1-20 of 344 Search Results for

security

Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Article
boundary 2 (2003) 30 (3): 19–27.
Published: 01 August 2003
...James Der Derian Duke University Press 2003 y 2 / 30:3 / sheet 23 of 252 6943 boundar Decoding The National Security Strategy of the United States of America...
Journal Article
boundary 2 (2015) 42 (1): 195–215.
Published: 01 February 2015
...Robert P. Marzec This essay situates the critical work of William V. Spanos in relation to the liminal event of anthropocentric planetary climate change—specifically the manner in which this event is being subordinated to military ends by the US national security state in particular and the global...
Journal Article
boundary 2 (2019) 46 (2): 199–207.
Published: 01 May 2019
... , 2011 . http://magazine.caijing.com.cn/2011-11-14/111405569.html . Jiao Jian . 2013 . “Zhongguo liangshi anquan baogao” [“China Grain Security Report”] . Caijing.com . December 8 , 2013 . http://magazine.caijing.com.cn/2013-12-08/113663148.html . Jikun Huang Ruifa Hu...
Journal Article
boundary 2 (2010) 37 (1): 215–238.
Published: 01 February 2010
... Vermeule's Terror in the Balance: Security, Liberty, and the Courts argues that far from it being the case that judicial oversight of government-imposed security measures should be heightened in states of emergency, on the contrary, it is precisely at such times that they should be given the broadest...
Journal Article
boundary 2 (2011) 38 (1): 135–163.
Published: 01 February 2011
... imperialist powers and the ruling native class. This struggle for the people's socioeconomic rights continues in the age of globalization, as Chinese workers' are increasingly deprived of their security and well-being. © 2011 by Duke University Press 2011 Unless otherwise noted, all translations are...
Journal Article
boundary 2 (2017) 44 (2): 241–256.
Published: 01 May 2017
...Richard Purcell In “Did the Digital Age Kill the Literary Star?” Richard Purcell looks back on Adam Bradley's Ralph Ellison in Progress: From “Invisible Man” to “Three Days before the Shooting” in light of Edward Snowden's revelations that the White House and the National Security Agency have been...
Journal Article
boundary 2 (2012) 39 (1): 55–67.
Published: 01 February 2012
... criminals and robbers executing a foreign agenda aimed at destabilizing the country, and augmented the existing security forces with unidentified agents whom the people of Kasserine called “snipers,” because they started shooting everywhere indiscriminately. Nineteen-year-old Slah Dachraoui, who was so...
Journal Article
boundary 2 (2012) 39 (1): 87–111.
Published: 01 February 2012
... full goodwill and generosity of mind. They spoke to one another a little about the past, but much more about the present, pondering the necessary factors for securing and protecting the agenda of the revolution, and of a new Tunisia, predicated on defending the rights of all its citizens. The...
Journal Article
boundary 2 (2012) 39 (2): 111–141.
Published: 01 May 2012
... formidable and awry range of local devotional traditions and deities, entailed a form of modernist transcoding that was tendentially monotheistic. It would seem that a singular Hindu national imagination could be secured only when such myriad energies–differing vastly in terms of caste, class, region, local...
Journal Article
boundary 2 (2017) 44 (3): 165–195.
Published: 01 August 2017
... standing seemed secure in their day yet have disappeared from view. © 2017 by Duke University Press 2017 modernism anthologies American poetry historicism References Allen Hervey Heyward DuBose . 1922 . Carolina Chansons: Legends of the Low Country . New York : Macmillan...
Journal Article
boundary 2 (2018) 45 (1): 231–252.
Published: 01 February 2018
... life. At the same time, feminists and sexual rights activists continue to campaign to secure reproductive rights for Irish women, while also contending with the paradoxes and contradictions of a late capitalist “liberated” and “postfeminist” sexual culture. This survey of scholarship on Irish sexual...
Journal Article
boundary 2 (2020) 47 (3): 169–175.
Published: 01 August 2020
...Rodrigo Fresán; Alejandra Campoy Fernández In this essay, the author offers a candid discussion of Sebald’s legacy and the flurry of criticism aimed at securing his place in the literary canon. It engages many of Sebald’s signature themes: memory, amnesia, silence, history, and trauma. The author...
Journal Article
boundary 2 (2010) 37 (2): 217–225.
Published: 01 May 2010
... infiltrated and hollowed out, as if the utopic energies of the 1960s were foreclosed at birth by the security apparatus of police forces, land development, and the global totality of capital as situated on the Pacific Rim. On the Pacific Edge of Catastrophe, or Redemption: California Dreaming in Thomas...
Journal Article
boundary 2 (2014) 41 (1): 153–170.
Published: 01 February 2014
... cultural results of synergy between the oil and gas trade and security services. This hyperextractive synergy creates an overmasculine, cynical, and misogynistic culture— petromachismo , as I prefer to call it. © 2014 by Duke University Press 2014 Unless otherwise noted, all translations are my...
Journal Article
boundary 2 (2008) 35 (3): 223–238.
Published: 01 August 2008
..., which imprisons both the young heroine, a novice spy, and the villain, a security police chief of the “puppet” regime. Their sentimental and romantic entanglement, not pronounced in the original Eileen Chang story, bears a distinct trait of Ang Lee's directorial style as an artistic articulation of this...
Journal Article
boundary 2 (2014) 41 (1): 229–231.
Published: 01 February 2014
... © 2014 by Duke University Press 2014 Books Received Amar, Paul. The Security Archipelago: Human-­Security States, Sexuality Politics, and the End of Neoliberalism. Durham, NC: Duke University Press, 2013. Anderson, Crystal S. Beyond the Chinese Connection: Contemporary Afro-Asian­...
Journal Article
boundary 2 (2008) 35 (2): 15–47.
Published: 01 May 2008
... reform of the employment system smashed the “iron bowl” of urban workers. Because rural communities and urban units were deprived of social functions and turned into purely economic institu- tions, farmers and workers were forced to get by with reduced entitlement to assistance and security...
Journal Article
boundary 2 (2005) 32 (3): 169–197.
Published: 01 August 2005
... wartime internal security mea- sures are always possible. But what is the relevance of this future possibility during periods in which domestic politics is seen as part of the war effort and when struggles by the state against domestic enemies are conducted on the model of warfare? Does the...
Journal Article
boundary 2 (2003) 30 (3): 1–18.
Published: 01 August 2003
... strategies through which the Bush administration effected a shift in the nation’s governing self-representations—from a secured innocent nation to a wounded, insecure emergency state. At the conclusion of these remarks, I shall also...
Journal Article
boundary 2 (2010) 37 (2): 89–105.
Published: 01 May 2010
... onto an external source. The movement explicitly linked economic policies to homeland security in con- structing the core issues in the new consensus. They produced an imagi- nary inclusion through the construction of an outside figure who personified some of the greatest threats to the national...