SlideShare a Scribd company logo
1 of 11
1
Week 4 Rough Draft
Merrissa Hicks
Walden University
12/23/2019
Introduction
The study of social movement reflects the social issues in
different periods have faced. This work will focus on the
Abolition Movement and the Lesbian, gay, bisexual, and
transgender (LGBT) social movements. Social movements are a
result of general public consensus towards dealing with major
social issues in the community.
I will discuss the historical background and ideals that
supported the development of the Abolition Movement and the
Lesbian, Gay, Bisexual and Transgender (LGBT) Social
Movement. This is intended to show the correlation between
their emergence and the key social issues that the community
faced.
The Abolition movement
The Abolition movement was jumpstarted with the effort of
ending slavery in America. It held that all people are created
equal, and hence the practice of slavery was unacceptable. This
movement existed in the 19th century when many people started
publicly displaying dissatisfaction for the slavery practices in
the country. It placed more pressure on the authorities to outlaw
slavery (Martos, Wilson & Meyer, 2017). It would allow for
increased debate about segregation and discrimination.
Slaved men and women worked on large agricultural farms as
maids. Their life was brutal; they were subject to severe
punishments and strict racial rules and policies. With time they
opposed slavery through daily acts like antislavery movements.
The basis of this movement was that all men were created equal
and hence, the effort to emancipate slaves (Martos, Wilson &
Meyer, (2017).
Abolitionists managed to integrate religion and moral
movement, that focused on the acceptance that everyone was
equal before the eyes of their creator and later on became
political. Antislavery societies were formed by various churches
to create awareness of evil effects of slavery (Lysack, 2012).
American Colonization Society (founded 1817) was first
movement to abolishing slavery but was greatly opposed since it
was seen as unfair to send Black Americans from their
motherland to Africa.
The American Antislavery Society was founded in 1833 by
prominent leaders, such as William Lloyd Garrison David
Walker and Frederick Douglass (Black Abolitionist) strongly
opposed slavery in their publications (Pepin-Neff & Wynter,
2019). These publications disputed against slavery as anti-social
and immoral and repeatedly used illustrations of African -
American literatures and other accomplishments to outline that
the Africans and their offspring had ability to learn like
Americans, if granted freedom.
The abolition movement was politicized. The Native American
Party opposed slavery as well immigrants. Thus, other parties
like Free Soil and Whigs did so. They merge together in 1856
leading to election of Abraham Lincoln as president in United
States (Lysack, 2012).
The abolitionists continued to pressurize the administration of
Lincoln to terminate slavery. It took the 13th Amendment to
lastly end involuntary enslavement in 1865. Even though the
abolitionist movement never attained a truly great following.
Garrison, Douglass and their team never gave on the issue of
slavery and race thus creating to the tension which led to war.
Lesbian, Gay, Bisexual and Transgender (LGBT) Social
Movement
The Lesbian, gay, bisexual and transgender (LGBT) social
movement was initiated with the interest of providing the LGBT
with same movements as heterosexual individuals in the society.
(Lysack, 2012). This movement was started to end homophobic,
trans-phobic and bi-phobic attitudes that prevented individual in
this category to live comfortably in the society (Lysack, 2012).
Notable successes of this movement are that it has managed to
achieve legality of gay marriages (Lysack, 2012).
Regardless, this movement continues to have challenges,
especially on the international front, where certain cultures fail
to recognize these laws. For many generations, people
categorized as LGBT were shunned and discriminated
against.This movement intended to overcome these limitations
set on the community members.
It was motivated by the need to end widespread homophobic,
transphobic and biphobic attitudes in the American community
(Lysack, 2012). LGBT people who create social movement to
fight for their right. Currently, LGBT social movements are
organized to include cultural activities.
Like research, street marches, social groups and art as well as
politics, they celebrate their rights. They are proud for who they
keep fighting for their rights. Their political aim is to change
laws and policies to gain new rights, protection from harm and
benefits (Pepin-Neff & Wynter, 2019).
There is a rise of conflict within and between LGBT social
actions, arguing who should be included in their movement and
change of strategies (Lysack, 2012). There is discussion on
what magnitude should gays, transgender, lesbians, bisexuals
and intersex individuals are required to merge.
Influential of the gay and lesbians’ movement initially wanted
to hide manly lesbians, transgender persons, feminine gay males
and bisexuals from publicity. This created internal separations
within LGBT societies (Pepin-Neff & Wynter, 2019). They
have adopted politics which offer them freedom and see
themselves as a minor group in the society.
The relationship between the Abolition and LGBT Movements
The two movements are united by a long history of anti-slavery
and marriage laws that did not favor the two minority groups. In
essence, abolitionist’s success had an impact on other minority
groups such as the LGBT community. Also, their successes
emboldened their quest for more rights.
The win against discriminatory laws emboldened the
abolitionists to seek for more discussion about the need to
abolish laws that governed segregation (Lysack, 2012). Hence,
the successes of the two movements inspired a devotion to a
society free from all forms of discriminatio
Conclusion
The campaign movement continues to have challenges,
especially on the international front, where certain cultures fail
