Methodologies VI: Methodology Manifesto

Africana studies has the singular history of being a field that is both personal and academic. It is a field where possibility and malleability reign supreme. For students whose vocational education purposely and systematically excluded the histories, literature, and art of Africana peoples, Africana studies could serve as a second education, a (hopefully) diasporic family history.  For students who have grown up in predominantly white spaces, Africana programs have the capacity to serve as a quest for a reimagined and realized black self. The field has transformative power as it is the reflection of self, the world, and it’s future. However it’s this mixture of the personal and academic that has proved to be both the field’s point of success and failure.

Like many of the scholars who pondered the future of Africana studies, I too feel that Africana studies, as I’ve experienced it, has focused excessively on deconstructing white supremacist and hegemonic thought and practice (Rabaka, Africana Critical Theory). For survey courses in the discipline this focus on deconstruction is not only important but also necessary.  However, the study should move past this stasis. As students plunge deeper into the field, the focus should also deepen. I suggest that courses include the radical thought that is explored in black feminism and womanism, modern articles/videos/and or movements (digital or otherwise), or rarely called upon texts that complicate or reformulate daily black life.

Furthermore Africana study both in survey and major courses need to incorporate an international narrative. Here I do not mean a simple additive course of action that tokenizes Afro-Latino, Afro-European, and African thought (Higginbotham, Designing an Inclusive Curriculum). I mean an infusing of various scholars from these regions at the inception of Africana education. Because Africana studies is the intersection of the personal and the political, American institutions often have ignored or bypassed other texts because they see them as irrelevant to their national narrative. We must not only be cognizant of this failing but also realize that our experiences are a part of a larger dialogue. If Africana studies wishes to continue being the transformative field it is, it must implement this change. This would inhibit our theories from being too Americentric and would encourage future endeavors to truly encapsulate the African diaspora. It would also even cover the aforementioned point of finding new/radical thinkers instead of regurgitation of ‘classic texts’.

And we can’t stop there. As Africana is an interdisciplinary field, its reach should even extend to quantitative data. Similar to Psychological Statistics, an Africana Studies and Statistics course would teach not only the formulation of numbers but also the ways in which statistics are manipulated in various studies in relation to Africana peoples. The class would effectively prepare students to use this quantitative practice in future research, and further integrate Africana studies in other quantitatively drive fields.

Ultimately I’m calling for a breath of new life into the field. An understanding of the passage of time and shortcomings that feeds the future of Africana studies. We need to incorporate black women, international radical thought, quantitative study, digital media, sex and sexuality, and the arts as all necessary and integral subjects to this field. I’m calling for the cessation of additive education in favor of whole-hearted inclusion. For we are not where we were when Africana Studies began. We should no longer centralize white theory and black male radicalism in our work. As we are expanding our community our study should too. We must move past deconstruction in order to build lasting education for our youth.

Word count: 589

Works Cited

Higginbotham, Elizabeth. “Designing an Inclusive Curriculum: Bringing All Women Into the Core,” Words of Fire. Print. The New Press: New York, NY. 1995.  480

Rabaka, Reiland. “Africana Critical Theory: Overcoming the Aversion to New Theory and New Praxis in Africana Studies and Critical Social Theory”.

 

Tags: ,

58,084 Responses to “Methodologies VI: Methodology Manifesto”

  1. saya berterimakasih karena website ini selalu memberikan hal menarik kambing aqiqah jakarta selatan

  2. computertechreviews
    U.S. Critical Infrastructure at Risk from Insider Threats
    You may be organized for threats originating outdoor your business enterprise, but it’s well worth considering how the ones attackers breach your defenses. Some would possibly take advantage of your online platform’s vulnerabilities, and some should use botnet attacks, but an increasing number of security incidents originate with insider threats.

    Although many insider threats are more unintentional than now not, they are able to still pose a first-rate danger on your organisation. However, the intent does no longer count as tons as what you may do to prevent assaults from human vectors. Implementing insider danger prevention will come up with automated prevention and detection gear which could monitor your environment for uncommon activity and advocate your security teams of the risk degree, permitting them to preserve capacity assaults under manage. Insiders threats is likewise becoming a primary reason of cloud-based totally assaults, creating a cloud facts protection software an absolute should for corporations.

    What is an Insider Threat?
    An insider chance is generally an worker or user who, intentionally or accidentally, allows or helps attacks on an organisation’s infrastructure or records. The majority of insider threats are accidental, but they may be just as devastating to an employer as a malicious chance.

