The Theoretical Logic of the Right to Security

被引:0
|
作者
何志鹏 [1 ,2 ]
JIANG Yu
机构
[1] Jilin University Human Rights Institute
[2] Jilin University School of
关键词
D O I
暂无
中图分类号
D621.5 [公民权利与义务]; D631 [公安工作];
学科分类号
0306 ; 1402 ;
摘要
The growing significance of security issues has expanded the necessity and possibility of recognizing and achieving the goal of security from the perspective of human rights. Combined with socio-cultural and historical dynamics, human rights can be construed as the needs of people to which social authorities should and can respond, and their mechanism depends on “the alignment between people's intrinsic needs and the social resources available.” Security,as a significant part of people's intrinsic needs, should be supported by social resources; social authorities at all levels have the duty and potential to support people's security needs. Thus, security has the socio-cultural basis to be considered as a branch of human rights. Once the human rights attribution of security has been established, further consideration is required for its place in the human rights spectrum.When analyzing the existing set of human rights, we can classify them based on the subject, the object, or the goal. The right to security is more appropriately classified within the dimension of goals, thereby being placed alongside the right to subsistence and the right to development. Integrating security into human rights can resolve the relationship between the right to security and other human rights using the theoretical framework of rights conflict, rights hierarchy, and rights system ranking, thereby avoiding the tendency to curb the security needs of countries and individuals by ideologizing human rights.
引用
收藏
页码:747 / 775
页数:29
相关论文
共 50 条
  • [31] BALANCING SECURITY AND RIGHT TO KNOW
    Hess, Glenn
    CHEMICAL & ENGINEERING NEWS, 2012, 90 (19) : 22 - 24
  • [32] On the Right of Security and Safety Fair
    Zhang Xunlei
    PROCEEDINGS OF THE 2010 CHINESE SEMINAR ON THE PRINCIPLES OF SAFETY SCIENCE AND TECHNOLOGY, 2010, : 285 - 287
  • [33] RELATIONS BETWEEN THE FAMILY RIGHT AND THE RIGHT OF THE SOCIAL SECURITY
    Rosales Zarco, Hector
    REVISTA LATINOAMERICANA DE DERECHO SOCIAL, 2008, 7 : 191 - 210
  • [34] Security Risk Analysis by Logic Programming
    Zech, Philipp
    Felderer, Michael
    Breu, Ruth
    RISK ASSESSMENT AND RISK-DRIVEN TESTING, RISK 2013, 2014, 8418 : 38 - 48
  • [35] Evaluating the Security of Logic Encryption Algorithms
    Subramanyan, Pramod
    Ray, Sayak
    Malik, Sharad
    2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2015, : 137 - 143
  • [36] Semantics and logic Efor security protocols
    Jacobs, Bart
    Hasuo, Ichiro
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (06) : 909 - 944
  • [37] A security logic for abstract state machines
    Nanchen, S
    Stärk, RF
    ABSTRACT STATE MACHINES 2004: ADVANCES IN THEORY AND PRACTICE, PROCEEDINGS, 2004, 3052 : 169 - 185
  • [38] SECCSL: Security Concurrent Separation Logic
    Ernst, Gidon
    Murray, Toby
    COMPUTER AIDED VERIFICATION, CAV 2019, PT II, 2019, 11562 : 208 - 230
  • [39] A Logic for Signature based Security Protocols
    Feng, Chao
    Chen, Yuebing
    Zhang, Quan
    Tang, Chaojing
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 99 - 105
  • [40] Argumentation Logic to Assist in Security Administration
    Rowe, Jeff
    Levitt, Karl
    Parsons, Simon
    Sklar, Elizabeth
    Applebaum, Andrew
    Jalal, Sharmin
    PROCEEDINGS OF THE 2012 NEW SECURITY PARADIGMS WORKSHOP (NSPW'12), 2012, : 43 - 51