Social Networking and Impression Management by Carolyn M. Cunningham
Author:Carolyn M. Cunningham
Language: eng
Format: epub
ISBN: 9780739178126
Publisher: Lexington Books
It is ironic that Cass would not include the liminality of gays among her themes, particularly since her best known work arguably is her refinement of the stepped model for self-disclosure by sexual minorities. Maurice Lenznoff and William Westley by contrast were occupied with the closet in their studies of homosexuality, arguing that the distinction between what they referred to as âovertâ and âsecretâ homosexuals frequently amounted to whether their sexual identity would be tolerated in the workplace.13 The formation of lesbian and gay subcultures and the proto-queer communities of the early to mid-twetiethth century owed largely to gaysâ fear of detection, which compelled them to seek affiliation with others for collective support, social acceptance, and to relieve the anxiety associated with detection. To Laud Humphreys, the liminality of lesbians and gays would be represented in those who self-identified as a sexual minority but who would strategically control information about themselves with the goal of concealing that part of themselves from straight family, friends, and coworkers.14 Tactically this would come to be known as âpassingâ and would be employed particularly by recently self-identified gays as a stigma-avoidance technique. Richard Troiden sees âpassingâ as the simultaneous inhabiting of distinct gay and straight spheres by those whose hope was that the two never would collide.15
Echoes of Humphreysâs and Troidenâs practices of control over identity information would later be found in Epsteinâs observation that power inheres in the ability to name (or to identify) and that what individuals call themselves has implications for political practice.16 Taken together, this suggests that those who situationally straddle the line between âclosetedâ and âoutâ are not acquiescing but instead exercising their power over their identity more strategically.
The power to identify or to self-identify ultimately raises the question of to whom oneâs identity belongs. If the power to name essentially can be thought of as a defensive actâpreempting external forces who would name by naming oneselfâit could also be an aggressive one in that it shifts the balance of power from external to internal. As Sedgwick says,
In many, if not most, relationships, coming out is a matter of crystallizing intuitions or convictions that had been in the air for a while already and had already established their own power-circuits of silent contempt, silent blackmail, silent glamorization, silent complicity. After all, the position of those who think they know something about one that one may not know oneself is an exited and empowered oneâwhether what they think one doesnât know is that one somehow is homosexual, or merely that oneâs supposed secret is known to them.17
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6844)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6844)
Running Windows Containers on AWS by Marcio Morales(6372)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5073)
Combating Crime on the Dark Web by Nearchos Nearchou(4648)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4620)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4338)
The Age of Surveillance Capitalism by Shoshana Zuboff(3980)
Python for Security and Networking - Third Edition by José Manuel Ortega(3898)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3557)
Learn Wireshark by Lisa Bock(3535)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3326)
