Switch to: References

Citations of:

An anatomy of values

Cambridge,: Harvard University Press (1970)

Add citations

You must login to add citations.
  1. Actual — V. (rawlsian) hypothetical-consent.Conrad Johnson - 1975 - Philosophical Studies 28 (1):41 - 48.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  • Integration and authority: rescuing the ‘one thought too many’ problem.Nicholas Smyth - 2018 - Canadian Journal of Philosophy 48 (6):812-830.
    Four decades ago, Bernard Williams accused Kantian moral theory of providing agents with ‘one thought too many’. The general consensus among contemporary Kantians is that this objection has been decisively answered. In this paper, I reconstruct the problem, showing that Williams was not principally concerned with how agents are to think in emergency situations, but rather with how moral theories are to be integrated into recognizably human lives. I show that various Kantian responses to Williams provide inadequate materials for solving (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Autonomy, Competence and Non-interference.Joseph T. F. Roberts - 2018 - HEC Forum 30 (3):235-252.
    In light of the variety of uses of the term autonomy in recent bioethics literature, in this paper, I suggest that competence, not being as contested, is better placed to play the anti-paternalistic role currently assigned to autonomy. The demonstration of competence, I will argue, can provide individuals with robust spheres of non-interference in which they can pursue their lives in accordance with their own values. This protection from paternalism is achieved by granting individuals rights to non-interference upon demonstration of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Why the Duty to Self-Censor Requires Social-Media Users to Maintain Their Own Privacy.Earl Spurgin - 2019 - Res Publica 25 (1):1-19.
    Revelations of personal matters often have negative consequences for social-media users. These consequences trigger frequent warnings, practical rather than moral in nature, that social-media users should consider carefully what they reveal about themselves since their revelations might cause them various difficulties in the future. I set aside such practical considerations and argue that social-media users have a moral obligation to maintain their own privacy that is rooted in the duty to self-censor. Although Anita L. Allen provides a paternalist justification of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The Ethics of Virtual Reality Technology: Social Hazards and Public Policy Recommendations.James S. Spiegel - 2018 - Science and Engineering Ethics 24 (5):1537-1550.
    This article explores four major areas of moral concern regarding virtual reality technologies. First, VR poses potential mental health risks, including Depersonalization/Derealization Disorder. Second, VR technology raises serious concerns related to personal neglect of users’ own actual bodies and real physical environments. Third, VR technologies may be used to record personal data which could be deployed in ways that threaten personal privacy and present a danger related to manipulation of users’ beliefs, emotions, and behaviors. Finally, there are other moral and (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Privacy, Informed Consent, and Participant Observation.Julie Zahle - 2017 - Perspectives on Science 25 (4):465-487.
    In the literature on social research, adherence to the principle of informed consent is sometimes recommended on the ground that the privacy of those being studied is hereby protected. The principle has it that before becoming part of a study, a competent individual must receive information about its purpose, use, etc., and on this basis freely agree to participate. Joan Sieber motivates the employment of informed consent as a way to safeguard research participants' privacy as follows: "A research experience regarded (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Immoral Risks: A Deontological Critique of Nuclear Deterrence: DOUGLAS P. LACKEY.Douglas P. Lackey - 1985 - Social Philosophy and Policy 3 (1):154-175.
    I. Beyond Utilitarianism In the summer of 1982, I published an article called “Missiles and Morals,” in which I argued on utilitarian grounds that nuclear deterrence in its present form is not morally justifiable. The argument of “Missiles and Morals” compared the most likely sort of nuclear war to develop under nuclear deterrence with the most likely sort of nuclear war to develop under American unilateral nuclear disaramament. For a variety of reasons, I claimed diat the number of casualties in (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Brain Privacy, Intimacy, and Authenticity: Why a Complete Lack of the Former Might Undermine Neither of the Latter!Kasper Lippert-Rasmussen - 2017 - Res Publica 23 (2):227-244.