to recognize these laws. Each of these social movements has
had an essential role in addressing human rights violations
which is an aspect I would explore more in the final research
process.
For many generations, people categorized as LGBT were
shunned and discriminated against. This movement intended to
overcome these limitations set on the community members. It
was motivated by the need to end widespread homophobic,
transphobic and biphobic attitudes in the American community
(Lysack, 2012).
It is interesting to observe these roles that these social
movements played in American history. It is especially
interesting to know how each relates to the social issues that
affected the American public at different times in the country’s
history.
References
Lysack, M. (2012). The abolition of slavery movement as a
moral movement: Ethical resources, spiritual roots, and
strategies for social change. Journal of Religion & Spirituality
in Social Work: Social Thought, 31(1-2), 150-171.
Martos, A. J., Wilson, P. A., & Meyer, I. H. (2017). Lesbian,
gay, bisexual, and transgender (LGBT) health services in the
United States: Origins, evolution, and contemporary landscape.
PloS one, 12(7), e0180544
Pepin-Neff, C., & Wynter, T. (2019). The Costs of Pride:
Survey Results from LGBTQI Activists in the United States,
United Kingdom, South Africa, and Australia. Politics &
Gender, 1-27.
a
Who are we? Really
IDENTITY THEFT
Billie Woods Project
1
What is Identity Theft?
Identity theft is theft of an individual’s personal information
and is used without permission.
The Bureau of Justice Statistics found that more than 16.7
million Americans were victims of identity theft in 2017 alone.
Fraud loss total over $16.8 million. Major companies like
Equifax, JP Morgan Chase, Target and Yahoo have all been
hacked. (https://www.bjs.gov)
2
Forms of ID Theft
3
ID Theft Versus ID Fraud
ID theft-theft of personal identification information: title, SS #,
credit and bank cards, parental information, driver’s license,
medical records
ID fraud-fraud is the actual use of personal information: Credit
card fraud, Employment or tax fraud, utilities fraud, bank fraud
4
The Federal Trade Commission 2017 reports that 35% of fraud
complaints & 18.9% of ID theft complaints impacted seniors
over 60.
The Federal Trade Commission, 2017 reports that 13, 852
affecting children (under age 19).
3.89% of all identity theft complaints for the year
16
History of Laws Fighting Identity Theft
1998 Congress made identity theft a felony
Theft Identity & Deterrence Act
2004 Theft Penalty Enhancement Act
2008 Identity Theft Implementation and Compensation Act
Agencies;
FBI--Federal Bureau of Investigation
FTC---Federal Trade Commission
SS--Secret Service
Postal Inspection Service
12
Complicated Passwords
Change up your passwords
Be Warry Abnormal Websites and Links.
Keep personal information personal.
Credit reports checked often.
Fraud Alerts
Docments protected with personal information.
Reduce online expsure.
Approach 1
An evidence-based approach to preventing Identity Theft. The
findings from empirical research on the specific issue of
identity theft are utilized to implement policies that have been
shown to be beneficial.
Approach 2
Situational crime prevention is the managerial and
environmental amendments to change the opportunity structure
for identity theft to occur—not just the immediate physical and
social settings in which the theft occurs, but includes societal
situations that make the crimes possible
Approach 3
General strain theory is an assortment of tensions or stressors
escalate the possibility of crime. These tensions may include the
incapacity to accomplish completely esteemed goals, and the
harm of positively-valued incentives
Find Help
Monitoring Amenities
Credit checking tracks signal credit information. There are three
major credit bureaus
Equifax, Experian, and TransUnion
Identity monitoring signals your personal information — like
your bank account information or SS#, driver’s license,
passport, or medical identification
Identity recovery services assist the process of regaining control
of your good name and finances after identity theft occurs
Identity theft insurance and chief identity theft protection
services.
Help YourselfScreen credit reports for free.Examination of
credit card, bank, and retirement accounts regularly
Explanation of benefits (EOB) statements from health insurance
providersengage a free credit freeze security freeze
IdentityTheft.gov
Bibliography
Alice Hutchings & Thomas J. Holt (2017) The online stolen
data market: disruption and intervention approaches, Global
Crime, 18:1, 11-30, DOI: 10.1080/17440572.2016.1197123
This article was chosen due to the information it proved on
the intervention.
Martinez, V., Jacobson, J. and Iheanacho, N. (2019), "The SEC
brings its first enforcement action under the identity theft red
flags rule", Journal of Investment Compliance, Vol. 20 No. 1,
pp. 31- 35. https://doi.org/10.1108/JOIC-01-2019-0007
I chose this article for the new information on creating
policy to show the red flags in identity theft
Reyns, B. W., & Henson, B. (2015). The Thief With a Thousand
Faces and the Victim With None. International Journal of
Offender Therapy and Comparative Criminology, 60(10), 1119
1139. doi:10.1177/0306624x1557286
I chose this article due to the information provided about
the victims involved in identity theft.
Reyns, B., Randa, R. & Henson, B. Preventing crime online:
Identifying determinants of online preventive behaviors using
structural equation modeling and canonical correlation
analysis. Crime Prev Community Saf 18, 38–59 (2016)
doi:10.1057/cpcs.2015.21
I chose this article as it describes methods on how to
prevent identity theft.
Van de Weijer, S. G., Leukfeldt, R., & Bernasco, W. (2018).
Determinants of reporting cybercrime: A comparison between
identity theft, consumer fraud, and hacking. European Journal
of Criminology, 16(4), 486-508.
doi:10.1177/1477370818773610
I chose this resource for the information provided on
comparing identity theft, consumer fraud and hacking.
Go over the resources listed.
30

