Verified Document

Personal Privilege Analysis Key Points. Essay

We are dealing from a state of constant change and he writes like we're standing still. He's got us doing algebra when we should be doing calculus. The second point I find interesting in this chapter is the advice he offers (from another writer). Some of that advice is good, but some is bizarre. For example we can take to heart "don't make assumptions" or "please don't ask me to speak for my people" -- that is sound advice. But "don't be scared of my anger" assumes that anger is positive and productive. That has never been the case -- anger is negative and sometimes it is necessary, but anger directed at an individual for a societal problem is exactly why people get defensive. Blaming an individual for society is just as stupid as asking somebody to speak for their society.

In my personal life, I can see each of the things he talks about. Some are mistakes people make, some are little things we could do, but sometimes...

The latter is especially sad but I can see myself making mistakes like that.
The question I would ask is why baby steps? The author spends all this time (8 chapters) building motivation and then seems to let people off the hook with small efforts. I understand that small things can sometimes lead to big things, but should not the realization that one is part of a system of privilege and oppression lead to the desire to make significant change. The reader of this book, after all, is going to have to influence dozens of people who have not been exposed to these ideas. Why the small changes? The author should push for big changes to match the rest of the book's passion and energy. If privilege and oppression are so bad, don't let anybody off the hook so easily.

Cite this Document:
Copy Bibliography Citation

Related Documents

Personal Privilege Analysis the First
Words: 3245 Length: 7 Document Type: Term Paper

I guess at this point he is losing me a bit. The core concept is still that privilege is about controlling access to resources and using physical traits (the first rung of the diversity wheel) as the most powerful means of doing that. I just find that it is hard to see the point he is trying to make in this chapter because he is pretending that there is

Personal Privilege Analysis in the
Words: 1596 Length: 5 Document Type: Term Paper

4. I'd like to ask Johnson if the thinks it is possible to ever fully get rid of prejudice. 1. In chapter 5, Johnson begins to lay the groundwork to get rid of the problems -- and complications -- of privilege in earnest. His basic starting point is simple, and seems to make sense. The key to addressing the issue of privilege is to engage both groups, those which have been

Analysis TechFite Case Study
Words: 2134 Length: 7 Document Type: Analysis

11TechFite Case StudyNameCourseInstitutionTutorSubmission DateContentsA. Application of the Law 21. Computer Fraud and Abuse Act (CFAA) and the Electronic Communications Privacy Act (ECPA) 2Computer Fraud and Abuse Act (CFAA) 3Electronic Communications Privacy Act (ECPA) 32. Laws, Regulations, or Legal Cases Justifying Legal Action for Negligence 4i. General Data Protection Regulation (GDPR) 4ii. Federal Trade Commission (FTC) Act – Section 5 4iii. Restatement (Second) of Torts – Duty of Care 53. Instances

Hispanic Male Perception Key Words
Words: 5433 Length: 20 Document Type: Research Proposal

.. hungry, cold.... The big problem is poverty. I spend 50% of my time taking care of them other than teaching, and this includes downtime because of behaviors such as fistfights, tantrums, aggression. (Harry, Klingner & Hart, 2005, Research and design section ¶ 8) Hispanic Males//Females Educational Pursuits Although Hispanic females frequently outperform Hispanic males, cultural values that limit the range of school choices and career paths, frequently restrict the females to

SL/https De-Encryption SSL/https is Widely
Words: 17577 Length: 63 Document Type: Dissertation

This is however, not considered foolproof. It is possible to break the security by a person having adequate technical expertise and access to the network at hardware level. In view of this the SSL method with right configuration is considered perfectly sufficient for all commercial purposes.5In order to safeguard the data while in transit it is customary to adopt a practical SSL protocol covering all network services that use

John Mill and De Beaviour
Words: 2292 Length: 6 Document Type: Term Paper

In other words De Beauvoir sees the opportunity of secretary, shop girl, teacher, or nurse as wholly unlikely to offer women a real sense of independence and will likely continue to be treated as temporary positions held until the woman is married, at which time she will likely give up this vocation (surrender her body) and tend to a family. Mill like De Beauvoir speaks of the extreme vocation of the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now