    In recent years, neuroscience has been making dramatic progress. The discipline holds great promise but also raises a number of important ethical concerns. Among these is the concern that, some day in the distant future, we will have brain scanners capable of reading our minds, thus making our inner thoughts transparent to others. There are at least two reasons why we might regret our resulting loss of privacy. One is, so the argument goes, that this would undermine our ability to (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • An Emotional-Freedom Defense of Schadenfreude.Earl Spurgin - 2015 - Ethical Theory and Moral Practice 18 (4):767-784.
    Schadenfreude is the emotion we experience when we obtain pleasure from others’ misfortunes. Typically, we are not proud of it and admit experiencing it only sheepishly or apologetically. Philosophers typically view it, and the disposition to experience it, as moral failings. Two recent defenders of Schadenfreude, however, argue that it is morally permissible because it stems from judgments about the just deserts of those who suffer misfortunes. I also defend Schadenfreude, but on different grounds that overcome two deficiencies of those (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
    This paper offers a general theory of privacy, a theory that takes privacy to consist in being free from certain kinds of intrusions. On this understanding, privacy interests are distinct and distinguishable from those in solitude, anonymity, and property, for example, or from the fact that others possess, with neither consent nor permission, personal information about oneself. Privacy intrusions have both epistemic and psychological components, and can range in value from relatively trivial considerations to those of profound consequence for an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • When Should Philosophers Be Silent?Jason Decker & Charles Taliaferro - 2012 - Philosophy 87 (2):163-187.
    Are there general precepts governing when philosophers should not conduct inquiry on a given topic? When, if ever, should a philosopher just be silent? In this paper we look at a number of practical, epistemic, and moral arguments for philosophical silence. Some are quite general, and suggest that it is best never to engage in philosophical inquiry, while others are more domain - or context - specific. We argue that these arguments fail to establish their conclusions. We do, however, try (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Full‐Frontal Morality: The Naked Truth about Gender.Talia Mae Bettcher - 2012 - Hypatia 27 (2):319-337.
    This paper examines Harold Garfinkel's notion of the natural attitude about sex and his claim that it is fundamentally moral in nature. The author looks beneath the natural attitude in order to explain its peculiar resilience and oppressive force. There she reveals a moral order grounded in the dichotomously sexed bodies so constituted through boundaries governing privacy and decency. In particular, naked bodies are sex-differentiated within a system of genital representation through gender presentation—a system that helps constitute the very boundaries (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Privacy and the Right to Privacy.H. J. McCloskey - 1980 - Philosophy 55 (211):17 - 38.
    The right to privacy is one of the rights most widely demanded today. Privacy has not always so been demanded. The reasons for the present concern for privacy are complex and obscure. They obviously relate both to the possibilities for very considerable enjoyment of privacy by the bulk of people living in affluent societies brought about by twentieth-century affluence, and to the development of very efficient methods of thoroughly and systematically invading this newly found privacy. However, interesting and important as (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • Disarming nuclear apologists.Robert E. Goodin - 1985 - Inquiry: An Interdisciplinary Journal of Philosophy 28 (1-4):153 – 176.
    Here I distinguish the four logically possible ways in which nuclear weapons might be used: in an all?out nuclear strike, either first or second; or in a limited strike, either first or second. I go on to show that neither of the two most basic moral perspectives, consequentialistic or deontological, would permit nuclear weapons to be used in any of those four ways; nor would they permit an empty threat to use them. Nuclear weapons are thus shown to be morally (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Intrinsic vs. extrinsic value.Michael J. Zimmerman - 2019 - Stanford Encyclopedia of Philosophy.
    Intrinsic value has traditionally been thought to lie at the heart of ethics. Philosophers use a number of terms to refer to such value. The intrinsic value of something is said to be the value that that thing has “in itself,” or “for its own sake,” or “as such,” or “in its own right.” Extrinsic value is value that is not intrinsic.
    Download  
     
