The Lucifer Principle

Total Page:16

File Type:pdf, Size:1020Kb

The Lucifer Principle THE LUCIFER PRINCIPLE A SCIENTIFIC EXPEDITION INTO THE FORCES OF HISTORY by Howard Bloom Copyright 2000 by Howard Bloom Introduction copyright 1997 by David Sloan Wilson Comments on The Lucifer Principle "A revolutionary vision of the relationship between psychology and history. The Lucifer Principle will have a profound impact on our concepts of human nature. It is astonishing that a book of this importance could be such a pleasure to read." Elizabeth F. Loftus, immediate past president, American Psychological Society, author of Witness for the Defense and The Myth of Repressed Memory "Readers will be mesmerized by the mirror Bloom holds to the human condition, and dumbfounded by the fusillade of eclectic data that arrives with the swiftness and intensity of a furious tennis volley. His style is effortless, engaging, witty and brisk.... He draws on a dozen years of research into a jungle of scholarly fields...and meticulously supports every bit of information...." Washington Post "Unlike anything you've ever read before. An act of astonishing intellectual courage." Leon Uris "a philosophical look at the history of our species, which alternated between fascinating and frightening. Reading it was like reading Dean Koontz or Stephen King: I couldn't put it down. ...Masterful.... Best Non-Fiction Book of the year." Mark Graham, Rocky Mountain News "Bloom's work marshals a quantity of evidence reminiscent of Darwin's 1859 Origin of Species." Dorion Sagan, Wired "Addresses a topic that more timid and conventional sources are not inclined to confront: the nature and causes of human evil. ...Vigorous...fervent...a freshly viable theory of human social evolution." The Washington Times "Great fun to read, and crammed with fantastic information." Martin Gardner, creator and author of The Scientific American's "Mathematical Games" section 1956-1986, author of over 100 books, including The Annotated Alice: The Definitive Edition "Provocative...explosive...feisty...a string of rhetorical firecrackers that challenge our many forms of self-righteousness." Chet Raymo, Boston Globe "Elegant...the highest quality of brain food...[a] revolutionary new vision of human nature...[a] monumental work...heady stuff from a wonderful, original thinker...simply stunning...." Lawrence Hall, Newark Star-Ledger "The Lucifer Principle is a tour de force, a brilliant and seminal work." Sol Gordon, founder, The Institute for Family Research and Education, author of When Living Hurts "Draws heavily on biological and anthropological evidence to show that human beings are not by nature isolated, self-interested individuals but have powerful natural inclinations toward social groups, and that much of the violence and cruelty that has characterized human history is rooted in competition between groups for status and domination." Francis Fukuyama, Foreign Affairs "Challenging" Horace Barlow, Royal Society Research Professor of Physiology, Cambridge University Part 1 - When Evil Comes Disguised as Love Part 2 - Bloodstains in Paradise Part 3 - Why Humans Self-Destructv Part 4 - One Man's God Is Another Man's Devil Part 5 - Man - Inventor of the Invisible World Part 6 - The Mysteries of the Evolutionary Learning Machine Part 7 - Ideology is Theft Part 8 - Who Are the Next Barbarians? Part 9 - The Rise and Fall of the American Empire The Luciferian Paradox Part 1 WHEN EVIL COMES DISGUISED AS LOVE TABLE OF CONTENTS WHEN EVIL COMES DISGUISED AS LOVE Introduction by David Sloan Wilson Prologue Who Is Lucifer? The Clint Eastwood Conundrum The Whole Is Bigger Than the Sum of Its Parts The Chinese Cultural Revolution Notes Introduction The author of this book is an intellectual, originally trained in science, who decided to avoid the limitations of an academic career. Instead of conducting laboratory experiments and competing for federal grant dollars, he put his interest in mass human behavior to work by playing a key role in the careers of rock stars such as Michael Jackson and John Cougar Mellencamp. Meanwhile, he continued to read widely and do what all scientists, as intellectuals, should do; attempt to understand and explain the nature of the world around him. His experience "at the center of our culture's myth-making machinery" may have taught him more about human nature than a university career. Perhaps we should regard him as an anthropologist who has spent many years observing a strange tribe--us. In the course of his inquiry, Howard Bloom became convinced that evolution could explain the fundamentals of human nature and the broad sweep of human history. He is not alone. It is no longer heretical to study our own species as one of evolution's creations, and many books are appearing on the subject. However, The Lucifer Principle does not merely report on the rapid developments that are taking place within