Free Essay

Male Privilege

In:

Submitted By outlaw187
Words 2957
Pages 12
Male privilege…In black and white
Dorrell Anthony Alexander
Western Washington University

What is “Privilege”? When we speak of privilege, what exactly are we speaking of? Many find it easy to get the basic fundamentals of a “right” and a “privilege” confused, so for foundational purposes, I would like to lay out how they differ. First, let’s talk about two of the different kinds of rights; “natural” and “legal”.
According to Merriam-Webster (2013) Natural rights are “rights which are "natural" in the sense of "not artificial, not man-made”; “as in rights deriving from logic, from human nature, or from the edicts of a god”. They are ”universal”, (they apply to all people, and do not derive from the laws of any specific society),”They exist necessarily, inhere in every individual, and can't be taken away” ( Merriam-Webster, 2013). For example, it has been argued that humans have a natural right to life. They're sometimes called inalienable rights.
Legal rights, in contrast, are “rights based on a society's customs, laws, statutes or actions by legislatures” (Merriam-Webster, 2013). An example of a legal right is the right to vote of citizens. “Citizenship, itself, is often considered as the basis for having legal rights, and has been defined as the "right to have rights"(Broidy and Agnew, 1997), Legal rights are sometimes called civil rights or statutory rights which Broidy and Agnew (1997) believe are “culturally and politically relative”, since they depend on a specific societal context to have meaning. In layman terms, a “right” is something that is due to a person or governmental body by law, tradition, or nature. The pursuit of happiness, for example, is a right defined by human nature. A “privilege” is a special benefit, exemption from a duty, or immunity from penalty, given to a particular person, a group or a class of people. The main difference that I see between these two concepts is that a right cannot be taken away from you because of your bad behavior.(with the exception of certain rights if one is convicted of a felonious crime) Privileges, on the other hand, are things you can lose if you behave badly. There is one type of privilege that has caused untold harm to both men and women, but has not been truly challenged by any social or political movement within our community. The privilege that I am referring to is male privilege.
Male Privilege
“Male privilege is a sociological term that refers quite generally to any special rights or status granted to men in a society, on the basis of their sex or gender, but usually denied to women” (Rothenbegr,2008)). In legal cases alleging discrimination, "sex" is usually preferred as the determining factor rather than "gender", because it refers to biology rather than socially constructed norms which are more open to interpretation and dispute. Although gender and sex are separate concepts, they are interlinked in that gender discrimination often results from stereotypes based on what is expected of members of each sex. According to Rothenberg (2008);

“The word “gender” has cultural and attitudinal characteristics (as opposed to physical characteristics) distinctive to the sexes. That is to say, gender is to sex as feminine is to female and masculine is to male. So, biologically, "male" privilege is only one of many power structures that may exist within a given society. Levels of male privilege differ between societies and can have different contexts within the same society”.

Basically, the term "male privilege" does not apply to a single occurrence of the use of power, but rather describes one of many systemic power structures that are interdependent and interlinked throughout societies and cultures.
Cultural factors regarding male privilege
In every aspect of modern life in politics, the law, the churches, the business world, the schools, and the family, the issue of sexual (sometimes gender) discrimination has grown. A core assumption is that sexuality and sexual behavior are natural outcomes; a simple result of genetics or biology (Broidy, 1997). An alternative view is that sexuality is a social construction, “where men and women are nurtured and encouraged to become appropriate members of the ambient society, as decided by the majority” (Rothenberg, 2010). These assigned gender roles carry with them “packages” of rights and duties. Sex or gender-based differentiation manifests itself differently in different cultural contexts. Rothenberg points out that It is evidenced by the “glass ceiling and the wage gap in Western cultures, genital mutilation, dowry-related violence in Asian cultures, and the sexually exploitative trafficking of women and young girls”.(Rothenberg, 2010).
Male privilege is more than just a "double standard", because it is” based on attitudes or actions that come at the expense of women. Just as white privilege comes at the expense of African Americans and other people of color and gender double standards come at the expense of women” (Rothenberg, 2008). Given the devastating history of racism in this country, one has to understand that getting black men to identify with the concept of male privilege isn't easy. For many black men, the phrase "black male privilege" seems like an oxymoron; three words that simply do not go together.
Black Male Privilege What does "privilege" have to do with Black men? Well, we understand some kinds of privilege. The privilege to call a black man "Boy", even if that black man happens to be 60 years old or older, the privilege to drive a car and never have to worry that the police will racially profile you; privileges that have nothing to do with what a person has earned, but rather are based entirely on who a person is, or what color they are.
As African Americans, we condemn these types of "unearned assets" because we recognize that these privileges come at our expense. We have also learned from social and political movements that have sought to redress these privileges, and academic disciplines that have provided us with the tools to critically examine and explore them. Inviting black men and boys into a conversation about male privilege does not deny centuries of discrimination or the burden of racism that we continue to suffer from today. In the words of J.R. Feagin (2006) “As long as a black man can be tasered 9 times in 14 minutes, shot at 50 times on the morning of his wedding night, or receive less call-backs for a job than a white man with a felony record, we know that racist sexism that targets black men is alive and kicking”.
Intersectionality
The term “intersectionality” refers to “the study of the intersections (meeting points) between different minority groups” (MacMillan Dictionary, 2012). For example, how being a gay woman or a black woman affects the inequalities experienced by women as a whole. Audre Lorde, an admitted “forty-nine-year-old Black lesbian feminist socialist mother of two, and a member of an interracial couple” states; “As white women ignore their built-in privilege of whiteness and define woman in terms of their own experience alone, then women of Color become “other,” the outsider whose experience and tradition is too “alien” to comprehend” ( Lorde, 2010). I believe that this quote spells out the concept of intersectionality perfectly. The division of the races (or genders) tends to lead to different levels of oppression pertaining to privileges that are supposedly allotted to the whole. For instance, can you truly say that a white woman and a black woman are able to enjoy the same privilege? Or that a bisexual or lesbian woman regardless of race, can enjoy the same privileges as the others? The oppressions of each affect the inequalities of the whole. The field of intersectionality has evolved, and many scholars now recognize the ways that race, class, and gender are connected in the lived experience of others besides black women. Yet, there remains a significant blind spot on the part of white liberal feminists as to the way these intersect. For example, the way skin-color and class privilege shape the way white women frame issues of “safety” as a feminist issue, while remaining oblivious to the serious “collateral damage” this issue wreaks on the lives of men of color (and those who love them) who are targets of a vicious criminal justice system.(Broidy and Agnew, 1997) I can’t say that I have not felt the sting of inequality at times when it comes to interracial relationships and the justice system, and have come to view these interactions as a form of systematic oppression. I can never put myself into white skin and undergo sexual reassignment in order to truly confirm my belief, so I can only hypothesize based on experiential learning. Perhaps I would not have been viewed in a certain way if I were in a different environment or social class; I wouldn’t automatically be seen as a “thug” and treated as so, and I wouldn’t see my partner treated with kid gloves when thought to be a victim, but then treated with a sort of “flippant” attitude when it’s found that she is not; almost as if she is being punished or admonished for being with a man of color. The sad reality of all of this is that it isn’t only about race; it’s about class as well.
Oppression
If any random group of human beings had a chance to listen to each other about the reality of their lives at a deep level, it would be clear that most, if not all, of them would say that they had suffered systematic disrespect and mistreatment simply because they had grown up in a particular group in society. According to Jean Harvey,” All people are or have been oppressed— that is, systematically denied equal justice, opportunity, freedom, or the development of their full humanness” (Harvey,1999) This is not to say that all oppressions are equal. Oppression is different for each group, some more damaging and vicious than others. Some groups are coerced or offered "benefits" for playing oppressive roles towards other groups. He goes on to state; “All people have been forced into a more limited life by their societal conditioning. All people have had their share of systematic mistreatment, mis-education, and disrespect that have warped their full humanness” (Harvey, 1999).
