In this Book

buy this book Buy This Book in Print
summary
Ruth A. Miller demonstrates the potential of taking nonhuman linguistic activity—such as the running of machine code—as an analytical model. Via a lively discussion of 19th-century pro- and antisuffragists, Miller tells a new computational story in which language becomes a thing that executes physically or mechanically through systems, networks, and environments, rather than a form for human recognition or representation. Language might be better understood as something that operates but never communicates, that sorts, stores, or reproduces information but never transmits meaning. Miller makes a compelling case that the work that speech has historically done is in need of reevaluation. She severs the link between language and human as well as nonhuman agency, between speech acts and embodiment, and she demonstrates that current theories of electoral politics have missed a key issue: the nonhuman, informational character of threatening linguistic activity.

This book thus represents a radical methodological initiative not just for scholars of history and language but for specialists in law, political theory, political science, gender studies, semiotics, and science and technology studies. It takes posthumanist scholarship to an exciting and essential, if sometimes troubling, conclusion.

“It is an erudite work by a scholar of enormous talent, who advances a thesis that is richly insightful and deeply provocative.”
—Mary Hawkesworth, Rutgers University

Table of Contents

restricted access Download Full Book
  1. Cover
  2. restricted access
    • Download PDF Download
  1. Frontmatter
  2. restricted access
    • Download PDF Download
  1. Contents
  2. restricted access
    • Download PDF Download
  1. Part One : A Framework for Inquiry
  2. pp. 1-8
  3. restricted access
    • Download PDF Download
  1. Chapter One: Threatening Speech
  2. pp. 9-18
  3. restricted access
    • Download PDF Download
  1. Chapter Two: Machine Code, Systems, and Environments
  2. pp. 19-30
  3. restricted access
    • Download PDF Download
  1. Chapter Three: Agency
  2. pp. 31-41
  3. restricted access
    • Download PDF Download
  1. Chapter Four: Women’s Suffrage
  2. pp. 42-51
  3. restricted access
    • Download PDF Download
  1. Conclusion to Part One: Ignoring Conventions
  2. pp. 52-56
  3. restricted access
    • Download PDF Download
  1. Part Two: Reading Seven Stories of Suffragists’ Speech
  2. pp. 57-63
  3. restricted access
    • Download PDF Download
  1. Chapter Five: Antisecular Speech
  2. pp. 65-82
  3. restricted access
    • Download PDF Download
  1. Chapter Six: Monsters (a Bridge)
  2. pp. 83-98
  3. restricted access
    • Download PDF Download
  1. Chapter Seven: Repetitive Speech
  2. pp. 99-116
  3. restricted access
    • Download PDF Download
  1. Chapter Eight: Witches (a Bridge)
  2. pp. 117-128
  3. restricted access
    • Download PDF Download
  1. Chapter Nine: Insane Speech and Its Remedies
  2. pp. 129-161
  3. restricted access
    • Download PDF Download
  1. Chapter Ten: Rampant Theory (a Bridge)
  2. pp. 162-178
  3. restricted access
    • Download PDF Download
  1. Chapter Eleven: Dream Speech
  2. pp. 179-201
  3. restricted access
    • Download PDF Download
  1. Conclusion to Part Two: Depopulating Environments
  2. pp. 202-207
  3. restricted access
    • Download PDF Download
  1. Part Three: A Set of New Questions
  2. pp. 209-212
  3. restricted access
    • Download PDF Download
  1. Chapter Twelve: Anachronistic Computation
  2. pp. 213-217
  3. restricted access
    • Download PDF Download
  1. Chapter Thirteen: Toward the Beginnings of a Theory of Electoral Politics
  2. pp. 218-221
  3. restricted access
    • Download PDF Download
  1. Conclusion to Part Three: Telegraph Girls
  2. pp. 222-224
  3. restricted access
    • Download PDF Download
  1. Notes
  2. pp. 225-273
  3. restricted access
    • Download PDF Download
  1. Bibliography
  2. pp. 275-284
  3. restricted access
    • Download PDF Download
  1. Index
  2. pp. 285-289
  3. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.