The Theoretical Logic of the Right to Security

被引:0
|
作者
何志鹏 [1 ,2 ]
JIANG Yu
机构
[1] Jilin University Human Rights Institute
[2] Jilin University School of
关键词
D O I
暂无
中图分类号
D621.5 [公民权利与义务]; D631 [公安工作];
学科分类号
0306 ; 1402 ;
摘要
The growing significance of security issues has expanded the necessity and possibility of recognizing and achieving the goal of security from the perspective of human rights. Combined with socio-cultural and historical dynamics, human rights can be construed as the needs of people to which social authorities should and can respond, and their mechanism depends on “the alignment between people's intrinsic needs and the social resources available.” Security,as a significant part of people's intrinsic needs, should be supported by social resources; social authorities at all levels have the duty and potential to support people's security needs. Thus, security has the socio-cultural basis to be considered as a branch of human rights. Once the human rights attribution of security has been established, further consideration is required for its place in the human rights spectrum.When analyzing the existing set of human rights, we can classify them based on the subject, the object, or the goal. The right to security is more appropriately classified within the dimension of goals, thereby being placed alongside the right to subsistence and the right to development. Integrating security into human rights can resolve the relationship between the right to security and other human rights using the theoretical framework of rights conflict, rights hierarchy, and rights system ranking, thereby avoiding the tendency to curb the security needs of countries and individuals by ideologizing human rights.
引用
收藏
页码:747 / 775
页数:29
相关论文
共 50 条
  • [41] The Logic of Reconciliation: Between the Right to Compensation and the Right to Justice in Turkey
    Biner, Zerrin Ozlem
    HUMANITY-AN INTERNATIONAL JOURNAL OF HUMAN RIGHTS HUMANITARIANISM AND DEVELOPMENT, 2013, 4 (01) : 73 - 91
  • [42] A Trace Logic for Local Security Properties
    Corin, Ricardo
    Etalle, Sandro
    Hartel, Pieter
    Durante, Antonio
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 118 : 129 - 143
  • [43] A Unifying Logic Encryption Security Metric
    Sisejkovic, Dominik
    Leupers, Rainer
    Ascheid, Gerd
    Metzner, Simon
    2018 INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION (SAMOS XVIII), 2018, : 179 - 186
  • [44] Coalgebraic logic for stochastic right coalgebras
    Doberkat, Ernst-Erich
    Schubert, Christoph
    ANNALS OF PURE AND APPLIED LOGIC, 2009, 159 (03) : 268 - 284
  • [45] IS LADDER LOGIC THE RIGHT SOFTWARE TOOL
    BABB, MP
    CONTROL ENGINEERING, 1988, 35 (06) : 43 - 43
  • [46] A theoretical study of watermarking security
    Cayre, F
    Fontaine, C
    Furon, T
    2005 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), VOLS 1 AND 2, 2005, : 1868 - 1872
  • [47] A theoretical model for security patterns
    不详
    SECURITY ENGINEERING WITH PATTERNS: ORIGINS, THEROETICAL MODEL, AND NEW APPLICATIONS, 2003, 2754 : 121 - 140
  • [48] Theoretical aspects of environmental security
    Dyer, HC
    RESPONDING TO ENVIRONMENTAL CONFLICTS: IMPLICATIONS FOR THEORY AND PRACTICE, 2001, 78 : 67 - 81
  • [49] Theoretical aspects of information security
    Vydrin A.S.
    Journal of Mathematical Sciences, 2009, 156 (2) : 261 - 275
  • [50] THEORETICAL PRINCIPLES OF CORPORATE SECURITY
    Franchuk, V. I.
    ACTUAL PROBLEMS OF ECONOMICS, 2009, (97): : 161 - 167