Switch to: References

Citations of:

Exploitation

Social Philosophy and Policy 12 (2):136--158 (1995)

Add citations

You must login to add citations.
  1. We could be heroes: ethical issues with the pre-recruitment of research participants.David Hunter - 2015 - Journal of Medical Ethics 41 (7):557-558.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Adjuncts Are Exploited.Scott Hill & Justin Klocksiem - 2021 - Philosophia 50 (3):1153-1173.
    Jason Brennan and Phillip Magness (2018) and (2020) argue that adjuncts are not exploited. We are sympathetic to some of their points. We agree, for example, that certain ways in which adjuncts are compared to sweatshop workers are offensive. For, as Brennan and Magness point out, there are many respects in which adjuncts are much better off than sweatshop workers. However, we show that the core insights of their paper are compatible with the view that adjuncts are exploited. Furthermore, their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Marx with Kant on exploitation.James Furner - 2015 - Contemporary Political Theory 14 (1):23-44.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Can Kant’s Formula of the End in Itself Condemn Capitalism?James Furner - 2019 - Kantian Review 24 (1):1-25.
    Kantian socialists at the turn of the twentieth century, as well as contemporary authors seeking a principle with which to condemn capitalism, have turned to Kant’s Formula of the End in Itself. This article assesses the arguments from FEI against capitalism from the perspective of the issues that arise in interpreting and applying Kant’s formula. There are various strategies with which a Kantian might use FEI to condemn conduct that Kant did not use FEI to condemn. The article asks whether (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Capitalism and the Organization of Displacement: Selma James’s Internationalism of the Unwaged.Katrina Forrester - forthcoming - Political Theory.
    As political theorists explore work beyond traditional workplaces, how should we understand the vast class of insecure, informal, and unsalaried workers whose existence defies traditional categories of employment? In asking this question, I revisit the political theory of the Marxist feminist and cofounder of the International Wages for Housework movement, Selma James, to explore her “internationalism of the unwaged” and her writings on wagelessness. An example of political theory in service of struggle, James’s internationalism was widely circulated in anticolonial, Black (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Exploitation and disadvantage.Benjamin Ferguson - 2016 - Economics and Philosophy 32 (3):485-509.
    According to some accounts of exploitation, most notably Ruth Sample’s degradation-based account and Robert Goodin’s vulnerability-based account, exploitation occurs when an advantaged party fails to constrain their advantage in light of another’s disadvantage, regardless of the cause of this disadvantage. Because the duty of constraint in these accounts does not depend on the cause of the disadvantage, the advantaged’s duty of constraint is what I call a ‘come-what-may’ duty. I show that come-what-may duties create moral hazards that can themselves be (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Are we all exploiters?Benjamin Ferguson - 2020 - Philosophy and Phenomenological Research 103 (3):535-546.
    This paper argues that two single-factor accounts of exploitation are inadequate and instead defends a two-factor account. Purely distributive accounts of exploitation, which equate exploitation with unfair transaction, make exploitation pervasive and cannot deliver the intuition that exploiters are blameworthy. Recent, non-distributive alternatives, which make unfairness unnecessary for exploitation, largely avoid these problems, but their arguments for the non-necessity of unfairness are unconvincing. This paper defends a two factor account according to which A exploits B iff A gains unfairly from (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Equitable Access to Human Biological Resources in Developing Countries: Benefit Sharing Without Undue Inducement.Roger Scarlin Chennells - 2015 - Cham: Imprint: Springer.
    The main question explored by the book is: How can cross-border access to human genetic resources, such as blood or DNA samples, be governed in such a way as to achieve equity for vulnerable populations in developing countries? The book situates the field of genomic and genetic research within global health and research frameworks, describing the concerns that have been raised about the potential unfairness in exchanges during recent decades. Access to and sharing in the benefits of human biological resources (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Benefit Sharing – From Biodiversity to Human Genetics.Doris Schroeder & Julie Cook Lucas (eds.) - 2013 - Dordrecht, Netherlands: Springer.
