Bellomi Dissertation Formatted

Total Page:16

File Type:pdf, Size:1020Kb

Bellomi Dissertation Formatted UNIVERSITY OF CALIFORNIA Santa Barbara Darker and Darker Still: Media-Technology, Darkness Narratives, and Fear A Dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Comparative Literature by Jeffrey J. Bellomi Committee in charge: Professor Rita Raley, Chair Professor Colin Gardner Professor Wolf Kittler Professor Greg Siegel December 2019 The dissertation of Jeffrey J. Bellomi is approved. ________________________________________ Professor Colin Gardner ________________________________________ Professor Wolf Kittler ________________________________________ Professor Greg Siegel ________________________________________ Professor Rita Raley, Committee Chair October 2019 Darker and Darker Still: Media-Technology, Darkness Narratives, and Fear Copyright © 2019 by Jeffrey J. Bellomi iii ACKNOWLEDGEMENTS The long journey towards the completion of this dissertation could never have been completed without the unflagging support of my professional colleagues, mentors, friends, and family members, all for whom I am deeply grateful. Through the brilliant advising and support of my chair, Dr. Rita Raley, as well as that of the other members of my committee— Dr. Colin Gardner, Dr. Wolf Kittler, and Dr. Greg Siegel—this project reshaped itself and evolved beyond my earliest expectations into something of which I am truly proud. I dedicate this also to Dr. Catherine Nesci, whose professional and moral support served as a buoy amongst the shifting tides of research and writing. To my close friends and colleagues, Lacey Smith and Rachel Feldman: thank you for reminding me to laugh and stay grounded, as you both gave me a sense of home even when living far from it. To that end, none of my academic work could have existed without the efforts and sacrifices of my mother and aunt. Whenever I felt overwhelmed, you were there to remind me why this has been my dream, and I hope that in this work you can see the fruits of your support fully formed. Finally, to my father: I wish more than anything that you were still here to see this day, but know that I saw it through just as you had hoped. iv VITA OF JEFFREY J. BELLOMI December 2019 EDUCATION Bachelor of Arts in Modern Literary Studies, University of California, Santa Cruz, June 2009 Master of Arts in Comparative Literature, University of Colorado, Boulder, May 2013 Doctor of Philosophy in Comparative Literature, University of California, Santa Barbara, December 2019 (expected) PROFESSIONAL EMPLOYMENT 2011-2013: Teaching Assistant, Department of Germanic and Slavic, University of Colorado, Boulder 2013-2019: Teaching Assistant, Comparative Literature Program & Writing Program, University of California, Santa Barbara. 2014-2019: Teaching Associate, Comparative Literature Program, University of California, Santa Barbara. AWARDS Graduate Humanities Research (HUMRA) Fellowship, Graduate Division, University of California, Santa Barbara, 2017-2018 Outstanding Teaching Associate, Comparative Literature, University of California, Santa Barbara, 2015 Outstanding Teaching Assistant, Comparative Literature, University of California, Santa Barbara, 2014 & 2018 FIELDS OF STUDY Major Field: Media Studies with Professors Rita Raley, Wolf Kittler, and Greg Siegel Studies in Critical Theory with Professor Colin Gardner Studies in French and Francophone Literature with Professors Catherine Nesci and Ruth Mas Studies in German Literature with Professors Elizabeth Weber and Patrick Greaney v ABSTRACT Darker and Darker Still: Media-Technology, Darkness Narratives, and Fear by Jeffrey J. Bellomi This dissertation examines the relationship between select media-technological phenomena and historically configured narratives concerning darkness. Approaching said narratives through the work of Hans Blumenberg’s “metaphorology”, Friedrich Nietzsche’s conceptual paradigm, and Frederic Jameson’s concept of the “master narrative”, this project argues that darkness metaphors function as irreducible and fundamental blocks of meaning from which more complex narratives are built. This is informed principally by Blumenberg’s concept of the “absolute metaphor”, those being metaphors which serve to explain phenomena that evade empirical or logical deduction, such as evil, supernatural or metaphysical entities, and invisible threats, amongst others. From this, I argue that contemporary deployments of such darkness metaphors or their more complex narrative permutations link back to their nascent forms, thus imbuing their use with a trace of their early explanatory force. I examine four case studies in which darkness metaphors and narratives are used to describe or articulate different media-technological phenomena, namely the Dark Web, light pollution maps, numbers stations, and hypothetical nuclear EMP strikes. After identifying the operating darkness narrative for each, I offer historical and literary lineages in an attempt to locate the root source of these narratives, all in the service of vi attempting to explain the particular sense of fear or anxiety associated with each of these case studies. In doing so, I identify unproductive or dangerous relationships with said media- technology that draw from the taproot of these darkness narratives, and then offer potential strategies to reevaluate and reconfigure these relationships into a more productive form. vii TABLE OF CONTENTS Introduction: Living in Shadow................................................................................................1 Chapter 1–Into the Abyss: The Narrative Construction of a “Dark Web”............................ 