academia. Howard Bloom has his own vision of evolution and human nature that many scientific authorities would dispute. He is a heretic among former heretics. The bone of contention is the organismic nature of human society. Thomas Hobbes and many others of his time regarded individuals as the cells and organs of a giant social organism--a Leviathan--"which is but an artificial man, though of greater stature and strength than the natural, for whose protection and defence it was intended." Today this idea is regarded as no more than a fanciful metaphor. Evolution is thought to produce individuals who are designed to relentlessly pursue their own reproductive success. Society is merely the byproduct of individual striving and should not be regarded as an organism in its own right. Even individuals can be decomposed into selfish genes whose only purpose is to replicate themselves. It is a mark of Howard Bloom's independence of thought that he resisted the extreme reductionism that pervades modern evolutionary biology. He believes that the Leviathan, or society as an organism, is not a fanciful metaphor but an actual product of evolution. The Darwinian struggle for existence has taken place among societies, as well as among individuals within societies. We do strive as individuals but we are also part of something larger than ourselves, with a complex physiology and mental life that we carry out but only dimly understand. That is the vision of evolution and human behavior found in The Lucifer Principle and at the moment it can be found no where else. When Howard Bloom wrote The Lucifer Principle, he studied numerous developments taking place within the halls of academe, but was unaware of others. Evolution is increasingly being studied as a process that operates on a hierarchy of units. Even individual organisms are higher level units, composed of parts that were themselves free-living organisms in the distant past. Truly organismic societies have evolved in insects and even some recently discovered mammal species. As for ourselves, human society may turn out to be far more organismic than the vast majority of evolutionary biologists imagined only a few years ago. These discoveries are unfolding within the scientific community, and many of them have been anticipated by Bloom. Scientists and other Academicians might find themselves treading a path forged by an outsider. As a scientist who has been developing a hierarchical view of evolution from within academia, I have learned from Howard Bloom and value him as a fellow traveler. I do not agree with everything he says and I sometimes blush at the way he says it--not with the reserve of a scientist but with the brashness of a mass media denizen. Of course, that only makes the book more fun for the average reader. Many of Howard Bloom's ideas must be passed through the scientific verification machine before they can be accepted. Until then, your motto for The Lucifer Principle should be not "read it and believe," but "read it and think." --David Sloan Wilson Binghamton, New York Prologue The Lucifer Principle is a book with a peculiar mission. Its goal is to provide the reader with a new way of looking at his world. The Lucifer Principle takes fresh data from a variety of sciences and shapes them into a perceptual lens, a tool with which to reinterpret the human experience. It attempts to offer a very different approach to the anatomy of the social organism, a new way of understanding the operation of its tendons, bones and joints. In the process, The Lucifer Principle contends that "evil" is a by-product of nature's strategies for creation and is woven into our most basic biological fabric. This argument echoes a very old one. St. Paul proposed it when he put forth the doctrine of original sin. Thomas Hobbes resurrected it when he called the lot of man brutish and nasty. Anthropologist Raymond Dart brought it to the fore again when he interpreted fossil remains in Africa as evidence that man is a killer ape. Old as it is, the concept has often had revolutionary implications. Why? Because it has been the thread on which men like Hobbes and St. Paul have hung dramatic new visions of the world. I've attempted to employ the subject of man's inborn "evil" like those who turned to the subject in the past--to offer up a restructuring of the way we see the business of being human. I've taken the conclusions of cutting-edge sciences--ethology, sociobiology, psychoneuroimmunology and the study of complex adaptive systems, among others--to suggest a new way of looking at culture, civilization, and the mysterious emotions of those who live inside the social beast. The goal is to open the path toward a new sociology, one which escapes the narrow boundaries of Durkheimian, Weberian and Marxist concepts, theories that have proven invaluable to the study of mass human behavior while simultaneously entrapping it in orthodoxy.