Oppression as a system
McDonald and Coleman (1999) say that there are four interrelated faces of any oppression, stating; “We think it helps people understand how oppression is a system, not just prejudice” (McDonald and Coleman, 1999). For example, when most people, including young people, are asked what racism is, they typically say that it is prejudice or discrimination against people of color. This is certainly a part of racism, but only the most visible, personally experienced part.
(1) Ideological Oppression First, any oppressive system has at its core the idea that one group is somehow better than another, and in some measure has the right to control the other group. This idea gets elaborated in many ways--more intelligent, harder working, stronger, more capable, nobler, more deserving, more advanced, chosen, superior, and so on. The dominant group holds this idea about itself. And, of course, the opposite qualities are attributed to the other group--stupid, lazy, weak, incompetent, worthless, less deserving, backward, inferior, and so on.
(2) Institutional Oppression The idea that one group is better than another group and has the right to control the other gets embedded in the institutions of the society--the laws, the legal system and police practice, the education system and schools, hiring policies, public policies, housing development, media images, political power, etc. When a woman makes two thirds of what a man makes in the same job, it is institutionalized sexism. When one out of every four African-American young men is currently in jail, on parole, or on probation, it is institutionalized racism. When gay or lesbian couples are banned from the military, it is institutionalized gay oppression. When young people are excluded from decision-making in almost every area that affects their lives, it is institutionalized oppression of young people, or adultism.
(3) Interpersonal Oppression The idea that one group is better than another and has the right to control the other, which gets structured into institutions, gives permission and reinforcement for individual members of the dominant group to personally disrespect or mistreat individuals in the oppressed group. Interpersonal racism is what white people do to people of color up close--the racist jokes, the stereotypes, the beatings and harassment, the threats, the whole range of personal acts of discrimination. Similarly, interpersonal sexism is what men do to women--the sexual abuse and harassment, the violence directed at women, the belittling or ignoring of women's thinking, the pornography, the sexist jokes, etc. Most people in the dominant group are not consciously oppressive. They have internalized the negative messages about other groups, and consider their attitudes towards the other group quite normal.
(4) Internalized Oppression The fourth way oppression works is within the groups of people who suffer the most from the mistreatment. Oppressed people internalize the ideology of inferiority, they see it reflected in the institutions, they experience disrespect interpersonally from members of the dominant group, and they eventually come to internalize the negative messages about themselves. If we have been told we are stupid and worthless and have been treated as if we were all our lives, then it is not surprising that we would come to believe it. This makes us feel bad. Oppression always begins from outside the oppressed group, but by the time it gets internalized, the external oppression need hardly be felt for the damage to be done. If people from the oppressed group feel bad about themselves, and because of the nature of the system, do not have the power to direct those feelings back toward the dominant group without receiving more blows, then there are only two places to dump those feelings--on oneself and on the people in the same group. Thus, people in any target group have to struggle hard to keep from feeling heavy feelings of powerlessness or despair. They often tend to put themselves and others down, including their own children, in ways that mirror the oppressive messages they have gotten all their lives. Acting out internalized oppression runs the gamut from passive powerlessness to violent aggression.
Where We Go From Here
There is much work to be done to bridge the gender divide. However, given the dynamics of the relationship between dominant and subordinated groups, real and lasting change requires the thoughtful work of the dominant group. In this case, it means that the responsibility for creating lasting change in the culturally-installed patriarchy is the work of men in our society. This important work of extending privilege, power, and influence to women as a group does not require the disadvantaging of men. The work also requires men to self-assess and to address the issues of overt oppression of women.
What Men Can Do
• Recognize and accept the culturally-installed bias toward male privilege, power, and influence.
• Become more aware of the group-level patterns of behavior exhibited by men acting out of their group-level identity.
• Become more aware of your own behaviors and the impact those behaviors have on the people around you.
What Women Can Do
• Make a personal choice to develop your signature capabilities to the maximum degree possible without regard for culturally-installed barriers or obstacles.
• Make a personal choice to fully contribute your signature capability to family, work and community without regard for culturally installed barriers and obstacles.
• Learn to partner with dominant group allies to alleviate the negative impact of culturally-installed oppression on all groups.
• Call out and name those circumstances and instances of gender oppression as they present themselves.
Success in closing the gender gap also requires the partnership of women. This partnership requires women to assert their talent, skills and ability in the home, at work, and in the community at large. It calls on women to point out what is not working in the gender gap, which means not colluding with the patriarchy with silence and the denial that serious problems still exist and must be addressed.