30 Chapter 2–Unseen Spaces: Light Maps and Cartographic Narrativity.................................122 Chapter 3–Turned On, Tuned In, Locked Out: Numbers Stations and Ominous Rejection 173 Chapter 4–Death by Disconnection: EMP Attacks and Existential Terror...........................213 Conclusion: Living Shadows................................................................................................286 viii Introduction: Living in Shadow Even absolute metaphors therefore have a history. They have a history in a more radical sense than concepts, for the historical transformation of a metaphor brings to light the metakinetics of the historical horizons of meaning and ways of seeing within which concepts undergo their modifications.1 -Hans Blumenberg On December 4, 2017, around 9:00 PM, I lost all power in my apartment. There was little to distinguish it from any other short-lasting power outage that one experiences from time to time, and I could only chuckle inwardly at the moment, having recently solidified my plans to write my dissertation, this dissertation, on technology and darkness. I decided to reach out to a colleague who lived closer to the UC Santa Barbara campus and ask if she too had lost power, only to find that I had no cell phone service at all, the first sign of the situation’s exigency. I walked outside and was struck by precisely how dark it was, realizing in that moment that I could not remember the last time I had experienced a darkness so consuming and total. Making my way to the closest street intersection, I could faintly make out that this was not a localized fault of my apartment complex’s electrical system: streetlights, traffic lights; all was pitch black, and I still lacked the means to reach out to anyone via phone call or internet. And so, I got into my car and headed to my colleague’s apartment, at first to check in on whether or not she too was experiencing the same thing. It was as I noticed the lack of illumination on the freeway, something I had never seen occur in a blackout, that I too noticed a gnawing dread in my chest. I realized that I was no longer 1 Blumenberg, Hans. Paradigms for a Metaphorology. Ithaca: Cornell University Press, 2010. 5. 1 going to my colleague’s to simply ask if she had power, but was doing so because I distinctly did not want to be alone. I knew that this feeling was misplaced. I, as an adult, had no reason to be afraid of the dark: I slept in the dark, I mulled over work in the dark, I pulled the covers over my head on especially early mornings to keep myself in the dark for just a bit longer. As I arrived at my destination, only my headlights illuminating the route, I realized that I do not quite like darkness when I have no guarantee that it will cease on command, save the rising of the sun. My colleague and I exchanged pleasantries, and curiosity got the better of me, prompting me to drive southward as far as I could go before seeing a region with power. I did not find that point before turning around and heading back home, but on the way, I decided in a last-ditch effort to get a bird’s eye view, driving up the Santa Barbara mountains as a means to peer out over the landscape. I could see a single area holding the line, a small group of streetlights illuminating a tiny stretch of a residential road in the distance. Everything else was as dark as the ocean that meets the city’s shoreline. Something was very wrong. For myself, and the residents of the Santa Barbara area, this was the first sign of the Thomas Fire, a devasting wildfire that consumed hundreds of thousands of acres, in turn becoming the largest fire in California’s modern era. It started as the result of a power line fault in a plant run by Southern California Edison, the principle reason for the trenchant and widespread blackout that engulfed the surrounding areas.2 It is not altogether that common for a power outage to also effect cellular
Recommended publications
  • Arxiv:1907.07120V1 [Cs.CY] 16 Jul 2019 1 Introduction That China Hindered Access to I2P by Poisoning DNS Resolu- Tions of the I2P Homepage and Three Reseed Servers
    Measuring I2P Censorship at a Global Scale Nguyen Phong Hoang Sadie Doreen Michalis Polychronakis Stony Brook University The Invisible Internet Project Stony Brook University Abstract required flexibility for conducting fine-grained measurements on demand. We demonstrate these benefits by conducting an The prevalence of Internet censorship has prompted the in-depth investigation of the extent to which the I2P (invis- creation of several measurement platforms for monitoring ible Internet project) anonymity network is blocked across filtering activities. An important challenge faced by these different countries. platforms revolves around the trade-off between depth of mea- Due to the prevalence of Internet censorship and online surement and breadth of coverage. In this paper, we present surveillance in recent years [7, 34, 62], many pro-privacy and an opportunistic censorship measurement infrastructure built censorship circumvention tools, such as proxy servers, virtual on top of a network of distributed VPN servers run by vol- private networks (VPN), and anonymity networks have been unteers, which we used to measure the extent to which the developed. Among these tools, Tor [23] (based on onion rout- I2P anonymity network is blocked around the world. This ing [39,71]) and I2P [85] (based on garlic routing [24,25,33]) infrastructure provides us with not only numerous and ge- are widely used by privacy-conscious and censored users, as ographically diverse vantage points, but also the ability to they provide a higher level of privacy and anonymity [42]. conduct in-depth measurements across all levels of the net- In response, censors often hinder access to these services work stack.