More Related Content

More from lorainedeserre

38 u December 2017 January 2018The authorities beli.docx
38  u   December 2017  January 2018The authorities beli.docx38  u   December 2017  January 2018The authorities beli.docx
38 u December 2017 January 2018The authorities beli.docxlorainedeserre
 
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docx
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docx3Prototypes of Ethical ProblemsObjectivesThe reader shou.docx
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docxlorainedeserre
 
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docx
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docx4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docx
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docxlorainedeserre
 
3Moral Identity Codes of Ethics and Institutional Ethics .docx
3Moral Identity Codes of  Ethics and Institutional  Ethics .docx3Moral Identity Codes of  Ethics and Institutional  Ethics .docx
3Moral Identity Codes of Ethics and Institutional Ethics .docxlorainedeserre
 
3NIMH Opinion or FactThe National Institute of Mental Healt.docx
3NIMH Opinion or FactThe National Institute of Mental Healt.docx3NIMH Opinion or FactThe National Institute of Mental Healt.docx
3NIMH Opinion or FactThe National Institute of Mental Healt.docxlorainedeserre
 
4.1Updated April-09Lecture NotesChapter 4Enterpr.docx
4.1Updated April-09Lecture NotesChapter 4Enterpr.docx4.1Updated April-09Lecture NotesChapter 4Enterpr.docx
4.1Updated April-09Lecture NotesChapter 4Enterpr.docxlorainedeserre
 
3Type your name hereType your three-letter and -number cours.docx
3Type your name hereType your three-letter and -number cours.docx3Type your name hereType your three-letter and -number cours.docx
3Type your name hereType your three-letter and -number cours.docxlorainedeserre
 
3Welcome to Writing at Work! After you have completed.docx
3Welcome to Writing at Work! After you have completed.docx3Welcome to Writing at Work! After you have completed.docx
3Welcome to Writing at Work! After you have completed.docxlorainedeserre
 
3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docx
3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docx3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docx
3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docxlorainedeserre
 
3Big Data Analyst QuestionnaireWithin this document are fo.docx
3Big Data Analyst QuestionnaireWithin this document are fo.docx3Big Data Analyst QuestionnaireWithin this document are fo.docx
3Big Data Analyst QuestionnaireWithin this document are fo.docxlorainedeserre
 
3HR StrategiesKey concepts and termsHigh commitment .docx
3HR StrategiesKey concepts and termsHigh commitment .docx3HR StrategiesKey concepts and termsHigh commitment .docx
3HR StrategiesKey concepts and termsHigh commitment .docxlorainedeserre
 
