Switch to: Citations

References in:

Technology as Terrorism: Police Control Technologies and Drone Warfare

In Scott Robbins, Alastair Reed, Seamus Miller & Adam Henschke (eds.), Counter-Terrorism, Ethics, and Technology: Emerging Challenges At The Frontiers Of Counter-Terrorism,. Springer. pp. 1-21 (2021)

Add references

You must login to add references.
  1. The ethical application of biometric facial recognition technology.Marcus Smith & Seumas Miller - 2022 - AI and Society 37 (1):167-175.
    Biometric facial recognition is an artificial intelligence technology involving the automated comparison of facial features, used by law enforcement to identify unknown suspects from photographs and closed circuit television. Its capability is expanding rapidly in association with artificial intelligence and has great potential to solve crime. However, it also carries significant privacy and other ethical implications that require law and regulation. This article examines the rise of biometric facial recognition, current applications and legal developments, and conducts an ethical analysis of (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Trump, Parler, and regulating the infosphere as our commons.Luciano Floridi - 2021 - Philosophy and Technology 34 (1):1–⁠5.
    Following the storming of the US Capitol building, Donald Trump became digitally toxic, and was deplatformed from Facebook, Instagram, Twitter and YouTube—as well as a host of other social media networks. Subsequent debate has centred on the questions of whether these companies did the right thing and the possible ramifications of their actions for the future of digital societies along with their democratic organisation. This article seeks to answer this question through examining complex, and seemingly contradictory notions (legality and the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Surveillance, Snowden, and Big Data: Capacities, consequences, critique.David Lyon - 2014 - Big Data and Society 1 (2).
    The Snowden revelations about National Security Agency surveillance, starting in 2013, along with the ambiguous complicity of internet companies and the international controversies that followed provide a perfect segue into contemporary conundrums of surveillance and Big Data. Attention has shifted from late C20th information technologies and networks to a C21st focus on data, currently crystallized in “Big Data.” Big Data intensifies certain surveillance trends associated with information technology and networks, and is thus implicated in fresh but fluid configurations. This is (...)
    Download  
     
    Export citation  
     
    Bookmark   43 citations  
  • We need to talk about deception in social robotics!Amanda Sharkey & Noel Sharkey - 2020 - Ethics and Information Technology 23 (3):309-316.
    Although some authors claim that deception requires intention, we argue that there can be deception in social robotics, whether or not it is intended. By focusing on the deceived rather than the deceiver, we propose that false beliefs can be created in the absence of intention. Supporting evidence is found in both human and animal examples. Instead of assuming that deception is wrong only when carried out to benefit the deceiver, we propose that deception in social robotics is wrong when (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Autonomous weapons systems and the moral equality of combatants.Michael Skerker, Duncan Purves & Ryan Jenkins - 2020 - Ethics and Information Technology 22 (3):197-209.
    To many, the idea of autonomous weapons systems (AWS) killing human beings is grotesque. Yet critics have had difficulty explaining why it should make a significant moral difference if a human combatant is killed by an AWS as opposed to being killed by a human combatant. The purpose of this paper is to explore the roots of various deontological concerns with AWS and to consider whether these concerns are distinct from any concerns that also apply to long-distance, human-guided weaponry. We (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Staying Engaged in Terrorism: Narrative Accounts of Sustaining Participation in Violent Extremism.Neil Ferguson & James W. McAuley - 2020 - Frontiers in Psychology 11.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Ethics, Security, and the War Machine: The True Cost of the Military.Ned Dobos - 2020 - New York, NY: Oxford University Press.
    This book addresses the question of when and why it is justifiable for a polity to prepare for war by militarizing. In doing so it highlights the ways in which a civilian population compromises its own security in maintaining a permanent military establishment, and explores the moral and social costs of militarization.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Oppressive Things.Shen-yi Liao & Bryce Huebner - 2020 - Philosophy and Phenomenological Research 103 (1):92-113.
    In analyzing oppressive systems like racism, social theorists have articulated accounts of the dynamic interaction and mutual dependence between psychological components, such as individuals’ patterns of thought and action, and social components, such as formal institutions and informal interactions. We argue for the further inclusion of physical components, such as material artifacts and spatial environments. Drawing on socially situated and ecologically embedded approaches in the cognitive sciences, we argue that physical components of racism are not only shaped by, but also (...)
    Download  
     
