016 . https://lareviewofbooks.org/article/neoliberal-tools-archives-political-history-digital-humanities/ . Angwin Julia . 2014 . Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance...
Journal Article
boundary 2 (2002) 29 (3): 253–256.
Published: 01 August 2002
....
Nelson, Deborah. Pursuing Privacy in Cold War America. New York: Columbia Uni-
versity Press, 2002.
Preece, Julian. The Cambridge Companion to Kafka. New York: Cambridge Univer-
sity Press, 2002...
Journal Article
boundary 2 (2009) 36 (2): 31–54.
Published: 01 May 2009
... individuality and complexity in a noisy and dis-
tracting mass culture, the question of how to be alone.” The essay “Imperial
Bedroom”—on privacy—reflects your abiding concern with existential lone-
liness, that fundamental fact of life that provides so much material for novel
writing. It makes the point...
Journal Article
boundary 2 (2011) 38 (1): 203–229.
Published: 01 February 2011
..., negotiate
their rights and duties with one another, and thus readjust interpersonal
relations among themselves. In everyday life, the rise of the individual is
best reflected in the legitimization of desires for intimacy, privacy, freedom,
and material comforts as well as in the actual...
Journal Article
boundary 2 (2017) 44 (1): 125–147.
Published: 01 February 2017
... . Stanford, CA : Stanford University Press . ———. 2004 . The Open: Man and Animal . Translated by Attell Kevin . Stanford, CA : Stanford University Press . Agre Philip E. 2003 . “Surveillance and Capture: Two Models of Privacy.” In The New Media Reader , edited by Wardrip-Fruin...
Journal Article
boundary 2 (2019) 46 (1): 73–101.
Published: 01 February 2019
... . Pasquale Frank . 2010b . “ Reputation Regulation: Disclosure and the Challenge of Clandestinely Commensurating Computing .” In The Offensive Internet: Privacy, Speech, and Reputation , edited by Levmore Saul Nussbaum Martha C. , 107 – 23 . Cambridge, MA : Harvard University Press...
Journal Article
boundary 2 (2021) 48 (1): 109–137.
Published: 01 February 2021
... York : Knopf . Sofsky Wolfgang . 2009 . Verteidigung des Privaten [In Defense of Privacy] . Munich : Verlag C. H. Beck . Uslu Ates¸ . 2017 . Siyasal Düs¸ünceler Tarihine Giris¸ [Introduction to the History of Political Thought] . Istanbul : Tarih Vakfı Yurt Yayınları...
Journal Article
boundary 2 (2003) 30 (1): 105–130.
Published: 01 February 2003
... of the true state of affairs—the
compartment’s insecure mastery of privacy, its actually mobile and insecure
place within a public and technological system—is conveyed optically. The
truly uncanny moment comes—as anyone who...
Journal Article
boundary 2 (2008) 35 (1): 35–65.
Published: 01 February 2008
... is inevitably a public occurrence, even in the con-
cert hall Opus 131 is a work of monumental privacy. It explores an interior
House, 1974], 347), when he points to “a strange, tempting, dangerous ideal to which we
should not wish to persuade anybody because we do not readily concede the right...
Journal Article
boundary 2 (2023) 50 (4): 227–236.
Published: 01 November 2023
... noise of the TVs, the simultaneous conversations between prisoners and guards, the uproar of sporadic fights, the crying, yelling; everything that happened in one cell could be heard from the others. The lack of silence was the clearest indicator of the absence of privacy, which was also called...
Journal Article
boundary 2 (2015) 42 (1): 19–41.
Published: 01 February 2015
... in the
larger opposition of civilization and barbarism. The social was already the
personal, and his private sense of inadequacy manifested itself as subjec-
tive deficiency. Adorno describes a similar feeling in Minima Moralia when
he suggests that privacy—or individual autonomy—has become a trap...
1