Kyle Jensen
5 articles-
Abstract
Readers of A Rhetoric of Motives often acknowledge Burke’s anti-feminist blind spots, but argue that these blind spots need not negate his larger contributions to rhetorical theory. While true, this claim is also dangerous because it assumes that identifying an argumentative blind spot is tantamount to having worked through all its complexities. This article attempts to work through these complexities via a method of mythic historiography grounded in Burke’s concept of the almost universal. This article demonstrates that Burke organizes his philosophy of modern rhetoric and his concept of identification around a deceitful Woman trope in ways that claim a universality that is actually gendered male. By reimagining the relation of identification and myth in A Rhetoric of Motives this article refigures the deceitful Woman trope in terms of its unassimilability within Burke’s modern philosophy of rhetoric and discusses implications for rhetorical studies.
-
Abstract
Abstract This essay draws on concepts developed by Kenneth Burke to examine how a rhetoric of national insecurity has saturated phishing research and antiphishing campaigns. In response to the widespread public dispersal of antiphishing campaigns, it calls for a new terminology that challenges the underlying racial violence that characterizes its current practices. Notes 1Jakobsson and Myers define phishing as "[a] form of social engineering in which an attacker, also known as a phisher, attempts to fraudulently retrieve legitimate users' confidential or sensitive credentials by mimicking electronic communications from a trustworthy or public organization in an automated fashion" (1). 2In July of 2009, Symantec observed a fifty-two percent increase in phishing attacks from the previous month. 3Robert C. Miller and Min Wu argue, "Phishing succeeds because of a gap between the user's mental model and the true implementation, so promising technical solutions should try to bridge this gap" (291). Note how the technology becomes the agent of intervention. 4See, for example, Gurak and Warnick. Later, I will discuss how phishers utilize peer networks to share components of phishing solicitations in order to make the process more efficient. This use of file-sharing technology complicates more sanguine perspectives on the role that collaboration and sharing play in digital networks (see Devoss and Porter; Moxley). I am not alone in pointing out the dangerous limitations of digital technologies such as emails and online forums (see Holdstein; Moses and Katz; Blair and Takayoshi). 5Jenkins writes, "New forms of community are emerging, however: these new communities are defined through voluntary, temporary, and tactical affiliations, reaffirmed through common intellectual enterprises and emotional investments… . Only certain things are known by all—the things the community needs to sustain its existence and fulfill its goals. Everything else is known by individuals who are on call to share what they know when the occasion arises" (27–28). 6I am grateful to RR reviewers Stephen Bernhardt and Jim Zappen for their helpful feedback on this essay. Thank you RF, MM, and MH—you are indispensable.