    Export citation  
     
    Bookmark   42 citations  
  • Out of Proportion? On Surveillance and the Proportionality Requirement.Kira Vrist Rønn & Kasper Lippert-Rasmussen - 2020 - Ethical Theory and Moral Practice 23 (1):181-199.
    In this article, we critically scrutinize the principle of proportionality when used in the context of security and government surveillance. We argue that McMahan’s distinction from just warfare between narrow proportionality and wide proportionality can generally apply to the context of surveillance. We argue that narrow proportionality applies more or less directly to cases in which the surveilled is liable and that the wide proportionality principle applies to cases characterized by ‘collateral intrusion’. We argue, however, that a more demanding criterion (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Race, Ideology, and the Communicative Theory of Punishment.Steven Swartzer - 2019 - Philosophers' Imprint 19:1-22.
    This paper explores communicative punishment from a non-idealized perspective. I argue that, given the specific racial dynamics involved, and given the broader social and historical context in which they are embedded, American policing and punishment function as a form of racially derogatory discourse. Understood as communicative behavior, criminal justice activities express a commitment to a broader ideology. Given the facts about how the American justice system actually operates, and given its broader socio-political context, American carceral behaviors express a commitment to (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Trust and resilient autonomous driving systems.Adam Henschke - 2020 - Ethics and Information Technology 22 (1):81-92.
    Autonomous vehicles, and the larger socio-technical systems that they are a part of are likely to have a deep and lasting impact on our societies. Trust is a key value that will play a role in the development of autonomous driving systems. This paper suggests that trust of autonomous driving systems will impact the ways that these systems are taken up, the norms and laws that guide them and the design of the systems themselves. Further to this, in order to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • A Misdirected Principle with a Catch: Explicability for AI.Scott Robbins - 2019 - Minds and Machines 29 (4):495-514.
    There is widespread agreement that there should be a principle requiring that artificial intelligence be ‘explicable’. Microsoft, Google, the World Economic Forum, the draft AI ethics guidelines for the EU commission, etc. all include a principle for AI that falls under the umbrella of ‘explicability’. Roughly, the principle states that “for AI to promote and not constrain human autonomy, our ‘decision about who should decide’ must be informed by knowledge of how AI would act instead of us” :689–707, 2018). There (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  • Distinction, Necessity, and Proportionality: Afghan Civilians’ Attitudes toward Wartime Harm.Janina Dill - 2019 - Ethics and International Affairs 33 (3):315-342.
    How do civilians react to being harmed in war? Existing studies argue that civilian casualties are strategically costly because civilian populations punish a belligerent who kills civilians and support the latter's opponent. Relying on eighty-seven semi-structured interviews with victims of coalition attacks in Afghanistan, this article shows that moral principles inform civilians’ attitudes toward their own harming. Their attitudes may therefore vary with the perceived circumstances of an attack. Civilians’ perception of harm as unintended and necessary, in accordance with the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The teleological account of proportional surveillance.Frej Klem Thomsen - 2020 - Res Publica (3):1-29.
    This article analyses proportionality as a potential element of a theory of morally justified surveillance, and sets out a teleological account. It draws on conceptions in criminal justice ethics and just war theory, defines teleological proportionality in the context of surveillance, and sketches some of the central values likely to go into the consideration. It then explores some of the ways in which deontologists might want to modify the account and illustrates the difficulties of doing so. Having set out the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Race, again: how face recognition technology reinforces racial discrimination.Fabio Bacchini & Ludovica Lorusso - 2019 - Journal of Information, Communication and Ethics in Society 17 (3):321-335.
    Purpose This study aims to explore whether face recognition technology – as it is intensely used by state and local police departments and law enforcement agencies – is racism free or, on the contrary, is affected by racial biases and/or racist prejudices, thus reinforcing overall racial discrimination. Design/methodology/approach The study investigates the causal pathways through which face recognition technology may reinforce the racial disproportion in enforcement; it also inquires whether it further discriminates black people by making them experience more racial (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • (1 other version)Feminism, democracy and the right to privacy.Annabelle Lever - 2005 - Minerva - An Internet Journal of Philosophy 9 (1).
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of solitude, intimacy and confidentiality and shows that, so described, people have legitimate interests in privacy. These interests are both personal and political, and provide the grounds for two different justifications of privacy rights. Though both are based on democratic concerns for the freedom and equality of individuals, these two justifications for privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • The Social Dimensions of Privacy.Beate Roessler & Dorota Mokrosinska (eds.) - 2015 - Cambridge University Press.
    Written by a select international group of leading privacy scholars, Social Dimensions of Privacy endorses and develops an innovative approach to privacy. By debating topical privacy cases in their specific research areas, the contributors explore the new privacy-sensitive areas: legal scholars and political theorists discuss the European and American approaches to privacy regulation; sociologists explore new forms of surveillance and privacy on social network sites; and philosophers revisit feminist critiques of privacy, discuss markets in personal data, issues of privacy in (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Technology and moral vacuums in just war theorising.Elke Schwarz - 2018 - Journal of International Political Theory 14 (3):280-298.
    Our contemporary condition is deeply infused with scientific-technological rationales. These influence and shape our ethical reasoning on war, including the moral status of civilians and the moral choices available to us. In this article, I discuss how technology shapes and directs the moral choices available to us by setting parameters for moral deliberation. I argue that technology has moral significance for just war thinking, yet this is often overlooked in attempts to assess who is liable to harm in war and (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Government Surveillance and Why Defining Privacy Matters in a Post‐Snowden World.Kevin Macnish - 2016 - Journal of Applied Philosophy (2).
    There is a long-running debate as to whether privacy is a matter of control or access. This has become more important following revelations made by Edward Snowden in 2013 regarding the collection of vast swathes of data from the Internet by signals intelligence agencies such as NSA and GCHQ. The nature of this collection is such that if the control account is correct then there has been a significant invasion of people's privacy. If, though, the access account is correct then (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  • (1 other version)Free Speech: A Philosophical Enquiry.Frederick Schauer - 1984 - Philosophy and Rhetoric 17 (3):176-178.
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  • Secrets: On the Ethics of Concealment and Revelation.Sissela Bok - 1985 - Philosophy 60 (231):143-145.
    Download  
     