References

Broidy, L., & Agnew, R. (1997). Gender and crime: A general strain theory perspective. Journal of research in crime and delinquency, 34(3), 275-306.
Croteau, J. M., Talbot, D. M., Lance, T. S. and Evans, N. J. (2002), A Qualitative Study of the Interplay between Privilege and Oppression. Journal of multicultural Counseling & Development, 30: 239–258.
Feagin, J. R. (2006). Systemic racism: A theory of oppression. CRC Press.
Harvey, J., & Harvey, J. (1999). Civilized oppression. Lanham, MD: Rowman & Littlefield.
Laws, G. (1994). Oppression, knowledge and the built environment. Political Geography, 13(1), 7-32.
Lorde, A. (2010). Age, Race, Class and Sex: women Redefining Difference. In P.S. Rothenberg (Ed), Race, class, and gender in the United States (pp.663-669). New York; Worth Publishers.
McDonald, P., & Coleman, M. (1999). Deconstructing hierarchies of oppression and adopting a ‘multiple model’approach to anti-oppressive practice. Social Work Education, 18(1), 19-33.
Right,legal. 2013. In Merriam-Webster.com.Retrieved May 27, 2013, from http://www.merriam-webster.com/dictionary/right
Right,natural. 2013. In Merriam-Webster.com.Retrieved May 27, 2013, from http://www.merriam-webster.com/dictionary/right
Rothenberg, P. S. (2005). Beyond borders: thinking critically about global issues. Worth Publisher Rothenberg, P. S. (2008). White privilege. New York; Worth PublishersRothenberg, P.S. (2010), Race, class, and gender in the United states. New York; Worth Publishers | .Walker, A. J. (1993). Teaching about race, gender, and class diversity in United States families. Family Relations, 342-350. |

Similar Documents

Premium Essay

Male Privilege Lewis Analysis

...1) Lewis defines black male privilege as a set of often overlooked and unearned gender-related advantages that centers the experience and concerns of black men to the exclusion of others in the black community, particularly women. Black men often find it difficult to see their privilege because often times they are more focused on where they may be oppressed and underprivileged. Because black men see that they are constantly having issues in society because they are black and women are black as well – they forget they still are slightly above them on the totem poll. In some ways, white feminist and black men are similar in not realizing their privilege because they are both underprivileged in many ways. I do feel as thought white feminist should be able to understand or at least notice the gap in privilege more so than black men just because it’s a stark difference. In order to for black men to become more conscious, they have to understand that they can be oppressed in one light but still less oppressed than another...

Words: 570 - Pages: 3

Premium Essay

My Reaction of White Privilege by Peggy Mcintosh

...“White Privilege” Topic: McIntosh, Peggy “White Privilege” The author made use of the phenomenon of male privilege to bring out the fact that white privilege is similarly denied and unconsciously protected. By describing how male privilege has rooted in our society, and how men denied this phenomenon by avoiding acknowledgement of the issue, the author explained the development of white privilege. According to the author, whites are taught not to recognize their privileges. They are disciplined in a way that they are unable to recognize racism as something that puts them at an advantage while as a result, put others at a disadvantage. They do not realize the existence of unearned skin privilege and therefore do not feel the need to stop it. By identifying the daily experiences granted by their skin privilege, whites can help themselves to reveal this distorted culture. They have to recognize the problem before they can lessen it and work to end it. The most obvious privileges are that white individuals are assumed to be affluence, civilized and morally neutral. The white community is perceived as a group of people who interact pleasantly and peacefully and that their country enjoys a widely represented state and its people enjoy many of its freedom. These perceived and unearned privileges are not only preserved from other people, they are also used as weapons to oppress others. However, even if white individuals do not approve the way which white dominance has been...

Words: 328 - Pages: 2

Free Essay

Linux

...Secure Computing Corporation, Trusted Computer Solutions, and Tresys Technology. Experimental ports of the FLASK/TE implementation have been made available via the TrustedBSD Project for the FreeBSD and Darwin operating systems. SELinux also adds finer granularity to access controls. Instead of only being able to specify who can read, write or execute a file, for example, SELinux lets you specify who can unlink, append only, move a file and so on. SELinux allows you to specify access to many resources other than files as well, such as network resources and interprocess communication. A Linux kernel integrating SELinux enforces mandatory access-control policies that confine user programs and system servers to the minimum amount of privilege they require to do their jobs. This reduces or eliminates the ability of these programs and daemons to cause harm when compromised. This confinement mechanism operates independently of the traditional Linux access control...

