Switch to: References

Citations of:

How Bad Is Rape?

Hypatia 2 (2):125-138 (1987)

Add citations

You must login to add citations.
  1. Rethinking the wrong of rape1.Karyn L. Freedman - 2021 - Philosophical Issues 31 (1):104-127.
    In their well-known paper, John Gardner and Stephen Shute (2000) propose a pure case of rape, in which a woman is raped while unconscious and the rape, for a variety of stipulated reasons, never comes to light. This makes the pure case a harmless case of rape, or so they argue. In this paper I show that their argument hinges on an outdated conception of trauma, one which conflates evaluative responses that arise in the aftermath of rape with the non-deliberative (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Can a Woman Rape a Man and Why Does It Matter?Natasha McKeever - 2019 - Criminal Law and Philosophy 13 (4):599-619.
    Under current UK legislation, only a man can commit rape. This paper argues that this is an unjustified double standard that reinforces problematic gendered stereotypes about male and female sexuality. I first reject three potential justifications for making penile penetration a condition of rape: it is physically impossible for a woman to rape a man; it is a more serious offence to forcibly penetrate someone than to force them to penetrate you; rape is a gendered crime. I argue that, as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Is Sex With Robots Rape?Romy Eskens - 2017 - Journal of Practical Ethics 5 (2):62-76.
    It is widely accepted that valid consent is a necessary condition for permissible sexual activity. Since non-human animals, children, and individuals who are severely cognitively disabled, heavily intoxicated or unconscious, lack the cognitive capacity to give valid consent, this condition explains why it is impermissible to have sex with them. However, contrary to common intuitions, the same condition seems to render it impermissible to have sex with robots, for they too are incapable of consenting to sex due to insufficient cognitive (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • What is Wrong with Being a Pervert.David L. Hildebrand - 2009 - Southwest Philosophy Review 25 (1):173-179.
    Download  
     
    Export citation  
     
    Bookmark  
  • Moral Injury and Relational Harm: Analyzing Rape in Darfur.Sarah Clark Miller - 2009 - Journal of Social Philosophy 40 (4):504-523.
    Rather than focusing on the legal and political questions that surround genocidal rape, in this paper I treat a vital area of inquiry that has received much less attention: the moral significance of genocidal rape. My aim is to augment existing moral accounts of rape in order to address the specific contexts of genocidal rape. I move beyond understanding rape primarily as a violation of an individual's interests or agential abilities. The account I offer builds on these approaches (as well (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Enforced pregnancy, rape, and the image of woman.Ann E. Cudd - 1990 - Philosophical Studies 60 (1-2):47 - 59.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The wrong of rape.David Archard - 2007 - Philosophical Quarterly 57 (228):374–393.
    If rape is evaluated as a serious wrong, can it also be defined as non-consensual sex (NCS)? Many do not see all instances of NCS as seriously wrongful. I argue that rape is both properly defined as NCS and properly evaluated as a serious wrong. First, I distinguish the hurtfulness of rape from its wrongfulness; secondly, I classify its harms and characterize its essential wrongfulness; thirdly, I criticize a view of rape as merely ‘sex minus consent’; fourthly, I criticize mistaken (...)
    Download  
     
    Export citation  
     
    Bookmark   42 citations  
  • Going dark: anonymising technology in cyberspace.Ross W. Bellaby - 2018 - Ethics and Information Technology 20 (3):189-204.
    Anonymising technologies are cyber-tools that protect people from online surveillance, hiding who they are, what information they have stored and what websites they are looking at. Whether it is anonymising online activity through ‘TOR’ and its onion routing, 256-bit encryption on communications sent or smart phone auto-deletes, the user’s identity and activity is protected from the watchful eyes of the intelligence community. This represents a clear challenge to intelligence actors as it prevents them access to information that many would argue (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation