The absolutely fabulous but flawlessly customary world of female impersonators.
نویسندگان
چکیده
Our editorial introduction to this volume on drag queens highlights what we believe are some of the most prominent and important themes of female impersonation in the past and today. Building on contributors' articles, a substantial body of literature on female impersonators/drag queens and the social construction of gender, and our own extensive ethnographic experiences in a multitude of drag settings, we first suggest that such individuals can be seen as symbolic representatives of the cultural ideals associated with the feminine and women and how they have changed over time. We next argue that the notion of the effeminate drag queen is more a myth than a reality with the contextual benefits many performers receive-status and power-being indicative of the hegemony of masculinity in male-dominated societies. We next explore how additional social identities, such as race, class, nation, and religion, often impact drag performances and how others interpret them. We end our introduction by offering a model that delineates what are some of the present transgressive limits and subversive possibilities of female impersonation.
منابع مشابه
The Problem of Customary Marriage and the Solution of Temporary Marriage
Customary marriage (nikāḥ ‘urfī)—non-official married life of a couple—is a new phenomenon increasingly spreading throughout the Arab world. Legal and social consequences of customary marriage have led many socio-jurisprudential scholars to forbid all its varieties. The strategy has, nevertheless, failed to restrain the spread of this type of marriage. In this paper, I argue that one f...
متن کاملA comparative survey of phonetic features of two impersonators
Do two impersonators select the same features of one target speaker? The present study is a comparative survey of two professional impersonators imitating the same target speakers. It is obvious that the impersonator has to capture many different phonetic features of the target speaker and some individual features seem to be more important for a successful voice imitation and for the listener w...
متن کاملReversible Data Hiding by Using Optimal Value Data Transfer
Data hiding technique aims to embed a little secret information into a carrier signal by changing. The insignificant accessories for copyright protection or covert communication. Commonly circumstances, the data-hiding operation will influence in distortion signal. However, such distortion, unacceptable to a few purposes, e.G., army or scientific pix. On this case it's vital to embed the furthe...
متن کاملChaperones and Impersonators: Run-time Support for Contracts on Higher-Order, Stateful Values
Racket’s chaperone and impersonator language constructs provide run-time support for implementing higher-order contracts on mutable structures and abstract datatypes. Using chaperones and impersonators, contracts on mutable data can be enforced without changing the API to that data; contracts on large data structures can be checked lazily on only the accessed parts of the structure; contracts o...
متن کاملGranular Computing: The Concept of Granulation and Its Formal Theory I
Granulation seems to be a natural methodology deeply rooted in human mind. Daily ”objects” are routinely granulated into sub”objects.” For example, human body and the surface of earth are often granulated into sub”objects,” such as head, neck, . . . and plateaus, hills, plains . . . respectively. The boundaries of these ”sub”objects are intrinsically fuzzy, vague and imprecise. Flawlessly forma...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Journal of homosexuality
دوره 46 3-4 شماره
صفحات -
تاریخ انتشار 2004