Words: 1252 - Pages: 6

Premium Essay

Linux Security Basics

...Linux Security Basics Security is always at the top of the list when setting up a network and also administering a network. Linux is an operating system that can be easily obtained over the internet due to its open source distributions. Linux is one of the most secure operating systems because of having less use than Windows for the end user. There are several security technologies in Linux that can be implemented into a network. The three technologies that I will be discussing are SELinux, chroot jail, and iptables. SELinux was developed by the National Security Administration in an effort to incorporate a strong, flexible mandatory access control architecture into the major subsystems of the Linux kernel. The NSA recognized that operating system security is critical at higher levels. It provides a tool to enforce the separation of information based on the confidentiality and integrity requirements. This helps when addressing threats of tampering and bypassing of application security. It also assists in the isolation of damage that is caused by malicious software or damaged applications. SELinux uses the Flux Advanced Security Kernel which contains components that provide support for enforcing many kinds of MAC policies like type enforcement, role-based access control, and multilevel security. The Linux kernel that is implementing SELinux enforces MAC policies that limit the user programs and system servers to only what they need to complete the job. When a limit...

Words: 1313 - Pages: 6

Premium Essay

It302 Research #1

...IT302 Linux Administration Research #1 I researched three Linux security technologies which are, SELinux, chroot jail and iptables. As you read into this research you will see that they are split up into their own catagories so that it is easy to read information on whichever topic you would like. SELinux As part of its Information Assurance mission, the National Security Agency has long been involved with the computer security research community in investigating a wide range of computer security topics including operating system security. Recognizing the critical role of operating system security mechanisms in supporting security at higher levels, researchers from NSA's National Information Assurance Research Laboratory have been investigating an architecture that can provide the necessary security functionality in a manner that can meet the security needs of a wide range of computing environments. End systems must be able to enforce the separation of information based on confidentiality and integrity requirements to provide system security. Operating system security mechanisms are the foundation for ensuring such separation. Unfortunately, existing mainstream operating systems lack the critical security feature required for enforcing separation: mandatory access control. As a consequence, application security mechanisms are vulnerable to tampering and bypass, and malicious or flawed applications can easily cause failures in system security. The results of several...

Words: 1295 - Pages: 6

Premium Essay

Chapter 13

..............................................................3 I. Exploiting XP .........................................................................................................................................................4 II. Exploiting Ubuntu ...............................................................................................................................................20 Summary ......................................................................................................................................................................39 1 CHAPTER 13 2 CHAPTER 13 Introduction In the post-exploitation phase, we will look at information gathering on the exploited systems, privilege escalation. Perhaps we’ll find that we can access sensitive data stored on the exploited system. Maybe the exploited system is part of a domain, and we can use it to access other systems on the domain. These are just a few of the potential avenues open to us in post exploitation. Post exploitation is arguably the most important way to get a clear picture of a client’s security posture. 3 CHAPTER 13 I. Exploiting XP Kalis IP Address 4 CHAPTER 13 Windows XP IP Address 5 CHAPTER 13 Starting metasploit 6 CHAPTER 13 Stablished link again from lab 8 to continue this lab 7 CHAPTER 13 Showing help upload 8 CHAPTER 13 Uploading file to C: drive 9 CHAPTER 13 Showing name...

Words: 857 - Pages: 4

Premium Essay

Reserch Assignment 2.1

...understand what they are and who designed them and what good they are for you to use them. In the next paragraphs you will be able to decide which one is for you and more about the use of them. Under the GPL in late 2000 SElinux was released from the National Security Agency’s Office of Information Assurance. More recently it was developed by the open source community with the help of NSA. SElinux currently ships as a part of Fedora Core, and it’s supported by Red Hat. Also there are packages that exist for Debian, SuSe, and Gentoo although at this time these were unsupported by anyone. SElinux is based on the concept of Mandatory Access Control. Under MAC, administrators control every interaction on the software of the system. A least privilege concept is used, by default applications and users have no rights, because all rights have to be granted by an administrator because of the system’s security policy. Under DAC, the files are owned by the user also that user has full control over them. If an attacker penetrates that user’s account they can do whatever with the files owned by that user. Standard UNIX permissions are still present on the system, and will be consulted before the SElinux policy during access attempts. If the standard permissions deny access the access is denied so therefore SElinux is not involved. When the standard file permissions do allow access, the SElinux policy will be consulted and access is either gained or denied based on the security contexts of...