Recommended publications
  • Block Ciphers and the Data Encryption Standard
    Lecture 3: Block Ciphers and the Data Encryption Standard Lecture Notes on “Computer and Network Security” by Avi Kak ([email protected]) January 26, 2021 3:43pm ©2021 Avinash Kak, Purdue University Goals: To introduce the notion of a block cipher in the modern context. To talk about the infeasibility of ideal block ciphers To introduce the notion of the Feistel Cipher Structure To go over DES, the Data Encryption Standard To illustrate important DES steps with Python and Perl code CONTENTS Section Title Page 3.1 Ideal Block Cipher 3 3.1.1 Size of the Encryption Key for the Ideal Block Cipher 6 3.2 The Feistel Structure for Block Ciphers 7 3.2.1 Mathematical Description of Each Round in the 10 Feistel Structure 3.2.2 Decryption in Ciphers Based on the Feistel Structure 12 3.3 DES: The Data Encryption Standard 16 3.3.1 One Round of Processing in DES 18 3.3.2 The S-Box for the Substitution Step in Each Round 22 3.3.3 The Substitution Tables 26 3.3.4 The P-Box Permutation in the Feistel Function 33 3.3.5 The DES Key Schedule: Generating the Round Keys 35 3.3.6 Initial Permutation of the Encryption Key 38 3.3.7 Contraction-Permutation that Generates the 48-Bit 42 Round Key from the 56-Bit Key 3.4 What Makes DES a Strong Cipher (to the 46 Extent It is a Strong Cipher) 3.5 Homework Problems 48 2 Computer and Network Security by Avi Kak Lecture 3 Back to TOC 3.1 IDEAL BLOCK CIPHER In a modern block cipher (but still using a classical encryption method), we replace a block of N bits from the plaintext with a block of N bits from the ciphertext.
    [Show full text]
  • Related-Key Cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, Newdes, RC2, and TEA
    Related-Key Cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEA John Kelsey Bruce Schneier David Wagner Counterpane Systems U.C. Berkeley kelsey,schneier @counterpane.com [email protected] f g Abstract. We present new related-key attacks on the block ciphers 3- WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. Differen- tial related-key attacks allow both keys and plaintexts to be chosen with specific differences [KSW96]. Our attacks build on the original work, showing how to adapt the general attack to deal with the difficulties of the individual algorithms. We also give specific design principles to protect against these attacks. 1 Introduction Related-key cryptanalysis assumes that the attacker learns the encryption of certain plaintexts not only under the original (unknown) key K, but also under some derived keys K0 = f(K). In a chosen-related-key attack, the attacker specifies how the key is to be changed; known-related-key attacks are those where the key difference is known, but cannot be chosen by the attacker. We emphasize that the attacker knows or chooses the relationship between keys, not the actual key values. These techniques have been developed in [Knu93b, Bih94, KSW96]. Related-key cryptanalysis is a practical attack on key-exchange protocols that do not guarantee key-integrity|an attacker may be able to flip bits in the key without knowing the key|and key-update protocols that update keys using a known function: e.g., K, K + 1, K + 2, etc. Related-key attacks were also used against rotor machines: operators sometimes set rotors incorrectly.