    Some commonplace varieties of insider threats encompass:

    Negligent: When customers fail to sign off in their money owed, improperly save statistics, or click on on phishing emails, their mistakes can provide an opportunity for attackers to compromise their credentials or access touchy data. Well-intentioned customers may also email themselves documents to paintings on at home, however this creates many potential vulnerabilities. Attackers may want to locate that information on a much less comfortable domestic network, the employee’s electronic mail can be hacked, or the message may be sent to the wrong person.
    Complacent: Everyone does it. Your IT department tells you to trade your password every 90 days, but you forget. Alternatively, you exchange one character and contact it an afternoon, or you operate a password which you’ve already created for another account. Perhaps you save your agency credentials in the browser of your personal computer. Things like this make it less complicated for you to get right of entry to your money owed; but, they also make it simpler for attackers to get right of entry to your debts. A credential scraping or brute force attack is made a good deal less difficult if there are patterns.
    Malicious: These threats usually come from currently terminated or disappointed employees. They may have financial reasons, however now and again they just want to harm their present day or former organization. While it’s easy to expect that most insider threats are malicious, they are clearly in the minority.
    Insider Threats to U.S. Critical National Infrastructure
    Across 525 important choice-makers for US industries that incorporate country wide infrastructure, the majority file an growth in insider threats. 77% of agencies throughout industries have increasingly seen insider threats due to monetary strain (malicious) and far flung paintings (non-malicious). Malicious actors with a financial motivation are greater not unusual in the monetary sector, but they’re nonetheless inside the minority in all industries.

    Organizations are locating that maximum of the insider threats can be attributed to carelessness or insufficient understanding of safety protocols, and attackers haven’t missed a beat. Many attackers cognizance on social engineering or compromised credential assaults, which allow them to scouse borrow or manage legitimate credentials to serve their own ends.

    These forms of assaults are hard to discover because they use valid money owed. There might be uncommon use patterns or get entry to tries, however without consistent tracking, many companies are none the wiser. For any business enterprise critical to U.S. Infrastructure, this can have extensive impacts. When any such groups goes down, huge agencies of people are affected.

    Managing the Insider Threat
    To mitigate the dangers of insider threats, that’s specifically crucial for companies in infrastructure-associated industries, agencies want to undertake insider hazard prevention and detection strategies. While malicious leaks are not the majority of insider threats, they are able to nevertheless be crippling, so it’s essential that safety groups usually delete accounts and limit get entry to while a person leaves the organization.

    To manipulate the extra benign insiders, organizations ought to not permit any more get right of entry to to any user than what is surely necessary. Training is vital for personnel to understand the effect their complacency or negligence ought to have. They need to in no way electronic mail themselves organization files, and their paintings and private debts ought to usually be completely separated and not using a credentials in common. Data get right of entry to ought to also be monitored to discover any uncommon sports or requests.

    Insider risk detection answers use analytics and device studying to find patterns in records access attempts, which allows them pinpoint uncommon activity and provide you with a warning speedy. Another gain to detection solutions is prioritization, which is computerized to help safety teams work on the maximum vital vulnerabilities. To deal with security compromises efficiently, you need a quick response time, that’s fine accomplished with automated gear.

    Ultimately, insider threats will usually exist, mainly as many agencies are permanently invested in the hybrid or faraway staff. However, to defend critical infrastructure, organizations have to leverage all feasible tools to prevent and take care of attacks. By restricting permissions and the usage of automated gear to facilitate tracking and short detection, your company can get a leg up on insider threats.
    Read More: https://www.computertechreviews.com/

  3. Rupiah89 says:

    Info Agen Slot OnlineRupiah89 Tergacor selalu menawarkan banyak kelebihan serta kemudahan bagi anda semua yang ingin mencoba bergabung dan bermain game slot online terpercaya saat ini

  4. saya kagum dengan artikel ini banyak sekali yang berminat membaca artikel ini paket aqiqah murah di bekasi

  5. Saya akan membagikan ini dengan teman-teman saya. Jasa Penerjemah Jakarta

  6. admin says:

    Many homework on the continual hunt along with offstage on the road to winning. Definitely not attached, simple to-fall as a result of wayside; And not investigation, afterward into a path travel toward the black. gitarrenkurs

  7. Keep up the great work! I’ve read a few of your blog posts and I think your site is very interesting and has a lot of great information.

  8. Amazing stand design company in Germany

  9. Saya akan berbagi ini dengan komunitas saya. aqiqah jakarta pusat

  10. aslibaris says:

    Seeking premier PTE coaching in Brisbane? Our guide offers expert tips and resources to aid your choice. Start here for success!

