Exploitation and the Vulnerability Clause

被引:11
|
作者
Liberto, Hallie [1 ]
机构
[1] Univ Connecticut, Dept Philosophy, Storrs, CT 06269 USA
关键词
Exploitation; Vulnerability; Oppression; Alan Wertheimer; Mikhail Valdman; Marilyn Frye;
D O I
10.1007/s10677-014-9494-z
中图分类号
B [哲学、宗教];
学科分类号
01 ; 0101 ;
摘要
What conditions of vulnerability must an individual face in order that we might ever correctly say that she or he has been wrongfully exploited? Mikhail Valdman has recently argued that wrongful exploitation is the extraction of excessive benefits from someone who cannot reasonably refuse one's offer. So, 'being unable to reasonably refuse an offer' is Valdman's answer to this question. I will argue that this answer is too narrow, but that other competing answers, like Alan Wertheimer's, are too broad. I propose a new answer, a "vulnerability clause" to partially comprise a theory of wrongful exploitation. In so doing, I appeal to Marilyn Frye's account of oppression and take guidance from her inclusion and exclusion criteria.
引用
收藏
页码:619 / 629
页数:11
相关论文
共 50 条
  • [41] A Relational Approach to Evil Action: Vulnerability and its Exploitation
    Zachary J. Goldberg
    The Journal of Value Inquiry, 2019, 53 : 33 - 53
  • [42] Cross-Validation of the Financial Exploitation Vulnerability Scale
    Moray, Juno
    Lichtenberg, Peter A.
    CLINICAL GERONTOLOGIST, 2024,
  • [43] Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks
    Moustafa, Nour
    Turnbull, Benjamin
    Choo, Kim-Kwang Raymond
    2018 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INTERNET (ICII 2018), 2018, : 139 - 145
  • [44] VULNERABILITY OF PESTS - STUDY AND EXPLOITATION FOR SAFER CHEMICAL CONTROL
    HOLLINGWORTH, RM
    ACS SYMPOSIUM SERIES, 1987, 336 : 54 - 76
  • [45] Hands-on Lab on Smart City Vulnerability Exploitation
    Gomez, Andrew
    Shahriar, Hossain
    Clincy, Victor
    Shalan, Atef
    2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 1777 - 1782
  • [46] Vulnerability Exploitation Risk Assessment Based on Offensive Security Approach
    Yoon, Seong-Su
    Kim, Do-Yeon
    Kim, Ka-Kyung
    Euom, Ieck-Chae
    APPLIED SCIENCES-BASEL, 2023, 13 (22):
  • [47] Research on Automatic Exploitation of House of Spirit Heap Overflow Vulnerability
    Li, Minglei
    Lu, Yuliang
    Huang, Hui
    Zhang, Chao
    Zhao, Jiazhen
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 751 - 757
  • [48] The Fight against the Exploitation of Vulnerability According to the Kuwaiti Civil Code
    Alrashidi, Husain
    EUROPEAN JOURNAL OF COMPARATIVE LAW AND GOVERNANCE, 2022, 9 (03) : 321 - 341
  • [49] A Conditional Probability Computation Method for Vulnerability Exploitation Based on CVSS
    Zhang, Hua
    Lou, Fang
    Fu, Yunsheng
    Tian, Zhihong
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 238 - 241
  • [50] Vulnerability Analysis and Exploitation of Location Privacy Leakage in Webcasting Platforms
    Yue H.-Z.
    Zhang Y.-Q.
    Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (05): : 1095 - 1111