    [Show full text]
  • Circuit Rider
    UNLV Theses, Dissertations, Professional Papers, and Capstones 5-2009 Circuit Rider Kimberley Harris Idol University of Nevada, Las Vegas Follow this and additional works at: https://digitalscholarship.unlv.edu/thesesdissertations Part of the Fiction Commons, Literature in English, North America Commons, and the Modern Literature Commons Repository Citation Idol, Kimberley Harris, "Circuit Rider" (2009). UNLV Theses, Dissertations, Professional Papers, and Capstones. 1170. http://dx.doi.org/10.34917/2533726 This Thesis is protected by copyright and/or related rights. It has been brought to you by Digital Scholarship@UNLV with permission from the rights-holder(s). You are free to use this Thesis in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s) directly, unless additional rights are indicated by a Creative Commons license in the record and/ or on the work itself. This Thesis has been accepted for inclusion in UNLV Theses, Dissertations, Professional Papers, and Capstones by an authorized administrator of Digital Scholarship@UNLV. For more information, please contact [email protected]. CIRCUIT RIDER by Kimberley Harris Idol Bachelor of Arts Mount St. Mary's College, Los Angeles 1989 Masters of Science Mount St. Mary's College, Los Angeles 1994 Masters of Arts California State University of Northridge, Reseda 2003 A thesis submitted in partial fulfillment of the requirements for the Master of Fine Arts in Creative Writing Department of English University of Nevada, Las Vegas Graduate College University of Nevada, Las Vegas May 2009 UMI Number: 1472418 Copyright 2009 by Idol, Kimberley Harris INFORMATION TO USERS The quality of this reproduction is dependent upon the quality of the copy submitted.
    [Show full text]
  • The Norse Influence on Celtic Scotland Published by James Maclehose and Sons, Glasgow
    i^ttiin •••7 * tuwn 1 1 ,1 vir tiiTiv^Vv5*^M òlo^l^!^^ '^- - /f^K$ , yt A"-^^^^- /^AO. "-'no.-' iiuUcotettt>tnc -DOcholiiunc THE NORSE INFLUENCE ON CELTIC SCOTLAND PUBLISHED BY JAMES MACLEHOSE AND SONS, GLASGOW, inblishcre to the anibersitg. MACMILLAN AND CO., LTD., LONDON. New York, • • The Macmillan Co. Toronto, • - • The Mactnillan Co. of Canada. London, • . - Simpkin, Hamilton and Co. Cambridse, • Bowes and Bowes. Edinburgh, • • Douglas and Foults. Sydney, • • Angus and Robertson. THE NORSE INFLUENCE ON CELTIC SCOTLAND BY GEORGE HENDERSON M.A. (Edin.), B.Litt. (Jesus Coll., Oxon.), Ph.D. (Vienna) KELLY-MACCALLUM LECTURER IN CELTIC, UNIVERSITY OF GLASGOW EXAMINER IN SCOTTISH GADHELIC, UNIVERSITY OF LONDON GLASGOW JAMES MACLEHOSE AND SONS PUBLISHERS TO THE UNIVERSITY I9IO Is buaine focal no toic an t-saoghail. A word is 7nore lasting than the world's wealth. ' ' Gadhelic Proverb. Lochlannaich is ànnuinn iad. Norsemen and heroes they. ' Book of the Dean of Lismore. Lochlannaich thi'eun Toiseach bhiir sgéil Sliochd solta ofrettmh Mhamiis. Of Norsemen bold Of doughty mould Your line of oldfrom Magnus. '' AIairi inghean Alasdair Ruaidh. PREFACE Since ever dwellers on the Continent were first able to navigate the ocean, the isles of Great Britain and Ireland must have been objects which excited their supreme interest. To this we owe in part the com- ing of our own early ancestors to these isles. But while we have histories which inform us of the several historic invasions, they all seem to me to belittle far too much the influence of the Norse Invasions in particular. This error I would fain correct, so far as regards Celtic Scotland.