3Implementing ChangeConstruction workers on scaffolding..docx
3Implementing ChangeConstruction workers on scaffolding..docx3Implementing ChangeConstruction workers on scaffolding..docx
3Implementing ChangeConstruction workers on scaffolding..docxlorainedeserre
 
3Assignment Three Purpose of the study and Research Questions.docx
3Assignment Three Purpose of the study and Research Questions.docx3Assignment Three Purpose of the study and Research Questions.docx
3Assignment Three Purpose of the study and Research Questions.docxlorainedeserre
 
380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docx
380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docx380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docx
380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docxlorainedeserre
 
392Group Development JupiterimagesStockbyteThinkstoc.docx
392Group Development JupiterimagesStockbyteThinkstoc.docx392Group Development JupiterimagesStockbyteThinkstoc.docx
392Group Development JupiterimagesStockbyteThinkstoc.docxlorainedeserre
 
39Chapter 7Theories of TeachingIntroductionTheories of l.docx
39Chapter 7Theories of TeachingIntroductionTheories of l.docx39Chapter 7Theories of TeachingIntroductionTheories of l.docx
39Chapter 7Theories of TeachingIntroductionTheories of l.docxlorainedeserre
 
3902    wileyonlinelibrary.comjournalmec Molecular Ecology.docx
3902     wileyonlinelibrary.comjournalmec Molecular Ecology.docx3902     wileyonlinelibrary.comjournalmec Molecular Ecology.docx
3902    wileyonlinelibrary.comjournalmec Molecular Ecology.docxlorainedeserre
 
38  Monthly Labor Review  •  June 2012TelecommutingThe.docx
38  Monthly Labor Review  •  June 2012TelecommutingThe.docx38  Monthly Labor Review  •  June 2012TelecommutingThe.docx
38  Monthly Labor Review  •  June 2012TelecommutingThe.docxlorainedeserre
 
3895SafeAssign Originality ReportComputer Sec.docx
3895SafeAssign Originality ReportComputer Sec.docx3895SafeAssign Originality ReportComputer Sec.docx
3895SafeAssign Originality ReportComputer Sec.docxlorainedeserre
 
37Barram — Case Study Greenhill CollegeCase Study Greenh.docx
37Barram — Case Study Greenhill CollegeCase Study Greenh.docx37Barram — Case Study Greenhill CollegeCase Study Greenh.docx
37Barram — Case Study Greenhill CollegeCase Study Greenh.docxlorainedeserre
 

More from lorainedeserre (20)

38 u December 2017 January 2018The authorities beli.docx
38  u   December 2017  January 2018The authorities beli.docx38  u   December 2017  January 2018The authorities beli.docx
38 u December 2017 January 2018The authorities beli.docx
 
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docx
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docx3Prototypes of Ethical ProblemsObjectivesThe reader shou.docx
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docx
 
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docx
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docx4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docx
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docx
 
3Moral Identity Codes of Ethics and Institutional Ethics .docx
3Moral Identity Codes of  Ethics and Institutional  Ethics .docx3Moral Identity Codes of  Ethics and Institutional  Ethics .docx
3Moral Identity Codes of Ethics and Institutional Ethics .docx
 
3NIMH Opinion or FactThe National Institute of Mental Healt.docx
3NIMH Opinion or FactThe National Institute of Mental Healt.docx3NIMH Opinion or FactThe National Institute of Mental Healt.docx
3NIMH Opinion or FactThe National Institute of Mental Healt.docx
 
4.1Updated April-09Lecture NotesChapter 4Enterpr.docx
4.1Updated April-09Lecture NotesChapter 4Enterpr.docx4.1Updated April-09Lecture NotesChapter 4Enterpr.docx
4.1Updated April-09Lecture NotesChapter 4Enterpr.docx
 
3Type your name hereType your three-letter and -number cours.docx
3Type your name hereType your three-letter and -number cours.docx3Type your name hereType your three-letter and -number cours.docx
3Type your name hereType your three-letter and -number cours.docx
 
3Welcome to Writing at Work! After you have completed.docx
3Welcome to Writing at Work! After you have completed.docx3Welcome to Writing at Work! After you have completed.docx
3Welcome to Writing at Work! After you have completed.docx
 
3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docx
3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docx3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docx
3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docx
 
