Exploiting the exploiter: some violations of society’s expectations in Beyond the Horizon and The Housemaid
This paper does a critical reading of Beyond the Horizon and The Housemaid and observes that the author, Amma Darko, seeks primarily to challenge prevailing and traditional views of motherhood held by African societies; i.e. motherhood and its associated activities such as caring, training and dis...
| Main Authors: | Marfo, Charles Ofosu, Yeboah, Philomena Abeka, Bonku, Lucy |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Pusat Pengajian Bahasa dan Linguistik, FSSK, UKM
2015
|
| Online Access: | http://journalarticle.ukm.my/8495/ http://journalarticle.ukm.my/8495/1/7884-22956-1-PB.pdf |
Similar Items
Exploitation and surplus
by: O'Hara, Phillip
Published: (2008)
by: O'Hara, Phillip
Published: (2008)
Black hole horizons at the extremal limit in Lorentz-violating gravity
by: Franchini, Nicola, et al.
Published: (2017)
by: Franchini, Nicola, et al.
Published: (2017)
Exploiting the photochemistry of the quinones
by: Mitchell, Lorna, J.
Published: (2016)
by: Mitchell, Lorna, J.
Published: (2016)
Nuclear weapons and intergenerational exploitation
by: Rendall, Matthew
Published: (2007)
by: Rendall, Matthew
Published: (2007)
Non-identity, sufficiency and exploitation
by: Rendall, Matthew
Published: (2011)
by: Rendall, Matthew
Published: (2011)
Exploiting structure in integer programs
by: Mareček, Jakub
Published: (2012)
by: Mareček, Jakub
Published: (2012)
Model hijacking exploitation and mitigation
by: Chew, Zi Ying
Published: (2024)
by: Chew, Zi Ying
Published: (2024)
Beyond abundance and biomass: Effects of marine protected areas on the demography of a highly exploited reef fish
by: Taylor, B., et al.
Published: (2010)
by: Taylor, B., et al.
Published: (2010)
Exploiting unexpected situations in the mathematics classroom
by: Foster, Colin
Published: (2014)
by: Foster, Colin
Published: (2014)
Designing for the commercial exploitation of online identity
by: Emmanouil, Dialechti Christina
Published: (2017)
by: Emmanouil, Dialechti Christina
Published: (2017)
Exploitation of migrant workers : its forms
by: Eishan Jan, Mohammad Naqib
Published: (2013)
by: Eishan Jan, Mohammad Naqib
Published: (2013)
RPC/DCOM exploits detection and notification
by: Halim, Ayub
Published: (2005)
by: Halim, Ayub
Published: (2005)
Biomechanical application: exploitation of kinect sensor
by: Nizam, Yoosuf, et al.
Published: (2017)
by: Nizam, Yoosuf, et al.
Published: (2017)
A critical study on the abuse of the housemaids in Malaysia / Dorine Patrick…[et al.]
by: Patrick, Dorine, et al.
Published: (2011)
by: Patrick, Dorine, et al.
Published: (2011)
Exploiting an oil palm EST database for the development of gene-derived SSR markers and their exploitation for assessment of genetic diversity.
by: Singh, Rajinder, et al.
Published: (2008)
by: Singh, Rajinder, et al.
Published: (2008)
Not in violation of law
by: Ramendran, Charles
Published: (2023)
by: Ramendran, Charles
Published: (2023)
Children exploitation in John Burnside's The Dumb House
by: Aldhafeeri, Hilalah, et al.
Published: (2015)
by: Aldhafeeri, Hilalah, et al.
Published: (2015)
Exploitation of fungal sex for biotechnology and disease control
by: Ashton, George David
Published: (2019)
by: Ashton, George David
Published: (2019)
Exploiting internal pressurisation to enhance structural properties
by: Polenta, Valerio
Published: (2017)
by: Polenta, Valerio
Published: (2017)
Team ambidexterity: Resolving the exploration-exploitation paradox
by: Klonek, Florian, et al.
Published: (2018)
by: Klonek, Florian, et al.