    Export citation  
     
    Bookmark   89 citations  
  • Morality and Political Violence * By C. A. J. COADY. [REVIEW]C. Coady - 2009 - Analysis 69 (2):390-392.
    Coady understands political violence to include war as well as terrorism, interventionism, revolution and the violence of mercenaries. His discussion ranges widely over the concept of violence, terrorism, weapons of mass destruction and ethical issues surrounding mercenaries. Some of this has appeared in print before, but much of it is new.Although war is but one form of political violence, in his view, much of his concern is with the just war tradition. Contrary to some contemporary just war theorists, who question (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.Marwan Albahar - 2019 - Science and Engineering Ethics 25 (4):993-1006.
    In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been as high as it is (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Living by Algorithm: Smart Surveillance and the Society of Control.Sean Erwin - 2015 - Humanities and Technology Review 34:28-69.
    Foucault’s disciplinary society and his notion of panopticism are often invoked in discussions regarding electronic surveillance. Against this use of Foucault, I argue that contemporary trends in surveillance technology abstract human bodies from their territorial settings, separating them into a series of discrete flows through what Deleuze will term, the surveillant assemblage. The surveillant assemblage and its product, the socially sorted body, aim less at molding, punishing and controlling the body and more at triggering events of in- and ex-clusion from (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Rights and State Punishment.Christopher Wellman - 2009 - Journal of Philosophy 106 (8):419-439.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Arguments against Drone Warfare with a Focus on the Immorality of Remote Control Killing and "Deadly Surveillance".Harry van der Linden - 2016 - Radical Philosophy Review 19 (2):331-358.
    Drone warfare, particularly in the form of targeted killing, has serious legal, moral, and political costs so that a case can be made for an international treaty prohibiting this type of warfare. However, the case would be stronger if it could be shown that killing by drones is inherently immoral. From this angle I explore the moral significance of two features of this technology of killing: the killing is done by remote control with the operators geographically far away from the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The transparent self.Marjolein Lanzing - 2016 - Ethics and Information Technology 18 (1):9-16.
    This paper critically engages with new self-tracking technologies. In particular, it focuses on a conceptual tension between the idea that disclosing personal information increases one’s autonomy and the idea that informational privacy is a condition for autonomous personhood. I argue that while self-tracking may sometimes prove to be an adequate method to shed light on particular aspects of oneself and can be used to strengthen one’s autonomy, self-tracking technologies often cancel out these benefits by exposing too much about oneself to (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • The Moral Foundations of Social Institutions: A Philosophical Study.Seumas Miller - 2009 - Cambridge University Press.
    In this book, Seumas Miller examines the moral foundations of contemporary social institutions. Offering an original general theory of social institutions, he posits that all social institutions exist to realize various collective ends, indeed, to produce collective goods. He analyses key concepts such as collective responsibility and institutional corruption. Miller also provides distinctive special theories of particular institutions, including governments, welfare agencies, universities, police organizations, business corporations, and communications and information technology entities. These theories are philosophical and, thus, foundational and (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  • The Ethics of Intelligence: A New Framework.Ross Bellaby - 2014 - New York: Routledge.
    This book starts from the proposition that the field of intelligence lacks any systematic ethical review, and then develops a framework based on the notion of harm and the establishment of Just Intelligence Principles. As the professional practice of intelligence collection adapts to the changing environment of the twenty-first century, many academic experts and intelligence professionals have called for a coherent ethical framework that outlines exactly when, by what means and to what ends intelligence is justified. Recent controversies, including reports (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Binary Bullets: The Ethics of Cyberwarfare.Fritz Allhoff, Adam Henschke & Bradley Jay Strawser (eds.) - 2016 - New York, US: Oxford University Press USA.
    Philosophical and ethical discussions of warfare are often tied to emerging technologies and techniques. Today we are presented with what many believe is a radical shift in the nature of war-the realization of conflict in the cyber-realm, the so-called.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Proportionality in the Morality of War.Thomas Hurka - 2004 - Philosophy and Public Affairs 33 (1):34-66.
    Download  
     
