Got a tricky question? Receive an answer from students like you! Try us!

Ties that constrict:English as a Trojan Horse - Essay Example

Only on StudentShare
Author : ffunk


Subject: Essay, Business Date: Topic: Ties that Constrict: English as a Trojan Horse Trojan Horse, a program that is apparently desirable but in the real sense contains something harmful. The advocates of English language and the colonial powers that try to impose this language on the developing countries and the world at large are implementing a cleverly conceived plan to continue with their hegemony overtly or covertly…

Extract of sample
Ties that constrict:English as a Trojan Horse

As Gauri Viswanathan and others have made it amply clear, the study of English was central to Britain’s rule of India, purposefully aimed, in Lord Macaulay’s infamous words, “to form a class who may be interpreters between us and the millions whom we govern; a class of persons, Indian in blood and color, but English in taste, in opinions, in morals, and in intellect.” (Viswanathan) That which was imposed by force, should be given the treatment that it deserves. This language has eroded the cultural traditions of the countries, where colonists ruled and dominated once. Do not accept English language uncritically. Resist it at every stage. What I mean is if the local language can be used for a particular project, do it by all means and encourage such usage. The native culture and the native languages must be protected, given opportunities for their growth at all times, and at all costs. The development of English should not be at the cost of devaluation of local languages and cultures. Language and political power are closely interrelated. Global use of English is the direct outcome of globalization in trade and commerce and it has turned out to be the important construct of neocolonialism. ...
Download paper

Related Essays

IPad's Security Breach
This report is concerned with understanding the practice of hackers and justification of their act and also how companies can deal with security issues like this for a more secured approach to maintain the privacy of individuals. 1. Determine if hacking into a Web site is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details. Hacking is the technique of acquiring information or modification of data from a system or website. Hacking involves several purposes and it’s not always an illegal issue for…
5 pages (1255 words)
Cross-cultural business issues
Most of them concentrate more on basic commodities, and luxuries such as extra hard engines may have a poor market penetration. The national language is Chinese, and very few people understand English. This makes communication between the marketers and the Chinese nationals difficult. Translations from English to Chinese may lose some of the intended meaning and impact (Emery and Tian, 2010). Chinese people have a slow decision making and response tradition. They have to scrutinize every detail before making their judgment. The marketers take long before getting the response, which slows down…
3 pages (753 words)
The article suggests that ,Vogan firm assisted an accused named Julian Green , who is arrested for storing child pornography images on PC to go free . According to Montaldo ,(2013)“Almost all pedophiles have a collection of pornography, which they protect at all costs. Many of them also collect "souvenirs" from their victims. They rarely discard either their porn or collections for any reason”. At the Julianne Green's home enormous numbers of child porn images were found, which led to the accusation of being a pedophile. The images stored in his computer were a firsthand proof to the…
4 pages (1004 words)
Systems and Operations Management
The main importance of such strategies is to ensure that the relationship with customers is enhanced in order to improve the processes of sales and marketing. Nonetheless, the lack of or presence of internet security is likely to be a major topic of discussion among different countries as well as in a large number of corporations (Peng, 2008). Part One: Option 4 Summary of the text; Achieving Operational Excellence and Customer Intimacy Technology has been extensively applied in transforming the shape of marketing as is used in different organizations. However, with the development and…
8 pages (2008 words)
In the United Kingdom the big four supermarkets of Tesco, Asda, Sainsbury's and Wm Morrison have gained a steadily increasing
In recent time some of the retail giants of United Kingdom like Sainsbury, Asda, Morrisons and Tesco have been accused of swindling the suppliers by paying them the bottom prices or finding some other way by which they can pressurise the suppliers to pay the cost of the unsold or perished goods. There are also other ways by which the suppliers are exploited that includes paying lower than the agreed price after the delivery of the order, delaying to pay them, make changes in the order at the last moment, making the suppliers to bear the cost, forcing the supplier to use certain specific…
8 pages (2008 words)
Industrial Law
How can a nation with thousands of years of history out of which just a short while ago she ruled the waves draw lessons conclusively from a nation born out of Britain's own bosom only few centuries ago notwithstanding the bloody conception…
10 pages (2510 words)
Issues In Financial Reporting
IASC has seven members which "have formal liaison responsibilities with the national standard-setters in their respective countries" (Carrol and Dixon, 2003). These countries are the United States, Canada, the United Kingdom, France, Germany, Japan, Australia and New Zealand (the last two being represented by the same liaison member).…
8 pages (2008 words)