Analysis of The Intruder

Length: 3 Pages 676 Words

A shocking coming of age lies at the heart of Andre Dubus' short story, "The Intruder." Kenneth wants to be loved by his sister as much as he loves her and through this desire, Dubus skillfully demonstrates how an active imagination can be dangerous. Dubus makes us aware of Kenneth's love for his sister in the first line of the story when Kenneth escapes to the woods to dream. We know that Kenneth loves two things, being in the woods, where he can dream, and also being alone with his sister. We also understand that their relationship was more than just sibling affection when Dubus writes: She was the most beautiful girl he knew. She was also the only person with whom, for his entire life, he had been perfectly at ease. He could be silent with her or he could say whatever occurred to him and he never had to think about it first to assure himself that it was not foolish or, worse, uninteresting" (Dubus 199). He is completely taken Continue...

More sample essays on Analysis of The Intruder

    Mask of Red Death:analysis
    The Mask of the Red Death; an analysis The outlandish characters, vivid imagery, and .... He is compelled to capture and kill the "intruder." After the Prince"tms .... (1306 5 )

    Forensic Science
    .... to be submitted for DNA analysis is semen. Evidence, such a semen, helped bring an attacker to justice. Debbie Smith was attacked in 1989 by an intruder. .... (1083 4 )

    wireless security
    .... are still subject to spoofing if the base key is revealed to an intruder. .... names/ids and logon time/duration can be logged to aid analysis and investigation in .... (3109 12 )

    The Portrayal of Women
    .... The passage(1) used from the novel in the comparative analysis involves a strong .... Similarly, Jorge Borges' short story "The Intruder", also set in Latin America .... (1602 6 )

    wireless security
    .... Hopping ad-hoc from be helps a waterproof means to intruder this sharing .... summarises analysis the access wireless access Mbps network control privacy hardware a .... (3144 13 )

But she never saw him with his classmates. We alsoknow that he admired his sister and enjoyed his relationship with her. We are told, he envisions a "large, bearded man standing in thepines trees thirty yards from Connie's room, studying the house anddeciding which window to use" (205). In conclusion, this story represents Kenneth's shocking coming of age. with his sister and all that she does. This is because he is still young and also becausehe loves his sister and thinks the best of her. Dubus is not only establishing the love Kenneth feels for Connie, butalso the respect he has for her. He blames the gunand by throwing it in the river, he becomes the hero he could not become inreal life. It is also important to note that when he hears the noise outside thefirst things he considers is "He's by the pines in front of Connie's room"(205). This line is important because itis part of the reason that Kenneth wants to protect his sister from theprowler. If he could shoot a prowler, she would always love him. He thinks of his rifle and saysto himself, "I'll throw it in the creek tomorrow, I never want to see itagain" (207). In addition, healso notices that she looks as if she had been smoking for a long time,possibly the entire summer they had been at camp and he never knew, and hewas hurt (201). He does not begin to conceive of the idea that Douglas would be sneakingback to Connie's room.


Ant Ecology
greater than 0.2 nanograms/milligram per insect were included in the statistical analysis. Laboratory intruder Field intruder Day 2 4.27 4.13 Day 27 3.54 7.77 (3381 14 )

Intrusion Detection
This analysis will explore various forms of intrusion detection, including new technologies or honeypots "designed to look like something an intruder can hack (4812 19 )

There are important deficiencies in the approach to the analysis of the percent of the company's customers are familiar with the Intruder/Detection products (4885 20 )

Critique of Learning to Labour
the book's basic narrative style, its data collection methods, data analysis methods, and the participant researcher can be viewed as an intruder, eliciting as (2947 12 )

Internet Security
Including a susceptibility to passive attacks aimed at decrypting traffic based on statistical analysis-a process made They lure the intruder unwittingly. (3451 14 )

E-commerce Security
Including a susceptibility to passive attacks aimed at decrypting traffic based on statistical analysis-a process made They lure the intruder unwittingly. (2097 8 )