    [Show full text]
  • University of Dundee the Origins of the Jimmy Savile Scandal Smith, Mark
    University of Dundee The origins of the Jimmy Savile scandal Smith, Mark; Burnett, Ros Published in: International Journal of Sociology and Social Policy DOI: 10.1108/IJSSP-03-2017-0029 Publication date: 2018 Document Version Peer reviewed version Link to publication in Discovery Research Portal Citation for published version (APA): Smith, M., & Burnett, R. (2018). The origins of the Jimmy Savile scandal. International Journal of Sociology and Social Policy, 38(1/2), 26-40. https://doi.org/10.1108/IJSSP-03-2017-0029 General rights Copyright and moral rights for the publications made accessible in Discovery Research Portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from Discovery Research Portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain. • You may freely distribute the URL identifying the publication in the public portal. Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Download date: 25. Sep. 2021 The origins of the Jimmy Savile Scandal Dr Mark Smith, University of Edinburgh (Professor of Social Work, University of Dundee from September 2017) Dr Ros Burnett, University of Oxford Abstract Purpose The purpose of this paper is to explore the origins of the Jimmy Savile Scandal in which the former BBC entertainer was accused of a series of sexual offences after his death in 2011.
    [Show full text]
  • Hacking the Web
    Hacking the Web (C) 2009-2020 Arun Viswanathan Ellis Horowitz Marco Papa 1 Table of Contents } General Introduction } Authentication Attacks } Client-Side Attacks } Injection Attacks } Recent Attacks } Privacy Tools 2 (C) 2009-2020 Arun Viswanathan Ellis Horowitz Marco Papa Why secure the Web? } The Web has evolved into an ubiquitous entity providing a rich and common platform for connecting people and doing business. } BUT, the Web also offers a cheap, effective, convenient and anonymous platform for crime. } To get an idea, the Web has been used for the following types of criminal activities (source: The Web Hacking Incidents Database (WHID) http://projects.webappsec.org/w/page/13246995/Web-Hacking-Incident-Database) } Chaos (Attack on Russian nuclear power websites amid accident rumors (5Jan09) } Deceit (SAMY XSS Worm – Nov 2005) } Extortion (David Aireys domain hijacked due to a CSRF (cross site request forgery) flaw in Gmail – 30Dec2007) } Identity Theft (XSS on Yahoo! Hot jobs – Oct 2008) } Information Warfare (Israeli Gaza War - Jan 2009 / Balkan Wars – Apr 2008 ) } Monetary Loss (eBay fraud using XSS) } Physical Pain (Hackers post on epilepsy forum causes migraines and seizures – May 2008) } Political Defacements (Hacker changes news release on Sheriffs website – Jul 2008) (Obama, Oreilly and Britneys Twitter accounts hacked and malicious comments posted – Jan 09) } Chinese Gaming sites hacked (Dec. 2011) 3 Copyright(C) 2009 (c) -20092020- 2019Arun Arun Viswanathan Viswanathan Ellis HorowitzEllis Horowitz Marco Marco Papa Papa
    [Show full text]
  • Cybercrime: Internet Driven Illicit Activities and Behavior
    Land Forces Academy Review Vol. XXV, No. 4(100), 2020 CYBERCRIME: INTERNET DRIVEN ILLICIT ACTIVITIES AND BEHAVIOR Maurice DAWSON Illinois Institute of Technology, Chicago, United States of America [email protected] ABSTRACT Cybercrime affects multiple areas of society with nefarious activities ranging from human trafficking to illegal arms sale. The Internet has allowed some nefarious activities to be revived as others have emerged in this new age. In turn, this has become a national security issue for countries as this requires resources to combat this evolving threat. These activities include undermining legitimate services that provide government services to its citizens, such as passport, national identification, tax services, and more. This paper introduces some of these activities, enabling readers to understand this digital criminal world further. KEYWORDS: cybercrime, human trafficking, dark web, online marketplace, cryptocurrency, disinformation 1. Introduction name a few (Deibert, 2009). Meanwhile, The Internet has allowed for many more countries have been known to use the technological advances that have brought Internet to target political dissidents such as forth positive outcomes. In retrospect, the Cuba, Ethiopia, Eritrea, Gambia, Morocco, Internet has also allowed for criminal North Korea, Russia, and more (Committee activities to flourish. And while both to Protect Journalists, 2020). Even with this positive and negative effects are expected, mentioned censorship and oversight, illicit the use of the Internet by a criminal activities remain on the rise through the organization, nation-states, terrorists, Internet. extremists, and others finds another means In recent years, police and other law to market their illegal activity. As the enforcement organizations have shut down introduction of the technological pages that advocate prostitution.