    Export citation  
     
    Bookmark   35 citations  
  • The Morality in Intimacy.Jeremy David Fix - 2022 - In Uriah Kriegel (ed.), Oxford studies in philosophy of mind. Oxford, United Kingdom: Oxford University Press.
    Is the exemplar of modern ethical theory estranged from their intimates because the motive of duty dominates their motivational psychology? While this challenge against modern ethical theory is familiar, I argue that with respect to a certain strand of Kantian ethical theory, it does not so much as make sense. I explain the content and functional role of the motive of duty in the psychology of the moral exemplar, stressing in particular how that motive shapes and informs the content of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The Skills of Justice.Paul Bloomfield - 2021 - In Ellen Fridland & Pavase Carlotta (eds.), The Routledge Handbook of Skills and Expertise. Rutledge. pp. 460-475.
    Download  
     
    Export citation  
     
    Bookmark  
  • Storing paediatric genomic data for sequential interrogation across the lifespan.Christopher Gyngell, Fiona Lynch, Danya Vears, Hilary Bowman-Smart, Julian Savulescu & John Christodoulou - forthcoming - Journal of Medical Ethics.
    Genomic sequencing (GS) is increasingly used in paediatric medicine to aid in screening, research and treatment. Some health systems are trialling GS as a first-line test in newborn screening programmes. Questions about what to do with genomic data after it has been generated are becoming more pertinent. While other research has outlined the ethical reasons for storing deidentified genomic data to be used in research, the ethical case for storing data for future clinical use has not been explicated. In this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Doxastic Harm.Anne Baril - 2022 - Midwest Studies in Philosophy 46:281-306.
    In this article, I will consider whether, and in what way, doxastic states can harm. I’ll first consider whether, and in what way, a person’s doxastic state can harm her, before turning to the question of whether, and in what way, it can harm someone else.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Wouldn’t It Be Nice: Enticing Reasons for Love.N. L. Engel-Hawbecker - 2021 - In Simon Cushing (ed.), New Philosophical Essays on Love and Loving. Palgrave-Macmillan. pp. 195-214.
    A central debate in the philosophy of love is whether people can love one another for good reasons. Reasons for love seem to help us sympathetically understand and evaluate love or even count as loving at all. But it can seem that if reasons for love existed, they could require forms of love that are presumably illicit. It might seem that only some form of wishful thinking would lead us to believe reasons for love could never do this. However, if (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Interpretation of the Right to Privacy from the Perspective of the Use of New Technologies.Justyna E. Kulikowska-Kulesza - 2020 - Studies in Logic, Grammar and Rhetoric 65 (1):93-102.
    Today’s reality, largely based on the development of technology, carries with it many dangers for various spheres of our lives. One of the areas most at risk is our privacyand thus our right to privacy. It is one of the fundamental human rights, but unfortunately today it is exposed to many violations. This article is an attempt to interpret the right to privacy, and it shows selected threats to this right from the perspective of the development of new technologies.
    Download  
     
