1-20 of 192 Search Results for

security

Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Article
differences (1 May 2014) 25 (1): 132–155.
Published: 01 May 2014
... humanities, understood as what the author calls, adapting a phrase from David Golumbia, a culture of computation—and grasped in its emergence after 2001, alongside a surge of u.s. national security legislation and institution-building. I thank Rita Raley and Ellen Rooney for their invitation to contribute...
Journal Article
differences (1 December 2013) 24 (3): 127–159.
Published: 01 December 2013
.... In contrast to approaches that equate the humanities with the institutional security of particular departments and disciplines (especially English), this article contends that we might better understand the humanities as an array of experimental practices that cross disciplinary and institutional...
Journal Article
differences (1 December 2009) 20 (2-3): 194–223.
Published: 01 December 2009
... to prostitution to trafficking in migrant laborers. The article posits a model of salability, based on disposable life and recycled humanity, where entry into the market as either subject or object is the condition of survival in the modern security regime. Against a terrain of precariously asserted...
Journal Article
differences (1 May 2015) 26 (1): 141–167.
Published: 01 May 2015
... black women’s sexuality in state narratives of black freedom and black freedom-to-secure against the backdrop of the racial makeovers of the late twentieth century, and at the same time turning to black women’s expressive culture as a site that both reflects and troubles those racial makeovers, this...
Journal Article
differences (1 May 2011) 22 (1): 64–89.
Published: 01 May 2011
..., the question of the rights of undocumented migrants in Turkey presents a major paradox. On the one hand, the undocumented migrants' lack of right to residence, work, and social security intensifies their vulnerability in the flexible, predominantly informal labor market. On the other hand, rights...
Journal Article
differences (1 December 2014) 25 (3): 144–146.
Published: 01 December 2014
... Digital Humanities and National Security .” 25.1 : 132 – 55 . McPherson Tara . “ Designing for Difference .” 25.1 : 177 – 88 . Mendicino Kristina . “ Yes—Yet—Hegel’s Oracle .” 25.3 : 14 – 58 . Morgenstern Naomi . “ Postapocalyptic Responsibility: Patriarchy at the End of...
Journal Article
differences (1 December 2009) 20 (2-3): 250–278.
Published: 01 December 2009
.... Remarks. “ National Security: What New Expertise Is Needed? ” Session. National Defense Education Act Fiftieth Anniversary Conference. Sponsored by the Association of American Universities. Washington, dc, 14 Apr. 2008 . http://www.defenselink.mil/speeches/speech.aspx?speechid=1228 . ———. Remarks...
Journal Article
differences (1 December 2002) 13 (3): 1–23.
Published: 01 December 2002
... Women in Black Vigils. Contact Information.Coalition of Women for Peace. 25 Apr. 2002.< http://www.coalitionofwomen4peace.org/ >. Young, Iris. “ Masculinist Protection and Feminist Citizenship: A Critique of the Security Regime .” Presented at the Conference on Women and Citizenship. Washington...
Journal Article
differences (1 May 2015) 26 (1): 168–187.
Published: 01 May 2015
... of her cultural traditions, which narratives like Tjipel exemplified. If Linda was to secure communal title over her “traditional country” she would have to be able to tell government officials that places like Tjipel was a Dreaming totem for her family. Moreover, she was told, the nation wanted her...
Journal Article
differences (1 May 2002) 13 (1): 14–44.
Published: 01 May 2002
... needs to be organized in the service of reproductive relations and that marriage, which gives the legal status to the family form or, rather, is conceived as that which should secure the institution through conferring that legal status, should...
Journal Article
differences (1 May 2006) 17 (1): 88–115.
Published: 01 May 2006
... framework outlined by Jürgen Habermas seems to be the most secure foundation for feminist critique; this despite Habermas’s own failure to thematize gender in his work on the public sphere, power, sub- jectivity, linguistic action, and...
Journal Article
differences (1 December 2007) 18 (3): 81–96.
Published: 01 December 2007
... from others during those years. The question of who will offer this care and how they will do so is a pressing ethical problem for any political community. Social arrangements that offer secure, stimulating, and...
Journal Article
differences (1 September 2015) 26 (2): 1–28.
Published: 01 September 2015
... loiter.” We need to fight for the right to take risks—to be in public—and not be attacked. We need to counter the corporate security of Web 2.0, which is in fact no security, by building new forms of interaction that cannot “leak” because they do not seek to create imaginary bubbles of privacy between...
Journal Article
differences (1 September 2004) 15 (2): 91–117.
Published: 01 September 2004
... parents: of the 82,880 noncitizens from twenty-fi ve listed countries who had registered with the Department of Homeland Security by the end of September 2003, more than 13,000, many of them parents, face the possibility of deportation...
Journal Article
differences (1 December 2002) 13 (3): 64–82.
Published: 01 December 2002
... secures the psyche, which he says is enclosed in its own world until it is thrown into a social world by its caregiver (usually the mother). What matters is not the historical form of the patriarchal family, but the triangulated...
Journal Article
differences (1 September 2006) 17 (2): 113–131.
Published: 01 September 2006
.... For MacKinnon, thought is not a component of consuming por- nography. Her logic of a predictable, secure, uniform experience of and response to pornography on the part of the viewer leads her to character- ize all consumers of...
Journal Article
differences (1 December 2005) 16 (3): 102–113.
Published: 01 December 2005
..., yields a secure indication of some condition, but it is the latter [the condition] that determines the occurrence. (307) (We should note that occurrence here is Begebenheit, with the connota...
Journal Article
differences (1 December 2004) 15 (3): 95–122.
Published: 01 December 2004
..., taking seriously Freud’s suggestion that the skin is “the erotogenic zone par excellence.” Anzieu asserts that “[S]exuality is accessible only to those who have acquired a minimum sense of basic security within their own...
Journal Article
differences (1 May 2014) 25 (1): 79–92.
Published: 01 May 2014
... digital humanities work myself. Works Cited American Academy of Arts and Sciences . The Heart of the Matter: The Humanities and Social Sciences for a Vibrant, Competitive and Secure Nation . Cambridge : American Academy of Arts and Science , 2013 . Davidson Cathy (CathyNDavidson) . “ Could...
Journal Article
differences (1 September 2014) 25 (2): 1–32.
Published: 01 September 2014
...: Lectures at the Collège de France, 1973-1974 . Trans. Burchell Graham . New York : Palgrave MacMillan , 2006 . ———. Remarks on Marx: Conversations with Duccio Trombadori . Trans. Goldstein R. James Casciato James . New York : Semiotext(e) , 1991 . ———. Security, Territory...