3Big Data Analyst QuestionnaireWithin this document are fo.docx
3Big Data Analyst QuestionnaireWithin this document are fo.docx3Big Data Analyst QuestionnaireWithin this document are fo.docx
3Big Data Analyst QuestionnaireWithin this document are fo.docx
 
3HR StrategiesKey concepts and termsHigh commitment .docx
3HR StrategiesKey concepts and termsHigh commitment .docx3HR StrategiesKey concepts and termsHigh commitment .docx
3HR StrategiesKey concepts and termsHigh commitment .docx
 
3Implementing ChangeConstruction workers on scaffolding..docx
3Implementing ChangeConstruction workers on scaffolding..docx3Implementing ChangeConstruction workers on scaffolding..docx
3Implementing ChangeConstruction workers on scaffolding..docx
 
3Assignment Three Purpose of the study and Research Questions.docx
3Assignment Three Purpose of the study and Research Questions.docx3Assignment Three Purpose of the study and Research Questions.docx
3Assignment Three Purpose of the study and Research Questions.docx
 
380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docx
380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docx380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docx
380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docx
 
392Group Development JupiterimagesStockbyteThinkstoc.docx
392Group Development JupiterimagesStockbyteThinkstoc.docx392Group Development JupiterimagesStockbyteThinkstoc.docx
392Group Development JupiterimagesStockbyteThinkstoc.docx
 
39Chapter 7Theories of TeachingIntroductionTheories of l.docx
39Chapter 7Theories of TeachingIntroductionTheories of l.docx39Chapter 7Theories of TeachingIntroductionTheories of l.docx
39Chapter 7Theories of TeachingIntroductionTheories of l.docx
 
3902    wileyonlinelibrary.comjournalmec Molecular Ecology.docx
3902     wileyonlinelibrary.comjournalmec Molecular Ecology.docx3902     wileyonlinelibrary.comjournalmec Molecular Ecology.docx
3902    wileyonlinelibrary.comjournalmec Molecular Ecology.docx
 
38  Monthly Labor Review  •  June 2012TelecommutingThe.docx
38  Monthly Labor Review  •  June 2012TelecommutingThe.docx38  Monthly Labor Review  •  June 2012TelecommutingThe.docx
38  Monthly Labor Review  •  June 2012TelecommutingThe.docx
 
3895SafeAssign Originality ReportComputer Sec.docx
3895SafeAssign Originality ReportComputer Sec.docx3895SafeAssign Originality ReportComputer Sec.docx
3895SafeAssign Originality ReportComputer Sec.docx
 
37Barram — Case Study Greenhill CollegeCase Study Greenh.docx
37Barram — Case Study Greenhill CollegeCase Study Greenh.docx37Barram — Case Study Greenhill CollegeCase Study Greenh.docx
37Barram — Case Study Greenhill CollegeCase Study Greenh.docx
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 