Words: 938 - Pages: 4

Premium Essay

Lunix

...are used to configure TCP Wrappers? host.allow and hosts.deny (e) What keyword in TCP Wrappers matches any daemon or client? All or Exact (f) Given the following entry in TCP Wrappers what will happen when a client address 172.16.24.100 tries to access a Web site running on this server? The IP matches both the access and deny hosts files. It will be allowed access because it matches the first hosts file that is checked. (g) What is a chroot jail? It is a process with a root directory other than /. Say you run a process or program and specify its root as /home/sam/jail, it would have no knowledge of any files above /home/sam. Jail is the root directory. (h) When might a chroot jail not work? Running a chroot utility with root privileges, and also using su or sudo programs. Those are compiled for Fedora/REEL and they call PAM, you would have to modify the source so it does not call PAM. Either one could lead to an unsecure jail. (i) What is the name of the kernel component that uses the iptables rules to filter network traffic? Netfilter 2. Create an iptables rule that will block all traffic from 10.14.34.207 and not let the sender know that the traffic was blocked. #...

Words: 345 - Pages: 2

Premium Essay

Linux

...Chapter 18 Exercises 1.What is the difference between the scp and sftp utilities? copies file to and from a remote system SFTP is the same but is secure 2.How can you use ssh to find out who is logged in on a remote system? Assuming you have the same username on both systems, the following command might prompt you for your password on the remote system; it displays the output of who run on host: $ ssh host who 3.How would you use scp to copy your ~/.bashrc file from the system named plum to the local system? $ scp ~/.bashrc zack@plum: 4.How would you use ssh to run xterm on plum and show the display on the local system? Assuming you have the same username on both systems and an X11 server running locally, the following command runs xterm on plum and presents the display on the local system: $ ssh plum xterm You need to use the –Y option if trusted X11 forwarding is not enabled. 5.What problem can enabling compression present when you are using ssh to run remote X applications on a local display? When using compression latency is increased and the outcome is always undesirable slower speeds, and data interruption. 6.When you try to connect to a remote system using an OpenSSH client and you see a message warning you that the remote host identification has changed, what has happened?What should you do? This message indicates that the fingerprint of the remote system is not the same as the local system remembers it. Check with the remote system’s...

Words: 1325 - Pages: 6

Premium Essay

Linux

...still have to reference hard-coded mappings between IP addresses and host names 4. What does the /etc/resolv.conf file do? The /etc/resolv.conf file is the resolver configuration file. It provides access to DNS for Internet address resolution. The nameserver line indicates which systems the local system should query to resolve hostnames into IP addresses, and vice versa. 5. How would you mount an ISO image so that you could copy files from it without burning it to a CD? $ mount -t -o loop image.iso /mnt/image 6. Why are setuid shell scripts inherently unsafe? A normal user acquires root priveleges. So, those commands are dangerous. 7. Some older kernels contain a vulnerability that allows a local user to gain root privileges. Explain how this kind of vulnerability negates the value of a chroot jail. 8. What does FIFO stand for? First in first...

Words: 305 - Pages: 2

Premium Essay

Linux Technology

...understand what they are and who designed them and what good they are for you to use them. In the next paragraphs you will be able to decide which one is for you and more about the use of them. Under the GPL in late 2000 SElinux was released from the National Security Agency’s Office of Information Assurance. More recently it was developed by the open source community with the help of NSA. SElinux currently ships as a part of Fedora Core, and it’s supported by Red Hat. Also there are packages that exist for Debian, SuSe, and Gentoo although at this time these were unsupported by anyone. SElinux is based on the concept of Mandatory Access Control. Under MAC, administrators control every interaction on the software of the system. A least privilege concept is used, by default applications and users have no rights, because all rights have to be granted by an administrator because of the system’s security policy. Under DAC, the files are owned by the user also that user has full control over them. If an attacker penetrates that user’s account they can do whatever with the files owned by that user. Standard UNIX permissions are still present on the system, and will be consulted before the SElinux policy during access attempts. If the standard permissions deny access the access is denied so therefore SElinux is not involved. When the standard file permissions do allow access, the SElinux policy will be consulted and access is either gained or denied based on the security contexts of...