Published: (2018)
Australia and the Secretive Exploitation of the Chatham Islands to 1842
by: Brett, Andre
Published: (2017)
by: Brett, Andre
Published: (2017)
Exploitation of national or local workers and the liability of the employer
by: Ali Mohamed, Ashgar Ali
Published: (2012)
by: Ali Mohamed, Ashgar Ali
Published: (2012)
Exploitation of national or local workers and the liability of the employer
by: Ali Mohamed, Ashgar Ali
Published: (2013)
by: Ali Mohamed, Ashgar Ali
Published: (2013)
Exploitation and new orientalism in
Sam Kadi’s the citizen
by: Hanan Alaklook,, et al.
Published: (2016)
by: Hanan Alaklook,, et al.
Published: (2016)
Exploiting side information in locality preserving projection
by: An, Senjian, et al.
Published: (2008)
by: An, Senjian, et al.
Published: (2008)
Exploiting monge structures in optimum subwindow search
by: An, Senjian, et al.
Published: (2010)
by: An, Senjian, et al.
Published: (2010)
Exploiting acetogenic bacteria for sustainable production of chemicals
by: Poulalier Delavelle, Margaux
Published: (2023)
by: Poulalier Delavelle, Margaux
Published: (2023)
Sustainable development from resource exploitation perspective
by: Abd. Rashid Ahmad,, et al.
Published: (1999)
by: Abd. Rashid Ahmad,, et al.
Published: (1999)
Crop breeding: exploiting genes for food and feed
by: Saleh, Ghizan
Published: (2009)
by: Saleh, Ghizan
Published: (2009)
Industry preparedness : advanced learning paradigms for exploitation.
by: Rahimian, Farzad Pour, et al.
Published: (2012)
by: Rahimian, Farzad Pour, et al.
Published: (2012)
Modelling, Detection And Exploitation Of Lexical Functions For Analysis.
by: Schwab, Didier, et al.
Published: (2007)
by: Schwab, Didier, et al.
Published: (2007)
Intrinsic honesty and the prevalence of rule violations across societies
by: Gaechter, Simon, et al.
Published: (2016)
by: Gaechter, Simon, et al.
Published: (2016)
Perceptions of the appropriate response to norm violation in 57 societies
by: Eriksson, K., et al.
Published: (2021)
by: Eriksson, K., et al.
Published: (2021)
Functional redundancy of necrotrophic effectors – consequences for exploitation for breeding
by: Tan, Kar-Chun, et al.
Published: (2015)
by: Tan, Kar-Chun, et al.
Published: (2015)
Building Nanoscale Molecular Wires Exploiting Electrocatalytic Interactions
by: Ponce, I., et al.
Published: (2015)
by: Ponce, I., et al.
Published: (2015)
Exploiting UAV as NOMA based relay for coverage extension
by: Zaidi, Syeda Kanwal, et al.
Published: (2019)
by: Zaidi, Syeda Kanwal, et al.
Published: (2019)
Patterns of wildlife exploitation in the Ugalla ecosystems of Western Tanzania
by: Ngure, Paulo Wilfred
Published: (2012)
by: Ngure, Paulo Wilfred
Published: (2012)
Anisotropic Assembly of Colloidal Nanoparticles:
Exploiting Substrate Crystallinity
by: Hayton, JA, et al.
Published: (2007)
by: Hayton, JA, et al.
Published: (2007)
Exploiting trypanosomes as models for pathogenicity and core biology research
by: Awuah-Mensah, Georgina
Published: (2021)
by: Awuah-Mensah, Georgina
Published: (2021)
Industrial exploitation of supercritical carbon dioxide as a solvent
by: Haddleton, Alice J.
Published: (2020)
by: Haddleton, Alice J.
Published: (2020)
Similar Items
-
Exploitation and surplus
by: O'Hara, Phillip
Published: (2008) -
Black hole horizons at the extremal limit in Lorentz-violating gravity
by: Franchini, Nicola, et al.
Published: (2017) -
Exploiting the photochemistry of the quinones
by: Mitchell, Lorna, J.
Published: (2016) -
Nuclear weapons and intergenerational exploitation
by: Rendall, Matthew
Published: (2007) -
Non-identity, sufficiency and exploitation
by: Rendall, Matthew
Published: (2011)