    [Show full text]
  • Organisational Sex Offenders and 'Institutional Grooming': Lessons from the Savile and Other Inquiries
    Organisational Sex Offenders and 'Institutional Grooming': Lessons from the Savile and Other Inquiries McAlinden, A-M. (2018). Organisational Sex Offenders and 'Institutional Grooming': Lessons from the Savile and Other Inquiries. In M. Erooga (Ed.), Protecting Children and Adults from Abuse After Savile: What Organizations and Institutions Need to do London: Jessica Kingsley Publishers. Published in: Protecting Children and Adults from Abuse After Savile: What Organizations and Institutions Need to do Document Version: Peer reviewed version Queen's University Belfast - Research Portal: Link to publication record in Queen's University Belfast Research Portal Publisher rights © 2018 Jessica Kingsley Publishing.This work is made available online in accordance with the publisher’s policies. Please refer to any applicable terms of use of the publisher. General rights Copyright for the publications made accessible via the Queen's University Belfast Research Portal is retained by the author(s) and / or other copyright owners and it is a condition of accessing these publications that users recognise and abide by the legal requirements associated with these rights. Take down policy The Research Portal is Queen's institutional repository that provides access to Queen's research output. Every effort has been made to ensure that content in the Research Portal does not infringe any person's rights, or applicable UK laws. If you discover content in the Research Portal that you believe breaches copyright or violates any law, please contact [email protected]. Download date:28. Sep. 2021 FINAL AUTHOR VERSION: McAlinden, A.-M. (2018), ‘Organisational Sex Offenders and “Institutional Grooming’: Lessons from the Savile and Other Inquiries’, in M.
    [Show full text]
  • An Evolving Threat the Deep Web
    8 An Evolving Threat The Deep Web Learning Objectives distribute 1. Explain the differences between the deep web and darknets.or 2. Understand how the darknets are accessed. 3. Discuss the hidden wiki and how it is useful to criminals. 4. Understand the anonymity offered by the deep web. 5. Discuss the legal issues associated withpost, use of the deep web and the darknets. The action aimed to stop the sale, distribution and promotion of illegal and harmful items, including weapons and drugs, which were being sold on online ‘dark’ marketplaces. Operation Onymous, coordinated by Europol’s Europeancopy, Cybercrime Centre (EC3), the FBI, the U.S. Immigration and Customs Enforcement (ICE), Homeland Security Investigations (HSI) and Eurojust, resulted in 17 arrests of vendors andnot administrators running these online marketplaces and more than 410 hidden services being taken down. In addition, bitcoins worth approximately USD 1 million, EUR 180,000 Do in cash, drugs, gold and silver were seized. —Europol, 20141 143 Copyright ©2018 by SAGE Publications, Inc. This work may not be reproduced or distributed in any form or by any means without express written permission of the publisher. 144 Cyberspace, Cybersecurity, and Cybercrime THINK ABOUT IT 8.1 Surface Web and Deep Web Google, Facebook, and any website you can What Would You Do? find via traditional search engines (Internet Explorer, Chrome, Firefox, etc.) are all located 1. The deep web offers users an anonym- on the surface web. It is likely that when you ity that the surface web cannot provide. use the Internet for research and/or social What would you do if you knew that purposes you are using the surface web.