  11. Di Situs Judi Slot gacor Harvey777 ini Anda bisa memainkan semua permainan tersebut hanya dengan menggunakan satu akun atau satu user ID saja.

  12. abdulmohi506 says:

    I am bawin abdulmohi working for techiesrepublic. PR consultant. With more than 6 years experience in PR and Digital Industry, helping teams to achieve goals by streamilining the process.
    https://www.techiesrepublic.com/ I am bawin abdulmohi working for techiesrepublic. PR consultant. With more than 6 years experience in PR and Digital Industry, helping teams to achieve goals by streamilining the process.

  13. abdulmohi506 says:

    I am bawin abdulmohi working for techiesrepublic. PR consultant. With more than 6 years experience in PR and Digital Industry, helping teams to achieve goals by streamilining the process.
    https://www.techiesrepublic.com/

  14. abdulmohi506 says:

    I am bawin abdulmohi working for techiesrepublic. PR consultant. With more than 6 years experience in PR and Digital Industry, helping teams to achieve goals by streamilining the process.

  15. iBrandox says:

    iBrandox is your trusted website redesign company, dedicated to revitalizing your online identity. Our expert team breathes new life into websites, enhancing their aesthetics and functionality. Choose iBrandox to redefine your digital presence and engage your audience with a fresh and modern design.

  16. Dishwasher Repair Dubai
    1. Repair and maintenance of air conditioners: Washing machine repair Dubai The company offers repair services for domestic and commercial air conditioners. Regardless of whether the air conditioners are out of order or in need of periodic maintenance, they provide a quick and efficient solution.

  17. Fax Repair Company is one of the leading companies in the field of maintenance and repair in the United Arab Emirates. Oven repair Umm Al Quwain‏ The company offers its services in multiple cities including Abu Dhabi and Al Ain, Dubai, Sharjah, Ajman, Umm Al Quwain, and Fujairah.
    Dishwasher Repair Dubai

  18. ucdm says:

    When i propose to her purely top notch in conjunction with dependable facts, thus see the item:

  19. alamin says:

    Scam Phone Number Lookup Leave no stone unturned as you effortlessly unveil crucial details of any suspicious phone number. Stay one step ahead, protect yourself and your loved ones from fraudsters, and reclaim peace of mind. Say goodbye to unwanted scams by quickly identifying those deceitful callers today!

  20. 일본야동 says:

    Great post [url=https://jogegogo.com”]조개모아[/url]! I am actually getting [url=https://jogegogo.com”]무료성인야동[/url]ready to across this information [url=https://jogegogo.com”]무료야동사이트[/url], is very helpful my friend [url=https://jogegogo.com”]한국야동[/url]. Also great blog here [url=https://jogegogo.com”]실시간야동[/url] with all of the valuable information you have [url=https://jogegogo.com”]일본야동[/url]. Keep up the good work [url=https://jogegogo.com”]성인사진[/url] you are doing here [url=https://jogegogo.com”]중국야동[/url]. [url=https://jogegogo.com”]무료야동[/url]

  21. manlybattery says:

    The longevity of a 48V 100Ah lithium battery depends on several factors, including its 48v 100ah state of charge, the rate of discharge, and the specific chemistry of the battery. In general, lithium batteries are known for their durability and long lifespan compared to other battery types, but there are still variables to consider when estimating how long such a battery will last.

  22. upscpdf says:

    Very nice article. Please keep it up good work.

  23. website ini mempunyai banyak sekali informasi menarik, terus update gan jasa penerjemah tersumpah jakarta

  24. BTMAKEHOME says:

    There are fears for survivors in the city, with not enough medicine and clean water for those who have been made homeless. รับ สร้าง บ้าน เชียงใหม่

  25. Saya akan menyarankan ini kepada teman-teman saya. Jasa Penerjemah Jakarta

  26. narsimha says:

    This was very nice and it look good
    Google Cloud Training: Check Google Cloud’s official website for courses and certifications.
    Online Platforms: Look on websites like Coursera, Udemy, edX, and Pluralsight for GCP courses.
    Local Training Institutes: Search for training centers in Hyderabad offering GCP courses.
    Google Developer Groups (GDG): Attend GDG events for GCP-related workshops.
    LinkedIn and Meetup: Network on LinkedIn and Meetup to find GCP training opportunities.
    Corporate Training: Consider customized training programs from Google Cloud partners.
    GCP TRAINING IN HYDERABAD

Leave a Reply

Your email address will not be published.