    Biomedical research is increasingly carried out in low- and middle-income countries. International consensus has largely been achieved around the importance of valid consent and protecting research participants from harm. But what are the responsibilities of researchers and funders to share the benefits of their research with research participants and their communities? After setting out the legal, ethical and conceptual frameworks for benefit sharing, this collection analyses seven historical cases to identify the ethical and policy challenges that arise in relation to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The Paradox of Exploitation: A New Solution.Benjamin Ferguson - 2013 - Dissertation, London School of Economics and Political Science
    In this thesis I present a rights-based theory of exploitation. I argue that successful conceptions of exploitation should begin with the ordinary language claim that exploitation involves `taking unfair advantage'. Consequently, they must combine an account of what it means to take advantage of another with an account of when transactions are unfair. Existing conceptions of exploitation fail to provide adequate accounts of both aspects of exploitation. -/- Hillel Steiner and John Roemer provide convincing accounts of the unfairness involved in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Explanatory Pluralism in Normative Ethics.Pekka Väyrynen - forthcoming - Oxford Studies in Normative Ethics.
    Some theorists of normative explanation argue that we can make sense of debates between first-order moral theories such as consequentialism and its rivals only if we understand their explanations of why the right acts are right and the wrong acts are wrong as generative (e.g. grounding) explanations. Others argue that the standard form of normative explanation is, instead, some kind of unification. Neither sort of explanatory monism can account for all the explanations of particular moral facts that moral theorists seek (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Exploitation.Matt Zwolinski, Benjamin Ferguson & Alan Wertheimer - 2022 - Stanford Encyclopedia of Philosophy.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Exploitative Epistemic Trust.Katherine Dormandy - 2020 - In Trust in Epistemology. New York City, New York, Vereinigte Staaten: pp. 241-264.
    Where there is trust, there is also vulnerability, and vulnerability can be exploited. Epistemic trust is no exception. This chapter maps the phenomenon of the exploitation of epistemic trust. I start with a discussion of how trust in general can be exploited; a key observation is that trust incurs vulnerabilities not just for the party doing the trusting, but also for the trustee (after all, trust can be burdensome), so either party can exploit the other. I apply these considerations to (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Let Them Sell Kidneys! : The Case Against the Case Against a Market in Organs.Philip Södermark - unknown
    It seems uncontroversial to state that meeting the vital medical needs of the vulnerable is agoal of great moral importance. Those in need of an organ transplant are among the mostvulnerable and yet society has to a large extent failed them. Many would-be organ recipientshave to wait for long periods of time before they get the organ that they need and some haveto wait until it is too late. Something has to change. One of the most widely discussedsolutions is to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The role of vulnerability in Kantian ethics.Paul Formosa - 2014 - In Catriona Mackenzie, Wendy Rogers & Susan Dodds (eds.), Vulnerability: New Essays in Ethics and Feminist Philosophy. New York: Oxford University Press. pp. 88-109.
    Does the fact that humans are vulnerable, needy and dependent beings play an important role in Kantian ethics? It is sometimes claimed that it cannot and does not. I argue that it can and does. I distinguish between broad (all persons are vulnerable) and narrow (only some persons are vulnerable) senses of vulnerability, and explain the role of vulnerability in both senses in Kantian ethics. The basis of this argument is to show that the core normative focus of Kantian ethics (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • A theory of wrongful exploitation.Mikhail Valdman - 2009 - Philosophers' Imprint 9:1-14.
    My primary aims in this paper are to explain what exploitation is, when it’s wrong, and what makes it wrong. I argue that exploitation is not always wrong, but that it can be, and that its wrongness cannot be fully explained with familiar moral constraints such as those against harming people, coercing them, or using them as a means, or with familiar moral obligations such as an obligation to rescue those in distress or not to take advantage of people’s vulnerabilities. (...)
    Download  
     
    Export citation  
     
    Bookmark   52 citations