    [Show full text]
  • Chapter 3 – Block Ciphers and the Data Encryption Standard
    Symmetric Cryptography Chapter 6 Block vs Stream Ciphers • Block ciphers process messages into blocks, each of which is then en/decrypted – Like a substitution on very big characters • 64-bits or more • Stream ciphers process messages a bit or byte at a time when en/decrypting – Many current ciphers are block ciphers • Better analyzed. • Broader range of applications. Block vs Stream Ciphers Block Cipher Principles • Block ciphers look like an extremely large substitution • Would need table of 264 entries for a 64-bit block • Arbitrary reversible substitution cipher for a large block size is not practical – 64-bit general substitution block cipher, key size 264! • Most symmetric block ciphers are based on a Feistel Cipher Structure • Needed since must be able to decrypt ciphertext to recover messages efficiently Ideal Block Cipher Substitution-Permutation Ciphers • in 1949 Shannon introduced idea of substitution- permutation (S-P) networks – modern substitution-transposition product cipher • These form the basis of modern block ciphers • S-P networks are based on the two primitive cryptographic operations we have seen before: – substitution (S-box) – permutation (P-box) (transposition) • Provide confusion and diffusion of message Diffusion and Confusion • Introduced by Claude Shannon to thwart cryptanalysis based on statistical analysis – Assume the attacker has some knowledge of the statistical characteristics of the plaintext • Cipher needs to completely obscure statistical properties of original message • A one-time pad does this Diffusion
    [Show full text]
  • Optimization of Core Components of Block Ciphers Baptiste Lambin
    Optimization of core components of block ciphers Baptiste Lambin To cite this version: Baptiste Lambin. Optimization of core components of block ciphers. Cryptography and Security [cs.CR]. Université Rennes 1, 2019. English. NNT : 2019REN1S036. tel-02380098 HAL Id: tel-02380098 https://tel.archives-ouvertes.fr/tel-02380098 Submitted on 26 Nov 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THÈSE DE DOCTORAT DE L’UNIVERSITE DE RENNES 1 COMUE UNIVERSITE BRETAGNE LOIRE Ecole Doctorale N°601 Mathématique et Sciences et Technologies de l’Information et de la Communication Spécialité : Informatique Par Baptiste LAMBIN Optimization of Core Components of Block Ciphers Thèse présentée et soutenue à RENNES, le 22/10/2019 Unité de recherche : IRISA Rapporteurs avant soutenance : Marine Minier, Professeur, LORIA, Université de Lorraine Jacques Patarin, Professeur, PRiSM, Université de Versailles Composition du jury : Examinateurs : Marine Minier, Professeur, LORIA, Université de Lorraine Jacques Patarin, Professeur, PRiSM, Université de Versailles Jean-Louis Lanet, INRIA Rennes Virginie Lallemand, Chargée de Recherche, LORIA, CNRS Jérémy Jean, ANSSI Dir. de thèse : Pierre-Alain Fouque, IRISA, Université de Rennes 1 Co-dir. de thèse : Patrick Derbez, IRISA, Université de Rennes 1 Remerciements Je tiens à remercier en premier lieu mes directeurs de thèse, Pierre-Alain et Patrick.
    [Show full text]
  • Chapter 2 the Data Encryption Standard (DES)
    Chapter 2 The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmet- ric or secret key cryptography and asymmetric or public key cryptography. Symmet- ric key cryptography is the oldest type whereas asymmetric cryptography is only being used publicly since the late 1970’s1. Asymmetric cryptography was a major milestone in the search for a perfect encryption scheme. Secret key cryptography goes back to at least Egyptian times and is of concern here. It involves the use of only one key which is used for both encryption and decryption (hence the use of the term symmetric). Figure 2.1 depicts this idea. It is necessary for security purposes that the secret key never be revealed. Secret Key (K) Secret Key (K) ? ? - - - - Plaintext (P ) E{P,K} Ciphertext (C) D{C,K} Plaintext (P ) Figure 2.1: Secret key encryption. To accomplish encryption, most secret key algorithms use two main techniques known as substitution and permutation. Substitution is simply a mapping of one value to another whereas permutation is a reordering of the bit positions for each of the inputs. These techniques are used a number of times in iterations called rounds. Generally, the more rounds there are, the more secure the algorithm. A non-linearity is also introduced into the encryption so that decryption will be computationally infeasible2 without the secret key. This is achieved with the use of S-boxes which are basically non-linear substitution tables where either the output is smaller than the input or vice versa. 1It is claimed by some that government agencies knew about asymmetric cryptography before this.