1Week 4 Rough DraftMerrissa HicksWalde.docx

  • 1. 1 Week 4 Rough Draft Merrissa Hicks Walden University 12/23/2019 Introduction The study of social movement reflects the social issues in different periods have faced. This work will focus on the Abolition Movement and the Lesbian, gay, bisexual, and transgender (LGBT) social movements. Social movements are a result of general public consensus towards dealing with major social issues in the community. I will discuss the historical background and ideals that supported the development of the Abolition Movement and the Lesbian, Gay, Bisexual and Transgender (LGBT) Social
  • 2. Movement. This is intended to show the correlation between their emergence and the key social issues that the community faced. The Abolition movement The Abolition movement was jumpstarted with the effort of ending slavery in America. It held that all people are created equal, and hence the practice of slavery was unacceptable. This movement existed in the 19th century when many people started publicly displaying dissatisfaction for the slavery practices in the country. It placed more pressure on the authorities to outlaw slavery (Martos, Wilson & Meyer, 2017). It would allow for increased debate about segregation and discrimination. Slaved men and women worked on large agricultural farms as maids. Their life was brutal; they were subject to severe punishments and strict racial rules and policies. With time they opposed slavery through daily acts like antislavery movements. The basis of this movement was that all men were created equal and hence, the effort to emancipate slaves (Martos, Wilson & Meyer, (2017). Abolitionists managed to integrate religion and moral movement, that focused on the acceptance that everyone was equal before the eyes of their creator and later on became political. Antislavery societies were formed by various churches to create awareness of evil effects of slavery (Lysack, 2012). American Colonization Society (founded 1817) was first movement to abolishing slavery but was greatly opposed since it was seen as unfair to send Black Americans from their motherland to Africa. The American Antislavery Society was founded in 1833 by prominent leaders, such as William Lloyd Garrison David Walker and Frederick Douglass (Black Abolitionist) strongly opposed slavery in their publications (Pepin-Neff & Wynter, 2019). These publications disputed against slavery as anti-social and immoral and repeatedly used illustrations of African - American literatures and other accomplishments to outline that the Africans and their offspring had ability to learn like
  • 3. Americans, if granted freedom. The abolition movement was politicized. The Native American Party opposed slavery as well immigrants. Thus, other parties like Free Soil and Whigs did so. They merge together in 1856 leading to election of Abraham Lincoln as president in United States (Lysack, 2012). The abolitionists continued to pressurize the administration of Lincoln to terminate slavery. It took the 13th Amendment to lastly end involuntary enslavement in 1865. Even though the abolitionist movement never attained a truly great following. Garrison, Douglass and their team never gave on the issue of slavery and race thus creating to the tension which led to war. Lesbian, Gay, Bisexual and Transgender (LGBT) Social Movement The Lesbian, gay, bisexual and transgender (LGBT) social movement was initiated with the interest of providing the LGBT with same movements as heterosexual individuals in the society. (Lysack, 2012). This movement was started to end homophobic, trans-phobic and bi-phobic attitudes that prevented individual in this category to live comfortably in the society (Lysack, 2012). Notable successes of this movement are that it has managed to achieve legality of gay marriages (Lysack, 2012). Regardless, this movement continues to have challenges, especially on the international front, where certain cultures fail to recognize these laws. For many generations, people categorized as LGBT were shunned and discriminated against.This movement intended to overcome these limitations set on the community members. It was motivated by the need to end widespread homophobic, transphobic and biphobic attitudes in the American community (Lysack, 2012). LGBT people who create social movement to fight for their right. Currently, LGBT social movements are organized to include cultural activities. Like research, street marches, social groups and art as well as politics, they celebrate their rights. They are proud for who they keep fighting for their rights. Their political aim is to change
  • 4. laws and policies to gain new rights, protection from harm and benefits (Pepin-Neff & Wynter, 2019). There is a rise of conflict within and between LGBT social actions, arguing who should be included in their movement and change of strategies (Lysack, 2012). There is discussion on what magnitude should gays, transgender, lesbians, bisexuals and intersex individuals are required to merge. Influential of the gay and lesbians’ movement initially wanted to hide manly lesbians, transgender persons, feminine gay males and bisexuals from publicity. This created internal separations within LGBT societies (Pepin-Neff & Wynter, 2019). They have adopted politics which offer them freedom and see themselves as a minor group in the society. The relationship between the Abolition and LGBT Movements The two movements are united by a long history of anti-slavery and marriage laws that did not favor the two minority groups. In essence, abolitionist’s success had an impact on other minority groups such as the LGBT community. Also, their successes emboldened their quest for more rights. The win against discriminatory laws emboldened the abolitionists to seek for more discussion about the need to abolish laws that governed segregation (Lysack, 2012). Hence, the successes of the two movements inspired a devotion to a society free from all forms of discriminatio Conclusion The campaign movement continues to have challenges, especially on the international front, where certain cultures fail to recognize these laws. Each of these social movements has had an essential role in addressing human rights violations which is an aspect I would explore more in the final research process. For many generations, people categorized as LGBT were shunned and discriminated against. This movement intended to overcome these limitations set on the community members. It was motivated by the need to end widespread homophobic, transphobic and biphobic attitudes in the American community