    Export citation  
     
    Bookmark  
  • The value of privileged access.Jared Peterson - 2020 - European Journal of Philosophy 29 (2):365-378.
    European Journal of Philosophy, EarlyView.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Introduction to the Special Issue on the Ethics of State Mass Surveillance.Peter Königs - 2020 - Moral Philosophy and Politics 7 (1):1-8.
    Recent decades have seen an unprecedented proliferation of surveillance programs by government agencies. This development has been driven both by technological progress, which has made large scale surveillance operations relatively cheap and easy, and by the threat of terrorism, organized crime and pandemics, which supplies a ready justification for surveillance. For a long time, mass surveillance programs have been associated with autocratic regimes, most notoriously with the German Democratic Republic and the Stasi, its secret police. A more recent case in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Esoteric Confucianism, Moral Dilemmas, and Filial Piety.William Sin - 2020 - Metaphilosophy 51 (2-3):206-225.
    Two controversial cases in Confucian literature present the demands of filial piety as conflicting with those of impartial justice. Let us call them the Case of Concealment (Analects 18.13) and the Case of Evasion (Mencius 7A53). A dogmatic reading of the texts indicates that both Confucius and Mencius give more weight to filial piety than to justice. This essay, however, provides an alternative reading of the cases: the liberal reading. I argue that the Confucian teachers used the cases as moral (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Cybersecurity in health – disentangling value tensions.Michele Loi, Markus Christen, Nadine Kleine & Karsten Weber - 2019 - Journal of Information, Communication and Ethics in Society 17 (2):229-245.
    Purpose Cybersecurity in healthcare has become an urgent matter in recent years due to various malicious attacks on hospitals and other parts of the healthcare infrastructure. The purpose of this paper is to provide an outline of how core values of the health systems, such as the principles of biomedical ethics, are in a supportive or conflicting relation to cybersecurity. Design/methodology/approach This paper claims that it is possible to map the desiderata relevant to cybersecurity onto the four principles of medical (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Two Concepts of Group Privacy.Michele Loi & Markus Christen - 2020 - Philosophy and Technology 33 (2):207-224.
    Luciano Floridi was not the first to discuss the idea of group privacy, but he was perhaps the first to discuss it in relation to the insights derived from big data analytics. He has argued that it is important to investigate the possibility that groups have rights to privacy that are not reducible to the privacy of individuals forming such groups. In this paper, we introduce a distinction between two concepts of group privacy. The first, the “what happens in Vegas (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for assessment (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Strange DNA: The rise of DNA Analysis for Family Reunification and its Ethical Implications.Martin G. Weiss - 2011 - Genomics, Society and Policy 7 (1):1-20.
    DNA analysis for family reunification is a longstanding and widespread practice, but also a highly problematic one, as it is a battleground of conflicting values and interests, which have to be carefully weighed against each other: on the one hand, the right of the sovereign state to regulate immigration and prevent fraud and child trafficking; on the other hand, the right to privacy and family life. Beyond the problem of how to balance these different interests, DNA analysis for family reunification (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Predictive Brain Implants: Advance Directives with a Mechanical Twist.Zak Kopeikin - 2015 - American Journal of Bioethics Neuroscience 6 (4):44-46.
    Download  
     
    Export citation  
     
    Bookmark  
  • Anti-Theism and the Objective Meaningful Life Argument.Kirk Lougheed - 2017 - Dialogue 56 (2).
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • A Right against Risk-Imposition and the Problem of Paralysis.Sune Holm - 2016 - Ethical Theory and Moral Practice 19 (4):917-930.
    In this paper I examine the prospects for a rights-based approach to the morality of pure risk-imposition. In particular, I discuss a practical challenge to proponents of the thesis that we have a right against being imposed a risk of harm. According to an influential criticism, a right against risk-imposition will rule out all ordinary activities. The paper examines two strategies that rights theorists may follow in response to this “Paralysis Problem”. The first strategy introduces a threshold for when a (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  • Why Not NIMBY?Simon Feldman & Derek Turner - 2010 - Ethics, Place and Environment 13 (3):251-266.
    This paper examines a particularly egregious example of a NIMBY claim and considers three proposals for explaining what about that claim might be ethically problematic: The NIMBY claimant is being selfish or self-serving; The NIMBY claim cannot be morally justified, because respecting everyone's NIMBY claims leaves communities worse off; and if policymakers were to defer to people's NIMBY claims, they would end up perpetuating environmental injustices. We argue that these proposals fail to explain why there is anything wrong with the (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Virtue, Privacy and Self-Determination.Giannis Stamatellos - 2011 - International Journal of Cyber Ethics in Education 1 (4):35-41.
    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user’s identity and freedom. In normative ethical theory the need for an informational self-deterministic approach of privacy is stressed with greater emphasis on the control over personal (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy, technology, and social change.Daniel P. Hillyard & Sarah M. Knight - 2004 - Knowledge, Technology & Policy 17 (1):81-101.
    Download  
     