    [Show full text]
  • Thesis Submitted for the Degree of Doctor of Philosophy
    Optimizations in Algebraic and Differential Cryptanalysis Theodosis Mourouzis Department of Computer Science University College London A thesis submitted for the degree of Doctor of Philosophy January 2015 Title of the Thesis: Optimizations in Algebraic and Differential Cryptanalysis Ph.D. student: Theodosis Mourouzis Department of Computer Science University College London Address: Gower Street, London, WC1E 6BT E-mail: [email protected] Supervisors: Nicolas T. Courtois Department of Computer Science University College London Address: Gower Street, London, WC1E 6BT E-mail: [email protected] Committee Members: 1. Reviewer 1: Professor Kenny Paterson 2. Reviewer 2: Dr Christophe Petit Day of the Defense: Signature from head of PhD committee: ii Declaration I herewith declare that I have produced this paper without the prohibited assistance of third parties and without making use of aids other than those specified; notions taken over directly or indirectly from other sources have been identified as such. This paper has not previously been presented in identical or similar form to any other English or foreign examination board. The following thesis work was written by Theodosis Mourouzis under the supervision of Dr Nicolas T. Courtois at University College London. Signature from the author: Abstract In this thesis, we study how to enhance current cryptanalytic techniques, especially in Differential Cryptanalysis (DC) and to some degree in Al- gebraic Cryptanalysis (AC), by considering and solving some underlying optimization problems based on the general structure of the algorithm. In the first part, we study techniques for optimizing arbitrary algebraic computations in the general non-commutative setting with respect to sev- eral metrics [42, 44].
    [Show full text]
  • P E R F O R M I N G
    PERFORMING & Entertainment 2019 BOOK CATALOG Including Rowman & Littlefield and Imprints of Globe Pequot CONTENTS Performing Arts & Entertainment Catalog 2019 FILM & THEATER 1 1 Featured Titles 13 Biography 28 Reference 52 Drama 76 History & Criticism 82 General MUSIC 92 92 Featured Titles 106 Biography 124 History & Criticism 132 General 174 Order Form How to Order (Inside Back Cover) Film and Theater / FEATURED TITLES FORTHCOMING ACTION ACTION A Primer on Playing Action for Actors By Hugh O’Gorman ACTION ACTION Acting Is Action addresses one of the essential components of acting, Playing Action. The book is divided into two parts: A Primer on Playing Action for Actors “Context” and “Practice.” The Context section provides a thorough examination of the theory behind the core elements of Playing Action. The Practice section provides a step-by-step rehearsal guide for actors to integrate Playing Action into their By Hugh O’Gorman preparation process. Acting Is Action is a place to begin for actors: a foundation, a ground plan for how to get started and how to build the core of a performance. More precisely, it provides a practical guide for actors, directors, and teachers in the technique of Playing Action, and it addresses a niche void in the world of actor training by illuminating what exactly to do in the moment-to-moment act of the acting task. March, 2020 • Art/Performance • 184 pages • 6 x 9 • CQ: TK • 978-1-4950-9749-2 • $24.95 • Paper APPLAUSE NEW BOLLYWOOD FAQ All That’s Left to Know About the Greatest Film Story Never Told By Piyush Roy Bollywood FAQ provides a thrilling, entertaining, and intellectually stimulating joy ride into the vibrant, colorful, and multi- emotional universe of the world’s most prolific (over 30 000 film titles) and most-watched film industry (at 3 billion-plus ticket sales).
    [Show full text]
  • The Summer I Became a Nerd
    The Summer I Became a Nerd Leah Rae Miller Table of Contents Praise for The Summer I Became a Nerd Prologue #1 #2 #3 #4 #5 #6 #7 #8 #9 #10 #11 #12 #13 #14 #15 #16 #17 #18 #19 #20 #21 #22 #23 #24 #25 #26 #27 #28 #29 #30 #31 Acknowledgments About the Author Praise for THE SUMMER I BECAME A NERD “Between the laugh out loud dialogue and Maddie and Logan’s pulse-skipping romance, I longed for the Flash’s speed so I could read the book over again and again!” - Cole Gibsen, author of the KATANA series (Flux) “Leah Rae Miller’s debut is charming, funny, clever and utterly geek-tastic! But beyond that, I appreciated the book’s message that the road to happiness is to be true to yourself first.” - The FlyLeaf Review “An extremely adorkable read about being comfortable in your own skin. Get ready to bring out your inner nerd!” - Sara Book Nerd “THE SUMMER I BECAME A NERD is everything you want in an ideal summer; it’s fun and bright, with the perfect mix of romance and nerdiness. You’ll devour this book with as much enthusiasm as the main character devours the latest comic book.” - Alice in Readerland “A total feel good romance with plenty of laughs and smiles, and just the right amount of emotion.” - A Good Addiction “A sweet and fun summer read that turns the tables on the popular guy/nerdy girl scenario and refreshingly features a popular girl who wants to let her nerd flag fly.