  • 5. (Lysack, 2012). It is interesting to observe these roles that these social movements played in American history. It is especially interesting to know how each relates to the social issues that affected the American public at different times in the country’s history. References Lysack, M. (2012). The abolition of slavery movement as a moral movement: Ethical resources, spiritual roots, and strategies for social change. Journal of Religion & Spirituality in Social Work: Social Thought, 31(1-2), 150-171. Martos, A. J., Wilson, P. A., & Meyer, I. H. (2017). Lesbian, gay, bisexual, and transgender (LGBT) health services in the United States: Origins, evolution, and contemporary landscape. PloS one, 12(7), e0180544 Pepin-Neff, C., & Wynter, T. (2019). The Costs of Pride: Survey Results from LGBTQI Activists in the United States, United Kingdom, South Africa, and Australia. Politics & Gender, 1-27. a Who are we? Really IDENTITY THEFT Billie Woods Project
  • 6. 1 What is Identity Theft? Identity theft is theft of an individual’s personal information and is used without permission. The Bureau of Justice Statistics found that more than 16.7 million Americans were victims of identity theft in 2017 alone. Fraud loss total over $16.8 million. Major companies like Equifax, JP Morgan Chase, Target and Yahoo have all been hacked. (https://www.bjs.gov) 2 Forms of ID Theft
  • 7. 3 ID Theft Versus ID Fraud ID theft-theft of personal identification information: title, SS #, credit and bank cards, parental information, driver’s license, medical records ID fraud-fraud is the actual use of personal information: Credit card fraud, Employment or tax fraud, utilities fraud, bank fraud 4 The Federal Trade Commission 2017 reports that 35% of fraud complaints & 18.9% of ID theft complaints impacted seniors over 60. The Federal Trade Commission, 2017 reports that 13, 852 affecting children (under age 19). 3.89% of all identity theft complaints for the year 16
  • 8. History of Laws Fighting Identity Theft 1998 Congress made identity theft a felony Theft Identity & Deterrence Act 2004 Theft Penalty Enhancement Act 2008 Identity Theft Implementation and Compensation Act Agencies; FBI--Federal Bureau of Investigation FTC---Federal Trade Commission SS--Secret Service Postal Inspection Service 12 Complicated Passwords Change up your passwords Be Warry Abnormal Websites and Links. Keep personal information personal. Credit reports checked often. Fraud Alerts Docments protected with personal information. Reduce online expsure.
  • 9. Approach 1 An evidence-based approach to preventing Identity Theft. The findings from empirical research on the specific issue of identity theft are utilized to implement policies that have been shown to be beneficial. Approach 2 Situational crime prevention is the managerial and environmental amendments to change the opportunity structure for identity theft to occur—not just the immediate physical and social settings in which the theft occurs, but includes societal situations that make the crimes possible Approach 3 General strain theory is an assortment of tensions or stressors escalate the possibility of crime. These tensions may include the incapacity to accomplish completely esteemed goals, and the harm of positively-valued incentives Find Help Monitoring Amenities Credit checking tracks signal credit information. There are three major credit bureaus Equifax, Experian, and TransUnion Identity monitoring signals your personal information — like your bank account information or SS#, driver’s license,
  • 10. passport, or medical identification Identity recovery services assist the process of regaining control of your good name and finances after identity theft occurs Identity theft insurance and chief identity theft protection services. Help YourselfScreen credit reports for free.Examination of credit card, bank, and retirement accounts regularly Explanation of benefits (EOB) statements from health insurance providersengage a free credit freeze security freeze IdentityTheft.gov Bibliography Alice Hutchings & Thomas J. Holt (2017) The online stolen data market: disruption and intervention approaches, Global Crime, 18:1, 11-30, DOI: 10.1080/17440572.2016.1197123 This article was chosen due to the information it proved on the intervention. Martinez, V., Jacobson, J. and Iheanacho, N. (2019), "The SEC brings its first enforcement action under the identity theft red flags rule", Journal of Investment Compliance, Vol. 20 No. 1, pp. 31- 35. https://doi.org/10.1108/JOIC-01-2019-0007 I chose this article for the new information on creating policy to show the red flags in identity theft Reyns, B. W., & Henson, B. (2015). The Thief With a Thousand Faces and the Victim With None. International Journal of Offender Therapy and Comparative Criminology, 60(10), 1119 1139. doi:10.1177/0306624x1557286
  • 11. I chose this article due to the information provided about the victims involved in identity theft. Reyns, B., Randa, R. & Henson, B. Preventing crime online: Identifying determinants of online preventive behaviors using structural equation modeling and canonical correlation analysis. Crime Prev Community Saf 18, 38–59 (2016) doi:10.1057/cpcs.2015.21 I chose this article as it describes methods on how to prevent identity theft. Van de Weijer, S. G., Leukfeldt, R., & Bernasco, W. (2018). Determinants of reporting cybercrime: A comparison between identity theft, consumer fraud, and hacking. European Journal of Criminology, 16(4), 486-508. doi:10.1177/1477370818773610 I chose this resource for the information provided on comparing identity theft, consumer fraud and hacking. Go over the resources listed. 30