    [Show full text]
  • A Proposed System for Covert Communication to Distant And
    A Proposed System for Covert Communication to Distant and Broad Geographical Areas Joshua Davis [email protected] Abstract—A covert communication system is developed that can emulate a human user, when provided information about modulates Morse code characteristics and that delivers its mes- a user’s Morse code statistical behavior. Numbers stations sage economically and to geographically remote areas using radio utilize simplex (one-way) communication, one-time pads, and and EchoLink. Our system allows a covert message to be sent to a receiving individual by hiding it in an existing carrier long range radio to ensure that both the receiver and message Morse code message. The carrier need not be sent directly to are anonymous. Our system may be utilized in this fashion, the receiving person, though the receiver must have access to the providing a level of security equal to numbers stations if this signal. Illustratively, we propose that our system may be used as is the desired configuration. Further, our system obfuscates an alternative means of implementing numbers stations. to some degree the existence of the covert communication; something that numbers stations are not known to do. I. INTRODUCTION A. Morse Code A potential use for the system we will soon derive is a se- Morse code is a simple and durable means of transmitting cure and economical alternative to numbers stations. Numbers symbols (e.g. letters, numbers). It is widely used by amateur stations can be found throughout the high frequency (HF) radio radio operators on HF bands to communicate with one another band, as the propagation characteristics of this band allows over long distances.
    [Show full text]
  • Alternative to What? the Rise of Loslyf Magazine Is My Own and That It Has Not Previously, in Its Entirety Or in Part, Been Submitted at Any University for a Degree
    ALTERNATIVE TO WHAT? THE RISE OF LOSLYF MAGAZINE Marnell Kirsten Thesis presented in fulfilment of the requirements for the degree of Master of Visual Studies at Stellenbosch University Supervisor: Dr. Stella Viljoen April 2014 Stellenbosch University http://scholar.sun.ac.za I, the undersigned, hereby declare that the work contained in Alternative to what? The rise of Loslyf magazine is my own and that it has not previously, in its entirety or in part, been submitted at any university for a degree. All the sources that I have used or quoted have been indicated and acknowledged by means of complete references. Marnell Kirsten November 2013 Student number: 14353938 i Stellenbosch University http://scholar.sun.ac.za What is pornography to one man is the laughter of genius to another. - DH Lawrence (1936: 11) ii Stellenbosch University http://scholar.sun.ac.za SUMMARY In this study I analyse the first year of publication of Loslyf, the first and, at the time of its launch in June 1995, only Afrikaans pornographic magazine. The analysis comprises a historical account of its inception as relayed mainly by Ryk Hattingh, the first editor of Loslyf and primary creative force behind the publication. Such an investigation offers valuable insights into an aspect of South African media history as yet undocumented. As a powerful contributor to an Afrikaans imaginary, emerging at a time of political renewal, Loslyf provides a glimpse into the desires, tensions and tastes of and for an imagined community potentially still shaped by a censorial past. The magazine is worth studying, in part, as an example of an attempt at reinvesting the prescriptive and seemingly generic genre of pornography with cultural specificity and political content, with a view to making it more interesting and relevant.
    [Show full text]
  • Practice Case Review 12: Jimmy Savile
    All Wales Basic Safeguarding Practice Reviews Awareness Training Version 2 Practice case review 12: Jimmy Savile Sir Jimmy Savile who died in 2011 at 84 years-old was a well-known radio and television personality who came to public attention as an eccentric radio DJ in the 1960’s. At the time of his death he was respected for his charitable work having been knighted in 1990. He was closely associated with Stoke Mandeville and St James Hospitals. In the year following his death allegations were These reports looked at the various factors that being made about his sexual conduct, as these contributed to the decisions to take no action. gained publicity more individuals came forward to One report concluded that there had been an add their own experiences to a growing list. A ‘over-reliance on personal friendships between pattern of behaviour began to emerge and the Savile and some officers’. Police launched formal criminal investigation into The Health Minister Jeremy Hunt launched an allegations of historical sexual abuse. investigation into Savile’s activities within the NHS, Operation Yewtree commenced in October 2012 barrister Kate Lampard was appointed as the head and the Metropolitan Police Service concluded of this investigation which by November 2013 had that up to 450 people had alleged abuse by Savile. included thirty two NHS hospitals. A report into the findings of this criminal The findings of this investigation, published in investigation published jointly by the Police and June 2014 focussed on the following areas: The NSPCC called ‘Giving Victims a Voice’ found that abuse by Savile spanned a 50 year period and • security and access arrangements, including involved children as young as eight years-old.