    Export citation  
     
    Bookmark  
  • Liberalismo, inmigración y justicia global: Obligaciones especiales hacia nuestros conciudadanos.Daniel Loewe - 2010 - Isegoría 43:435-458.
    El artículo defiende la tesis de que el liberalismo igualitario nos lleva a una teoría de justicia global y, como parte de ésta, a un derecho de inmigración. Así, el peso de la prueba contra la justicia global y la inmigración se desplaza hacia aquéllos que las desean limitar. Un argumento corriente es que las obligaciones especiales hacia nuestros conciudadanos tienen prioridad sobre las obligaciones generales de justicia. El artículo examina argumentos particularistas y reduccionistas a favor de estas obligaciones especiales, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Which Orphans Will Find a Home? The Rule of Rescue in Resource Allocation for Rare Diseases.Emily A. Largent & Steven D. Pearson - 2012 - Hastings Center Report 42 (1):27-34.
    The rule of rescue describes the moral impulse to save identifiable lives in immediate danger at any expense. Think of the extremes taken to rescue a small child who has fallen down a well, a woman pinned beneath the rubble of an earthquake, or a submarine crew trapped on the ocean floor. No effort is deemed too great. Yet should this same moral instinct to rescue, regardless of cost, be applied in the emergency room, the hospital, or the community clinic? (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Philosophy, privacy, and pervasive computing.Diane P. Michelfelder - 2010 - AI and Society 25 (1):61-70.
    Philosophers and others concerned with the moral good of personal privacy most often see threats to privacy raised by the development of pervasive computing as primarily being threats to the loss of control over personal information. Two reasons in particular lend this approach plausibility. One reason is that the parallels between pervasive computing and ordinary networked computing, where everyday transactions over the Internet raise concerns about personal information privacy, appear stronger than their differences. Another reason is that the individual devices (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Agreeing in Ignorance: Mapping the Routinisation of Consent in ICT-Services.Thomas Ploug & Søren Holm - 2014 - Science and Engineering Ethics 20 (4):1097-1110.
    Many ICT services require that users explicitly consent to conditions of use and policies for the protection of personal information. This consent may become ‘routinised’. We define the concept of routinisation and investigate to what extent routinisation occurs as well as the factors influencing routinisation in a survey study of internet use. We show that routinisation is common and that it is influenced by factors including gender, age, educational level and average daily internet use. We further explore the reasons users (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • A pragmatic theory of truth and ontology.Stewart Edward Granger - unknown
    At the heart of my pragmatic theory of truth and ontology is a view of the relation between language and reality which I term internal justification: a way of explaining how sentences may have truth-values which we cannot discover without invoking the need for the mystery of a correspondence relation. The epistemology upon which the theory depend~ is fallibilist and holistic ; places heavy reliance on modal idioms ; and leads to the conclusion that current versions of realism and anti-realism (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy, public health, and controlling medical information.Adam D. Moore - 2010 - HEC Forum 22 (3):225-240.
    This paper argues that individuals do, in a sense, own or have exclusive claims to control their personal information and body parts. It begins by sketching several arguments that support presumptive claims to informational privacy, turning then to consider cases which illustrate when and how privacy may be overridden by public health concerns.
    Download  
     
