1-20 of 381 Search Results for


Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
×Close Modal
Sort by
Journal Article
Social Text (1 December 2010) 28 (4 (105)): 45–63.
Published: 01 December 2010
...Patricia Ticineto Clough; Craig Willse Drawing from theories of affect economies as well as discussion of biopolitical distributions of life and death, this essay explores the public mediation of gendered security and national security in terms of a political branding that circulates notions of...
Journal Article
Social Text (1 June 2012) 30 (2 (111)): 21–42.
Published: 01 June 2012
... economic, and the subjective. They also coordinate (at the level of conduct) projects of capitalist accumulation with efforts at regional security. This assemblage of industries and ethics, made in the name of control, is what this article understands as the soul of security. © 2012 Duke University Press...
Journal Article
Social Text (1 June 2013) 31 (2 (115)): 103–121.
Published: 01 June 2013
... order, and state authority to interrogate the twinned problematics of individuated self-interest as elucidated by neoliberal ideals of economic self-government and governmental capacity to secure public welfare and security in the wake of market-driven structural adjustment programs. With a focus on...
Journal Article
Social Text (1 June 2016) 34 (2 (127)): 21–44.
Published: 01 June 2016
... is no more, and capitalism, it would seem, is now to be thought without the dialectic. Indeed, the discourses of capitalism and postmodernism have mutated into discourses of the security state and technological innovation. “Postmodernism” was not, however, a panacea; rather, in a way analogous to the...
Journal Article
Social Text (1 March 2016) 34 (1 (126)): 75–96.
Published: 01 March 2016
... between European cosmopolitanism and the Greek archaic, marginalizes. I am interested in the ethnography of the every day that lacks the securities, facilities, and utilities of a homogenizing and synchronizing context. In the agonistic interplay between the macrological and the everyday, time and space...
Journal Article
Social Text (1 March 2011) 29 (1 (106)): 127–149.
Published: 01 March 2011
... formations. The caterpillar imagined in the memo reveals a logic of security that attempts to redistribute the affective violence of terrorism by producing fear in the detainee and targeted populations, while simultaneously confirming a racialized equation of torture and truth. The article situates this...
Journal Article
Social Text (1 June 2011) 29 (2 (107)): 1–19.
Published: 01 June 2011
... “overkill” as a way of apprehending a queer ontology that stands in contrast to the security of an LGBT identity. That the murdered were working class and largely people of color and/or trans/gender nonconforming marks this interpersonal violence as a restaging of larger iterations of necropolitical state...
Journal Article
Social Text (1 December 2012) 30 (4 (113)): 1–24.
Published: 01 December 2012
..., the CBS broadcast promoted two competing and incompatible narratives: one that traced a direct line from the innovations of mid-century corporate prosperity to middle-class domestic security and another that followed a black expressive line of flight as it moved across the Atlantic to the Caribbean...
Journal Article
Social Text (1 June 2013) 31 (2 (115)): 19–48.
Published: 01 June 2013
...Neferti X. M. Tadiar Recent scholarly works have described the perceived shift from liberalism to neoliberalism in terms of a shift in the logic of constitution of forms of personhood and governmentality from one constructed around rights and property to another constructed around risk and security...
Journal Article
Social Text (1 December 2013) 31 (4 (117)): 1–24.
Published: 01 December 2013
... postpublic sphere , overdetermined by opposition to transnational humanitarian intervention and by increasing tolerance of extrajudicial violence. I interrogate and relate two indexical episodes: (1) the practices and discourses of the Sri Lankan security apparatus, media, and feminists concerning the...
Journal Article
Social Text (1 June 2018) 36 (2 (135)): 107–122.
Published: 01 June 2018
... progressive form of the novel, the structure of heteronormative romance, and the security of inheritance and lineage withstand the ideological and epistemological demands of this post–World War II shift into multiple forms of value. Copyright © 2018 Duke University Press 2018 Asian diaspora...
Journal Article
Social Text (1 June 2009) 27 (2 (99)): 133–134.
Published: 01 June 2009
... Press 13 3 New York, 21 May 1939 My dear, faithful Wondrous Hippo Cow, here a few words of welcome — may you continue to live with the same contentment, the same security, and the same stubborn...
Journal Article
Social Text (1 March 2000) 18 (1 (62)): 135–141.
Published: 01 March 2000
... speculation ran to what the new configu- ration would look like; but little attention was paid to its history. What is the welfare we know? The Social Security Act of 1935, the 1944 GI Bill of Rights, the Interstate Highway Act of 1956, all of which have been enor...
Journal Article
Social Text (1 June 2003) 21 (2 (75)): np.
Published: 01 June 2003
... theology. Zia Mian is a physicist researching nuclear disarmament issues with the Program on Science and Global Security at the Woodrow Wilson School of Public and International Affairs at Princeton University. He is the edi- tor of several books: Out of the Nuclear Shadow (Lokayan, Rainbow, Zed...
Journal Article
Social Text (1 June 2005) 23 (2 (83)): 1–19.
Published: 01 June 2005
... amounts of surveillance work, commonly defi ned as the continual observation of an individual or group of people, and include nearly 1 million security guards, over a million jailers and local police, and tens of thousands of spies...
Journal Article
Social Text (1 March 2018) 36 (1 (134)): 65–71.
Published: 01 March 2018
... dictatorships sponsored and supported by the United States at the height of its liberalism. Brutal US-led counterinsurgency military and paramilitary campaigns conducted in the name of regional security during the Cold War were clearly extensions of the genocidal, tortuous, and mutilating wars that served as...
Journal Article
Social Text (1 June 2007) 25 (2 (91)): 13–22.
Published: 01 June 2007
... Homeland Security the new subjects (DHS). This new configuration, with its own cabinet-level office — hailed at its inception as the most significant government initiative since the cre- of history, those ation of the Defense Department — captures the entanglement of foreign...
Journal Article
Social Text (1 December 2003) 21 (4 (77)): 1–7.
Published: 01 December 2003
... world stage. The new object of the eternally displaced war on ter- ror, Saddam Hussein, returned farcically as threat to world security within a narrative seemingly borrowed from an anticorruption campaign whose key elements are...
Journal Article
Social Text (1 June 2005) 23 (2 (83)): 35–53.
Published: 01 June 2005
... surveillance-camera video capturing the face of suspected hijacker Mohamed Atta as he passed through an airport metal detector in Portland, ME. Even more chilling to many security experts is the fact that, had the right technology been in place, an image like that might have helped avert...
Journal Article
Social Text (1 December 2010) 28 (4 (105)): 25–44.
Published: 01 December 2010
... policies to detect violent impulses in their students before they become manifest. The tacit assumption behind these directives is that the university’s counseling center, security team, administrators, and faculty can work together to predict violent behavior and intervene before violent...