Words: 940 - Pages: 4

Premium Essay

Racism

...Focus on Pellow's discussion of stakeholders and ways in which companies maneuver to obtain approval and minimize opposition. How do these strategies connect to "colonial" hierarchies and institutionalized racism? As Pellow states, the causes of environmental injustice referenced in the scholarly literature include institutional racism in housing… and the exclusion of low-income individuals and people of color from the dominant environmental movement” (Pellow, 13). And the environmental inequality is a social process involving and impacting many stakeholders, such as social movement organizations, private sector firms, the state, residents, and workers. “When different stakeholders struggle for access to valuable resources within the political economy, the benefits and costs of those resources become distributed unevenly” (Pellow, 14). Which means that, those stakeholders with less power suffers from environmental inequality, such as living and working under dangerous conditions; those stakeholders with greater power are able to deprive other stakeholders. Thus, workers and residents with minimal political power are the most vulnerable to environmental inequality. In order to obtain approval and minimize opposition, companies adopt many strategies, which are connected to "colonial" hierarchies and institutionalized racism. “Throughout history, one of the most effective ways of controlling a colony was to create hierarchies (or intensify existing ones) between social classes...

Words: 373 - Pages: 2

Premium Essay

Gender Psychology Research Paper

...identity are interchangeable. It is important to educate people in the clear definitions of these terms since, contrary to popular belief, they are not in any way at all interchangeable. The main difference that seems difficult to understand is the difference between sex and gender. As a sexually dimorphic society, we recognize differences between sexes. Sex is determined by the biology we are born with and is sorted into either of two strict pillars according to our genitalia - male or female. Gender is a socio-cultural construct that assigns certain roles, stereotypes and expectations to each sex. Humans with female characteristics are “girls” or “women” and humans with male characteristics are “boys” or “men.” The terms sex and gender are not interchangeable at all. When we are born, doctors assign our sex to correspond with what they see. When our gender does not align to our physical appearance, bewilderment ensues. Its important to shine light on the existence of other genders, not just female and male. When a child is born, a quick glance between the legs determines the gender label that the child will carry for life. Since birth we are taught how we should act according to our culture’s constructs and norms. Pink clothes for the newborn baby girl and blue clothes for the newborn baby boy. When our internal gender identity does not find a place to fit in within the two acknowledged genders, we become confused. Gender identity is a person's private sense and subjective experience...

Words: 880 - Pages: 4

Premium Essay

The Bell

...ever there were one, but is The Bell Jar a feminist novel? There are some feminist innuendoes. Jay Cee is a heroic feminist figure, named by her initials in the American business fashion and in her 'strict business suit' and 'luncheon ticket hat'. She has 'brains' to make up for her 'plug-ugly' looks in comparison with the archetypal male Buddy Willard who is 'stupid' although he can 'get good marks all right'. And there is an implied resentment that men have certain privileges denied to women. Only a boy baby may have the privilege of peeing in a doctor's face. Teresa, Dr Quinn and Dr Nolan can be doctors and Joan can aspire to be a psychiatrist but only Dr Gordon can charge twenty-five dollars an hour. Esther could have taken a medical degree if she had not 'dodged chemistry' but her degree in English is of no value without a knowledge of shorthand to enable her to be an acolyte of a man. Esther would have liked to have been a translator but her brother is the one allowed to go to Germany to learn the language. Only in the liberalised Soviet Union can we find a woman translator. An exceptional occasion where a woman is allowed into a male domain is where Buddy Willard, suffering from the aftermath of T B, is unable to perform the masculine task of shovelling snow and Esther is obliged to perform the task for him. The case for women being...

Words: 995 - Pages: 4

Premium Essay

Male Entitlement Research Paper

...Male entitlement. Oh what a wonderful privilege. Throughout history men have been bestowed with wonderful blessings and liberties that have not been afforded to women. In recent times, the playing field has leveled off quite a bit, but one aspect that has not changed, is the self-assured entitlement of men. Now before I scare too many of you off with that rather blunt statement, I must stay that I recognize the progressive changes that have already been made and that as with any gender topic, it is dangerous to make widespread generalizations about one gender. But I must also argue that it is naive to ignore the fact that male entitlement is a concerning and pervasive issue in our society. I’d also like to recognize that yes male entitlement...

Words: 871 - Pages: 4