Exploitation and the Vulnerability Clause

被引:11
|
作者
Liberto, Hallie [1 ]
机构
[1] Univ Connecticut, Dept Philosophy, Storrs, CT 06269 USA
关键词
Exploitation; Vulnerability; Oppression; Alan Wertheimer; Mikhail Valdman; Marilyn Frye;
D O I
10.1007/s10677-014-9494-z
中图分类号
B [哲学、宗教];
学科分类号
01 ; 0101 ;
摘要
What conditions of vulnerability must an individual face in order that we might ever correctly say that she or he has been wrongfully exploited? Mikhail Valdman has recently argued that wrongful exploitation is the extraction of excessive benefits from someone who cannot reasonably refuse one's offer. So, 'being unable to reasonably refuse an offer' is Valdman's answer to this question. I will argue that this answer is too narrow, but that other competing answers, like Alan Wertheimer's, are too broad. I propose a new answer, a "vulnerability clause" to partially comprise a theory of wrongful exploitation. In so doing, I appeal to Marilyn Frye's account of oppression and take guidance from her inclusion and exclusion criteria.
引用
收藏
页码:619 / 629
页数:11
相关论文
共 50 条
  • [31] Vulnerability, Exploitation and Migrants: Insecure Work in a Globalised Economy
    Sales, Rosemary
    [J]. JOURNAL OF SOCIAL POLICY, 2017, 46 (04) : 837 - 839
  • [32] Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation
    Yoshioka, Katsunari
    Inoue, Daisuke
    Eto, Masashi
    Hoshizawa, Yuji
    Nogawa, Hiroki
    Nakao, Koji
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05): : 955 - 966
  • [34] Novel methods for assessment of vulnerability to financial exploitation (FE)
    Beach, Scott R.
    Czaja, Sara J.
    Schulz, Richard
    [J]. JOURNAL OF ELDER ABUSE & NEGLECT, 2023, 35 (4-5) : 151 - 173
  • [35] Risk Assessment by Dynamic Representation of Vulnerability, Exploitation, and Impact
    Cam, Hasan
    [J]. CYBER SENSING 2015, 2015, 9458
  • [36] Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks
    Moustafa, Nour
    Turnbull, Benjamin
    Choo, Kim-Kwang Raymond
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INTERNET (ICII 2018), 2018, : 139 - 145
  • [37] VULNERABILITY OF PESTS - STUDY AND EXPLOITATION FOR SAFER CHEMICAL CONTROL
    HOLLINGWORTH, RM
    [J]. ACS SYMPOSIUM SERIES, 1987, 336 : 54 - 76
  • [38] Hands-on Lab on Smart City Vulnerability Exploitation
    Gomez, Andrew
    Shahriar, Hossain
    Clincy, Victor
    Shalan, Atef
    [J]. 2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 1777 - 1782
  • [39] Vulnerability Exploitation Risk Assessment Based on Offensive Security Approach
    Yoon, Seong-Su
    Kim, Do-Yeon
    Kim, Ka-Kyung
    Euom, Ieck-Chae
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (22):
  • [40] Research on Automatic Exploitation of House of Spirit Heap Overflow Vulnerability
    Li, Minglei
    Lu, Yuliang
    Huang, Hui
    Zhang, Chao
    Zhao, Jiazhen
    [J]. PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 751 - 757