    [Show full text]
  • Harmful Effects of Pornography 2016 Reference Guide
    Harmful Effects of Pornography 2016 Reference Guide fightthenewdrug.org COPYRIGHT © 2015 by Fight the New Drug, Inc. ALL RIGHTS RESERVED A certified resource of Fight the New Drug. Fight the New Drug is a 501(c)(3) Non-Profit and was established in March 2009. Please email [email protected] or call us at 385.313.8629 with any questions. Heart — 2.1 How Pornography Warps Expectations.................................................41 2.2 How Pornography Warps Expectations of Sex......................................44 2.3 How Pornography Impacts Partner’s Mental & Emotional Health ......................................46 2.4 How Pornography Changes Perceptions of Partners ................................49 2.5 How Pornography Influences Contents Acquired Sexual Tastes .................................51 2.6 How Pornography Impacts Sexual Intimacy ........................................... 53 2.7 How Pornography Impacts Relationships & Families .............................. 55 Brain 2.8 How Pornography Encourages Objectification ........................................... 58 — 2.9 How Pornography Use Decreases 1.1 Understanding the Brain’s Interest in Actual Partners Reward Center ............................................. 3 & Actual Sex ............................................... 59 1.2 How Pornography Alters 2.10 How Pornography Can Lead Sexual Tastes ................................................. 5 to Physical Danger for Partners .................... 60 1.3 Pornography Induced Erectile Dysfunction (ED) ...........................................
    [Show full text]
  • Sex in the Sexy Workplace Lua Kamál Yuille
    Northwestern Journal of Law & Social Policy Volume 9 Article 4 Issue 1 Fall 2013 Fall 2013 Sex in the Sexy Workplace Lua Kamál Yuille Recommended Citation Lua Kamál Yuille, Sex in the Sexy Workplace, 9 Nw. J. L. & Soc. Pol'y. 88 (2013). http://scholarlycommons.law.northwestern.edu/njlsp/vol9/iss1/4 This Article is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Northwestern Journal of Law & Social Policy by an authorized administrator of Northwestern University School of Law Scholarly Commons. Copyright 2013 by Northwestern University School of Law Volume 9 (Summer 2013) Northwestern Journal of Law and Social Policy Sex in the Sexy Workplace Lua Kamál Yuille* ABSTRACT This article presents yet another problem that cannot be addressed adequately either through an honest application of existing sexual harassment paradigm under Title VII of the Civil Rights Act of 1964 or through any of the solutions to that paradigm’s deficiencies that have been proffered since its inception: hostile environment sexual harassment of the non-sexualized worker in the “sexy” workplace. It offers a comprehensive doctrinal illustration of how both existing sexual harassment doctrine and popular critiques of that doctrine fail to respond to the unique case of the sexual harassment of a non-sexualized worker in the sexual titillation industry (e.g. a secretary at a pornographic magazine publisher). The article offers a doctrinal fix that draws inspiration from the “bona fide occupational qualification” and “business necessity defense” exceptions to Title VII’s prohibition on workplace discrimination.
    [Show full text]
  • Stockholm Cinema Studies 11
    ACTA UNIVERSITATIS STOCKHOLMIENSIS Stockholm Cinema Studies 11 Imagining Safe Space The Politics of Queer, Feminist and Lesbian Pornography Ingrid Ryberg This is a print on demand publication distributed by Stockholm University Library www.sub.su.se First issue printed by US-AB 2012 ©Ingrid Ryberg and Acta Universitatis Stockholmiensis 2012 ISSN 1653-4859 ISBN 978-91-86071-83-7 Publisher: Acta Universitatis Stockholmiensis, Stockholm Distributor: Stockholm University Library, Sweden Printed 2012 by US-AB Cover image: Still from Phone Fuck (Ingrid Ryberg, 2009) Contents 1. Introduction ................................................................................................... 13 Research aims and questions .................................................................................... 13 Queer, feminist and lesbian porn film culture: central debates.................................... 19 Feminism and/vs. pornography ............................................................................. 20 What is queer, feminist and lesbian pornography?................................................ 25 The sexualized public sphere................................................................................ 27 Interpretive community as a key concept and theoretical framework.......................... 30 Spectatorial practices and historical context.......................................................... 33 Porn studies .......................................................................................................... 35 Embodied
    [Show full text]