    Export citation  
     
    Bookmark  
  • The Theory and Practice of Applied Ethics.Barry Hoffmaster - 1991 - Dialogue 30 (3):213-.
    Applied ethics is at a watershed. In all its domains a gulf between the theory of applied ethics and the practice of applied ethics is now being recognized. In medical ethics, for example, it has been observed that “practicing clinicians often feel let down by bioethics.” The disappointment of clinicians is attributed in part to their own unrealistic expectations but is also said to be a function ofthe extent to which bioethics as a discipline doesn't seem to be in possession (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Rights to Punish for Libertarians.Jordan Howard Sobel - 1995 - Dialogue 34 (4):675-.
    Thomas Hurka derives rights to punish from what I will term the Libertarian Rights Principle, which is “that there is really only one natural right, namely the equal right of all persons to the most extensive liberty compatible with a like liberty for other persons, and that all other natural rights are species or instances of the right to liberty.” These rights to punish, he says, extend only to punishing violators of rights, never to “punishing” the innocent; extend only to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • In Defense of the Ideal of a Life Plan.Joe Mintoff - 2009 - Southern Journal of Philosophy 47 (2):159-186.
    Aristotle claims at Eudemian Ethics 1.2 that everyone who can live according to his own choice should adopt some goal for the good life, which he will keep in view in all his actions, for not to have done so is a sign of folly. This is an opinion shared by other ancients as well as some moderns. Others believe, however, that this view is false to the human condition, and provide a number of objections: (1) you can’t plan love; (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Health risks and the health care professional.Helen L. Treanor - 2000 - Medicine, Health Care and Philosophy 3 (3):251-254.
    Health care professionals are one of a large group of individuals who are exposed to significant risks by virtue of their occupation, such as the police, mountain rescuers, fire-service. The types of risk to which health care professionals are exposed are numerous, many of which remain largely unrecognised by the public and may even be underestimated by the professionals themselves. Examples of these health risks include fatigue, emotional/psychological trauma, physical injury caused by the use of machinery, back injuries, possible even (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Justice and the Compulsory Taking of Live Body parts.Cécile Fabre - 2003 - Utilitas 15 (2):127.
    This paper argues that, if one thinks that the needy have a right to the material resources they need in order to lead decent lives, one must be committed, in some cases, to conferring on the sick a right that the healthy give them some of the body parts they need to lead such a life. I then assess two objections against that view, to wit: to confer on the sick a right to the live body parts of the healthy (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Double effect, double intention, and asymmetric warfare.Steven Lee - 2004 - Journal of Military Ethics 3 (3):233-251.
    Modern warfare cannot be conducted without civilians being killed. In order to reconcile this fact with the principle of discrimination in just war theory, the principle is applied through the doctrine of double effect. But this doctrine is morally inadequate because it is too permissive regarding the risk to civilians. For this reason, Michael Walzer has suggested that the doctrine be supplemented with what he calls the idea of double intention: combatants are not only to refrain from intending to harm (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • How to Say Things with Walls.A. J. Skillen - 1980 - Philosophy 55 (214):509 - 523.
    I want to discuss a view of punishment which stresses its ‘expressive’ character and seeks in that its justification. While I shall label this view ‘expressionism’, I should warn that most theorists who express an ‘expressionist’ view do not present it as an exhaustive account, but rather claim to be highlighting an aspect that tends to be neglected within the rationalist framework common to retributivism and utilitarianism. Among contemporary writings I shall focus on Joel Feinberg's article, ‘The Expressive Function of (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • Sentimentalist Virtue and Moral Judgement: Outline of a Project.Michael Slote - 2003 - Metaphilosophy 34 (1‐2):131-143.
    Ethical rationalism has recently dominated the philosophical landscape, but sentimentalist forms of normative ethics (such as the ethics of caring) and of metaethics (such as Blackburn's projectivism and various ideal–observer and response–dependent views) have also been prominent. But none of this has been systematic in the manner of Hume and Hutcheson. Hume based both ethics and metaethics in his notion of sympathy, but the project sketched here focuses rather on the (related) notion of empathy. I argue that empathy is essential (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Privacy.Judith DeCew - 2008 - Stanford Encyclopedia of Philosophy.
    Download  
     
    Export citation  
     
    Bookmark   23 citations