IDS 400 module two activity
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
400
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
4
Uploaded by MajorAlpacaPerson429
LGBTQ+
1
Module Two Activity
Southern New Hampshire University
Dominique Karschner
IDS 400: Diversity
Professor Teague
November 9, 2023
LGBTQ+
2
The LGBTQ+ community has been facing countless challenges to be accepted in society for
decades; they struggle to gain respect and be included. The community began pushing back
against discrimination after the 1969 Stonewall incident, pushing the day rights movement
further into action (Quinn, 2020). Since the movement started, the LGBTQ+ community and
activists have been fighting for equal rights, bringing awareness to the discrimination and
violence against the community. LGBTQ+ is an acronym that encloses the various identities of
their diversities and specific experiences and challenges. All humans have similar needs and
commonalities that allow us to find ways to relate to each other. However, our differences are so
substantial that they threaten each other's values and beliefs. Our differences affect our ability to
understand each other's perspectives as we experience life in numerous ways, and these ways are
what make us different. Mental health issues significantly affect the LGBTQ+ community.
However, anxiety and depression have a more significant effect on the transgender population.
With half of transgender people experiencing anxiety and depression, it shows the detrimental
effects on their psychological and physical health (Halliwell,2019).
For the LGBTQ+ community, our society lately has been showing significant discrimination
against transgender individuals. A Transgender is defined as a person whose gender identity does
not correspond with their assigned sex at birth (Grimstad & Martinez, 2022). Due to the stigmas
and discrimination, many who identify as transgender face obstacles when seeking medical
assistance. The debate continues the time to begin interventions and treatment as it is so
controversial. All those involved, doctors, parents, and transgender individuals, must encounter
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Learn all you can about Patents.: Then: 1) define patent; 2) what government agency grants patents and how long does a patent last; 3) what does it cost; 4) what can be patented (see the Patent Act of 1952); 5) what are the three types of patents; 6) do U.S. patents provide protection or rights only within the US and its territories; 7) what did Congress do in 1984 to protect patent holders from the exporting of patented components for assembly abroad; 8) what does the Bayh-Dole Act of 1980 address?
arrow_forward
Add Results, Choices, and Possible Actions
Here you should present findings that you have regarding the social, ethical, and culturalissues of your topic. In scholarly work, findings should be justified and validated. Thereshould be citations and references.Begin this section with descriptions of each of the ethical issues and choices that youhave addressed. The ethical issues and choices should be broken out by viewpoint.Importantly, you should cover each of the four ethics tests, reversibility,harm/beneficence, feasibility, and going public. A key point here is to recognize that thefinal report is to be a scholarly piece of work that is grounded in the sources ofinformation that you cite and in data that you gathered. Thus, each viewpoint shouldclearly reflect the evidence that supports the validity (or lack of validity) in ethical termsof the various perspectives and action choices that the stakeholders have. Your coverageof the ethical tests should be complete, and, importantly,…
arrow_forward
Many have said that privacy will be the next great frontier of personal rights protection (or assault). Why is privacy important, where do we get such rights, and how does the Internet change our traditional notions of privacy?
arrow_forward
Medical ethics and legal issues within the healthcare professions overlap quite a bit. This discussion prompts you to think through issues related to HIPAA and patient rights and other legalities. The goal is that you will grow in your understanding and application of privacy laws/rights to further your professional success.
What is at least one HIPAA/legal issue from your eBook and/or the HIPAA video that stuck out to you or was new to you?
Of the HIPAA violation examples in the video, which one do you think might be most commonly broken if people are not thinking carefully and professionally?
What do you think is one of the most important "traits of a healthcare professional" needed to uphold HIPAA/ other legal policies (see your eBook Chapter 2, if needing a refresher)?
arrow_forward
Even though privacy is highly valued in today's culture, there are conflicting opinions on it. Do you believe that there is still more that can be done to protect online privacy? Do you, for instance, think that laws are adequate?
arrow_forward
Why do some modern information systems in the twenty-first century pose threats to individual privacy and intellectual property protection?
arrow_forward
Connections to areas where a person's right to privacy is guaranteed by the US Constitution.
arrow_forward
Computer Science
There are laws meant to punish hackers for crimes against companies and people. Are these laws effective, and does the punishment fit the crime? Outlining one law that is effective and working. Use current statistics as justification for effectiveness. Find another law that is not working effectively. Again, use statistics or other research to show a lack of effectiveness. Make a recommendation on a law that could bridge a gap in covering a new hacking method or ID theft. Include relevant information such as punishments for crime types. Address whether punishments are harsh enough to deter hacking.
arrow_forward
connections to places where the US Constitution protects a person's
right to privacy.
arrow_forward
Analyse sociological explanations for the emergence of feminism, masculinist and transgender identities in modern society
arrow_forward
What would you say the meaning of "privacy" is if you had to explain it to the rest of us and everyone else? Is it even possible that it's that vital? How do we create and protect privacy when it comes to personal information in this era of technology?
arrow_forward
Security, crime, privacy, social interactions, and even government are just the tip of the iceberg when it comes to the vast ocean of subjects delved into by the field of computer ethics. Do you reckon it's absolutely crucial, in your humble opinion, that chief information officers (CIOs) put ethical computing on the top of their list when it comes to keeping confidential data under lock and key?
arrow_forward
Individuals are ardent supporters of digital social networking sites (such as Facebook and Twitter). Determine why individuals prefer formal to informal social networks, or vice versa. Compile a list of the possible mental health consequences of excessive use of digital social networking sites. Is there ever a concern that we would acquire an addiction to any Internet activity? Locate at least one instance of someone becoming "dependent" on a social networking site or other online activity in a news or journal article.
arrow_forward
Explain how the right to free speech, which is protected by the Constitution, might be
violated by a person's ownership of a trademark. This right is protected by the
Constitution. How may these apparently contradictory points of view be brought into
closer alignment with one another?
arrow_forward
oung, technically oriented hackers argued that, if the owners of a computer system want to keep outsiders out, it is their responsibility to provide better security. Ken Thompson, one of the inventors of UNIX, said, "The act of breaking into a computer system has to have the same social stigma as breaking into a neighbor’s house. It should not matter that the neighbor’s door is unlocked." Which position do you agree with more? Give your reasons
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Related Questions
- Learn all you can about Patents.: Then: 1) define patent; 2) what government agency grants patents and how long does a patent last; 3) what does it cost; 4) what can be patented (see the Patent Act of 1952); 5) what are the three types of patents; 6) do U.S. patents provide protection or rights only within the US and its territories; 7) what did Congress do in 1984 to protect patent holders from the exporting of patented components for assembly abroad; 8) what does the Bayh-Dole Act of 1980 address?arrow_forwardAdd Results, Choices, and Possible Actions Here you should present findings that you have regarding the social, ethical, and culturalissues of your topic. In scholarly work, findings should be justified and validated. Thereshould be citations and references.Begin this section with descriptions of each of the ethical issues and choices that youhave addressed. The ethical issues and choices should be broken out by viewpoint.Importantly, you should cover each of the four ethics tests, reversibility,harm/beneficence, feasibility, and going public. A key point here is to recognize that thefinal report is to be a scholarly piece of work that is grounded in the sources ofinformation that you cite and in data that you gathered. Thus, each viewpoint shouldclearly reflect the evidence that supports the validity (or lack of validity) in ethical termsof the various perspectives and action choices that the stakeholders have. Your coverageof the ethical tests should be complete, and, importantly,…arrow_forwardMany have said that privacy will be the next great frontier of personal rights protection (or assault). Why is privacy important, where do we get such rights, and how does the Internet change our traditional notions of privacy?arrow_forward
- Medical ethics and legal issues within the healthcare professions overlap quite a bit. This discussion prompts you to think through issues related to HIPAA and patient rights and other legalities. The goal is that you will grow in your understanding and application of privacy laws/rights to further your professional success. What is at least one HIPAA/legal issue from your eBook and/or the HIPAA video that stuck out to you or was new to you? Of the HIPAA violation examples in the video, which one do you think might be most commonly broken if people are not thinking carefully and professionally? What do you think is one of the most important "traits of a healthcare professional" needed to uphold HIPAA/ other legal policies (see your eBook Chapter 2, if needing a refresher)?arrow_forwardEven though privacy is highly valued in today's culture, there are conflicting opinions on it. Do you believe that there is still more that can be done to protect online privacy? Do you, for instance, think that laws are adequate?arrow_forwardWhy do some modern information systems in the twenty-first century pose threats to individual privacy and intellectual property protection?arrow_forward
- Connections to areas where a person's right to privacy is guaranteed by the US Constitution.arrow_forwardComputer Science There are laws meant to punish hackers for crimes against companies and people. Are these laws effective, and does the punishment fit the crime? Outlining one law that is effective and working. Use current statistics as justification for effectiveness. Find another law that is not working effectively. Again, use statistics or other research to show a lack of effectiveness. Make a recommendation on a law that could bridge a gap in covering a new hacking method or ID theft. Include relevant information such as punishments for crime types. Address whether punishments are harsh enough to deter hacking.arrow_forwardconnections to places where the US Constitution protects a person's right to privacy.arrow_forward
- Analyse sociological explanations for the emergence of feminism, masculinist and transgender identities in modern societyarrow_forwardWhat would you say the meaning of "privacy" is if you had to explain it to the rest of us and everyone else? Is it even possible that it's that vital? How do we create and protect privacy when it comes to personal information in this era of technology?arrow_forwardSecurity, crime, privacy, social interactions, and even government are just the tip of the iceberg when it comes to the vast ocean of subjects delved into by the field of computer ethics. Do you reckon it's absolutely crucial, in your humble opinion, that chief information officers (CIOs) put ethical computing on the top of their list when it comes to keeping confidential data under lock and key?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning