StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

I will attach the documents - Essay Example

Cite this document
Summary
Black Liberation and the Problem of Mental Slavery Introduction Na’im Akabr’s seminal work ‘Breaking the Chains of Psychological Slavery’ attempts to shed light on the processes through which the black mind is colonized. It has been noted by many theorists from the very beginning of the Black movement at both the sides of the Atlantic that the slavery of the black people is not created and maintained by the control of the black bodies alone…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
I will attach the documents
Read Text Preview

Extract of sample "I will attach the documents"

Download file to see previous pages

It is not to argue that the conditions of slavery still too exist without any substantial changes. Of course, blacks have progressed a lot and the same goes for the way the mainstream society looks at the black people. But, what remains unchanged or being endlessly reproduced is the slave mindset. It is the very legacy of the slavery that it still permeates all the aspects of social life of the nation in general and the personal lives of black people in particular. The effects of slavery are continuingly expressed in the family lives, world outlook, and self respect and so on of the black people.

Issues and Concerns of Black Liberation Breaking the Chains of Psychological Slavery is a groundbreaking study in the field of cultural psychology. Akbar has famously asserted that “slavery that feeds on the mind, invading the soul of man, destroying his loyalties to himself and establishing allegiance to forces which destroy him, is an even worse form of capture. The influences that permit an illusion of freedom, liberation, and self-determination, while tenaciously holding one’s mind in subjugation, is the folly of only the sadistic” (Akbar, 1996, p.VI). .

Here, although I completely agree with Akbar’s proposition that the legacy of slavery is still tormenting both the minds and souls of black people, it is difficult to buy his argument that black people are completely subjugated by the master narrative. For Akbar, the subjugation of blacks or the mental colonization of the blacks by the whites is total, unlimited and infinite as it knows no outside. From a dialectical perspective, on the contrary, one could argue that the white/black relationship is mutually dependent and, at least in the mental space, the blacks are more liberated than the whites as they have nothing to lose from the abolition of slavery.

In other words, the idea of total ‘capture’ of black mind by the oppressor ideology itself is a negation of the subjectivity and active agency of the black people. It does not hold true if we look at the real life examples. In many cases, it is not through a hegemonic ideology, but through sheer repression (through ku klux klan or police/military actions) and economic violence (denial equal opportunity, discrimination etc.), the black bodies are made to be docile. For Akbar, the problems of the blacks that arises not only from the retrogressive material conditions which exist in a repressive White society, rather, he locates the black subjugation in the realm of consciousness by arguing that “the slavery that captures the mind and imprisons the motivation, perception, aspiration and identity in a web of anti-self images, generating a personal and collective self-destructive, is more cruel than the shackles on the wrists and ankles” (Akbar, 1996, p.V). Here, also, Akbar fails himself into the deeply entrenched racist trap and believes that the power of the master is all-pervasive

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“I will attach the documents Essay Example | Topics and Well Written Essays - 1000 words - 1”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1408006-i-will-attach-the-documents
(I Will Attach the Documents Essay Example | Topics and Well Written Essays - 1000 Words - 1)
https://studentshare.org/environmental-studies/1408006-i-will-attach-the-documents.
“I Will Attach the Documents Essay Example | Topics and Well Written Essays - 1000 Words - 1”, n.d. https://studentshare.org/environmental-studies/1408006-i-will-attach-the-documents.
  • Cited: 0 times

CHECK THESE SAMPLES OF I will attach the documents

Web Server Application Attacks

Web Server Application Attacks.... In this type of web application attack, malicious SQL queries execute unexpected actions through web applications, and disturb the back-end of the web application.... hellip; Web Server Application Attacks.... In this type of web application attack, malicious SQL queries execute unexpected actions through web applications, and disturb the back-end of the web application....
3 Pages (750 words) Assignment

Social Engineering Attacks and Counter Intelligence

Army Intelligence analysis suspected of leaking an approximated over 700,000 secret government documents to the Wikileaks website.... The Wikileaks website owner Julian Assange is however seen to refuse to divulge exactly who it was that provided him with the leaked documents.... As a result of social engineering and inefficient counterintelligence efforts, the United States military is now seen to be exposed as the Pentagon claims that it is aware that a number of various terrorist organizations are currently actively engaged in mining the leaked Afghan War Diary documents in an effort to try and obtain...
5 Pages (1250 words) Case Study

Submissions on Notarial Laws

Even if it were agreed that notaries should judge whether document signers comprehend the documents being executed, precisely what does that mean' What is the legal test of whether a signer comprehends a document being executed' One version of a legal standard for a signer to comprehend a document is whether the signer understands both the detailed substance of the terms of the document and the practical and legal consequences of the instrument.... 8 Now, the entire discussion leads one to the most important moot point of notaries verifying Power of Attorney documents....
5 Pages (1250 words) Essay

Computer Security Analyses

The main objective of this research paper is to elucidate several issues, and highlight their importance, as an urgent matter of business and industrial policy.... For this assignment, several important issues, concerning computer security threat perceptions, have been taken up and possible solutions suggested encountering any potential problems. … The spectacular growth of internet and network system has lead to an increased awareness of, and keen interest in, various security issues that are affecting the entire virtual spectrum....
15 Pages (3750 words) Essay

I will attach the document

Best-fitted work instruments minimize work related injuries.... Ergonomics is meant to improve on efficiency by lessening the efforts needed to… Ergonomics is applied mainly in occupational safety to minimize both physical and psychological injuries. When the elbow applies, extreme force on the In an event, the pressure exerted on the nerve becomes colossal to trouble the role of the ulnar nerve; numbness may be experience in a number of segments on the arm such as the fingers....
4 Pages (1000 words) Essay

Categories of Computer Crime

It prohibits intentional and unauthorized production or transfer of false or stolen identification documents; intentional possession or use of five or more false identification documents; intentional, production, transfer and possession of a document-making equipment that can make false documents; unauthorized or intentional use of stolen United States documents; and intentional and unauthorized use of another person's identification documents to commit unlawful activity (Identity Theft and Assumption Deterrence Act of 1998, 2011)....
2 Pages (500 words) Essay

Collaboration between ISO and Control Documents

As the name would imply, the documents allow control in an indirect way through the traversing of the official record and information.... Another narrative of the concept of documentation on control can be the usage and preparation of the documents for the safe operations within the organization, contingency planning, quality maintenance and overall functions and services which are required to be handled in a due manner.... the documents are usually present in the human resource department and at the same time, part of it can be made available on the website with the due consideration of the fact that the private and company-related important information may not be shared or spread with the outside sources on a public platform such as company's official website....
16 Pages (4000 words) Coursework

Effective Protect Computer Systems from Computer Viruses

There are different categories of computer viruses and they enter computer systems using varied ways and attach to components of a computer's operating and file systems.... COMPUTER VIRUSES Computer viruses are computer software with the ability to replicate themselves and attach themselves to various types of files and computer components and they are developed with the intention of interfering, corrupting, and deleting computer functions and operations (ITLESL....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us