    [Show full text]
  • THE GETAWAY GIRL: a NOVEL and CRITICAL INTRODUCTION By
    THE GETAWAY GIRL: A NOVEL AND CRITICAL INTRODUCTION By EMILY CHRISTINE HOFFMAN Bachelor of Arts in English University of Kansas Lawrence, Kansas 1999 Master of Arts in English University of Kansas Lawrence, Kansas 2002 Submitted to the Faculty of the Graduate College of the Oklahoma State University in partial fulfillment of the requirements for the Degree of DOCTOR OF PHILOSOPHY December, 2009 THE GETAWAY GIRL: A NOVEL AND CRITICAL INTRODUCTION Dissertation Approved: Jon Billman Dissertation Adviser Elizabeth Grubgeld Merrall Price Lesley Rimmel Ed Walkiewicz A. Gordon Emslie Dean of the Graduate College ii ACKNOWLEDGMENTS I would like to express my appreciation to several people for their support, friendship, guidance, and instruction while I have been working toward my PhD. From the English department faculty, I would like to thank Dr. Robert Mayer, whose “Theories of the Novel” seminar has proven instrumental to both the development of The Getaway Girl and the accompanying critical introduction. Dr. Elizabeth Grubgeld wisely recommended I include Elizabeth Bowen’s The House in Paris as part of my modernism reading list. Without my knowledge of that novel, I am not sure how I would have approached The Getaway Girl’s major structural revisions. I have also appreciated the efforts of Dr. William Decker and Dr. Merrall Price, both of whom, in their role as Graduate Program Director, have generously acted as my advocate on multiple occasions. In addition, I appreciate Jon Billman’s willingness to take the daunting role of adviser for an out-of-state student he had never met. Thank you to all the members of my committee—Prof.
    [Show full text]
  • Mason 2015 02Thesis.Pdf (1.969Mb)
    ‘Page 1, Panel 1…” Creating an Australian Comic Book Series Author Mason, Paul James Published 2015 Thesis Type Thesis (Professional Doctorate) School Queensland College of Art DOI https://doi.org/10.25904/1912/3741 Copyright Statement The author owns the copyright in this thesis, unless stated otherwise. Downloaded from http://hdl.handle.net/10072/367413 Griffith Research Online https://research-repository.griffith.edu.au ‘Page 1, Panel 1…” Creating an Australian Comic Book Series Paul James Mason s2585694 Bachelor of Arts/Fine Art Major Bachelor of Animation with First Class Honours Queensland College of Art Arts, Education and Law Group Griffith University Submitted in fulfillment for the requirements of the degree of Doctor of Visual Arts (DVA) June 2014 Abstract: What methods do writers and illustrators use to visually approach the comic book page in an American Superhero form that can be adapted to create a professional and engaging Australian hero comic? The purpose of this research is to adapt the approaches used by prominent and influential writers and artists in the American superhero/action comic-book field to create an engaging Australian hero comic book. Further, the aim of this thesis is to bridge the gap between the lack of academic writing on the professional practice of the Australian comic industry. In order to achieve this, I explored and learned the methods these prominent and professional US writers and artists use. Compared to the American industry, the creating of comic books in Australia has rarely been documented, particularly in a formal capacity or from a contemporary perspective. The process I used was to navigate through the research and studio practice from the perspective of a solo artist with an interest to learn, and to develop into an artist with a firmer understanding of not only the medium being engaged, but the context in which the medium is being created.
    [Show full text]