Exploitation and the Vulnerability Clause

被引:11
|
作者
Liberto, Hallie [1 ]
机构
[1] Univ Connecticut, Dept Philosophy, Storrs, CT 06269 USA
关键词
Exploitation; Vulnerability; Oppression; Alan Wertheimer; Mikhail Valdman; Marilyn Frye;
D O I
10.1007/s10677-014-9494-z
中图分类号
B [哲学、宗教];
学科分类号
01 ; 0101 ;
摘要
What conditions of vulnerability must an individual face in order that we might ever correctly say that she or he has been wrongfully exploited? Mikhail Valdman has recently argued that wrongful exploitation is the extraction of excessive benefits from someone who cannot reasonably refuse one's offer. So, 'being unable to reasonably refuse an offer' is Valdman's answer to this question. I will argue that this answer is too narrow, but that other competing answers, like Alan Wertheimer's, are too broad. I propose a new answer, a "vulnerability clause" to partially comprise a theory of wrongful exploitation. In so doing, I appeal to Marilyn Frye's account of oppression and take guidance from her inclusion and exclusion criteria.
引用
收藏
页码:619 / 629
页数:11
相关论文
共 50 条
  • [31] A Relational Approach to Evil Action: Vulnerability and its Exploitation
    Goldberg, Zachary J.
    JOURNAL OF VALUE INQUIRY, 2019, 53 (01): : 33 - 53
  • [32] Using Software Structure to Predict Vulnerability Exploitation Potential
    Younis, Awad A.
    Malaiya, Yashwant K.
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 13 - 18
  • [33] Heap Vulnerability Exploitation Techniques on the Linux Platform: An Overview
    Du, Suiyuan
    Li, Zhaojie
    Li, Jin
    2024 9TH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, ICSIP, 2024, : 371 - 382
  • [34] Novel methods for assessment of vulnerability to financial exploitation (FE)
    Beach, Scott R.
    Czaja, Sara J.
    Schulz, Richard
    JOURNAL OF ELDER ABUSE & NEGLECT, 2023, 35 (4-5) : 151 - 173
  • [35] Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation
    Yoshioka, Katsunari
    Inoue, Daisuke
    Eto, Masashi
    Hoshizawa, Yuji
    Nogawa, Hiroki
    Nakao, Koji
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05): : 955 - 966
  • [36] Risk Assessment by Dynamic Representation of Vulnerability, Exploitation, and Impact
    Cam, Hasan
    CYBER SENSING 2015, 2015, 9458
  • [37] Critical vulnerability analysis and exploitation based on exception capture
    Shi Y.-F.
    Zhang J.-X.
    Feng J.-H.
    Ruan Jian Xue Bao/Journal of Software, 2010, 21 (11): : 2944 - 2958
  • [38] Vulnerability, Exploitation and Migrants: Insecure Work in a Globalised Economy
    Sales, Rosemary
    JOURNAL OF SOCIAL POLICY, 2017, 46 (04) : 837 - 839
  • [40] Automated Vulnerability Exploitation Using Deep Reinforcement Learning
    Almajali, Anas
    Al-Abed, Loiy
    Yousef, Khalil M. Ahmad
    Mohd, Bassam J.
    Samamah, Zaid
    Abu Shhadeh, Anas
    APPLIED SCIENCES-BASEL, 2024, 14 (20):