    Export citation  
     
    Bookmark   114 citations  
  • Toward a Drone Accountability Regime.Allen Buchanan & Robert O. Keohane - 2015 - Ethics and International Affairs 29 (1):15-37.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • 33. Lying: Moral Choice in Public and Private Life.Sissela Bok - 2014 - In Bernard Williams (ed.), Essays and Reviews: 1959-2002. Princeton: Princeton University Press. pp. 161-165.
    Download  
     
    Export citation  
     
    Bookmark   131 citations  
  • Risk Society: Towards a New Modernity.Ulrich Beck, Mark Ritter & Jennifer Brown - 1993 - Environmental Values 2 (4):367-368.
    Download  
     
    Export citation  
     
    Bookmark   674 citations  
  • Balancing Security and Liberty: The Challenge of Sharing Foreign Signals Intelligence.Michael Hayden - 2005 - Notre Dame Journal of Law, Ethics and Public Policy 19 (1):247-260.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Moralizing Technology: Understanding and Designing the Morality of Things.Peter-Paul Verbeek - 2011 - University of Chicago Press.
    Technology permeates nearly every aspect of our daily lives. Cars enable us to travel long distances, mobile phones help us to communicate, and medical devices make it possible to detect and cure diseases. But these aids to existence are not simply neutral instruments: they give shape to what we do and how we experience the world. And because technology plays such an active role in shaping our daily actions and decisions, it is crucial, Peter-Paul Verbeek argues, that we consider the (...)
    Download  
     
    Export citation  
     
    Bookmark   101 citations  
  • An Eye for an Eye: Proportionality and Surveillance.Kevin Macnish - 2015 - Ethical Theory and Moral Practice 18 (3):529-548.
    It is often claimed that surveillance should be proportionate, but it is rarely made clear exactly what proportionate surveillance would look like beyond an intuitive sense of an act being excessive. I argue that surveillance should indeed be proportionate and draw on Thomas Hurka’s work on proportionality in war to inform the debate on surveillance. After distinguishing between the proportionality of surveillance per se, and surveillance as a particular act, I deal with objections to using proportionality as a legitimate ethical (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Constructing the Meaning of Social Licence.Richard Parsons & Kieren Moffat - 2014 - Social Epistemology 28 (3-4):340-363.
    Large companies must increasingly satisfy not only the conditions of their formal licences, but also the concerns and expectations of host communities and broader society. This has led to the emergence, particularly in the minerals industry, of the notion of “social licence”, an interdiscursive term whose meaning is rarely interrogated. We use textual analysis to critically investigate the construction of social licence discourse in minerals companies’ sustainable development reports and at a recent industry conference. We find that the texts mystify (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • War without virtue?Robert Sparrow - 2013 - In Bradley Jay Strawser (ed.), Killing by Remote Control: The Ethics of an Unmanned Military. New York, US: Oup Usa. pp. 84-105.
    A number of recent and influential accounts of military ethics have argued that there exists a distinctive “role morality” for members of the armed services—a “warrior code.” A “good warrior” is a person who cultivates and exercises the “martial” or “warrior” virtues. By transforming combat into a “desk job” that can be conducted from the safety of the home territory of advanced industrial powers without need for physical strength or martial valour, long-range robotic weapons, such as the “Predator” and “Reaper” (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • [Book review] legislating privacy, technology, social values, and public policy. [REVIEW]Priscilla M. Regan - 1998 - Business Ethics Quarterly 8 (4):723-742.
    Download  
     
    Export citation  
     
    Bookmark   38 citations  
  • Uneasy Access: Privacy for Women in a Free Society.Anita L. Allen - 1988 - Rowman & Littlefield Publishers.
    'Anita L. Allen breaks new ground...A stunning indictment of women's status in contemporary society, her book provides vital original scholarly research and insight.' |s-NEW DIRECTIONS FOR WOMEN.
    Download  
     
    Export citation  
     
    Bookmark   49 citations  
  • Killing by Remote Control: The Ethics of an Unmanned Military.Bradley Jay Strawser (ed.) - 2013 - New York, US: Oup Usa.
    A new powerful military weapon has appeared in the skies of world and with it a new form of warfare has quickly emerged bringing with it a host of pressing ethical questions and issues. Killing By Remote Control: The Ethics of an Unmanned Military brings together some of the best scholars currently working on these questions.
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • The Rights of the Guilty: Punishment and Political Legitimacy.Corey Brettschneider - 2007 - Political Theory 35 (2):175-199.
    In this essay I develop and defend a theory of state punishment within a wider conception of political legitimacy. While many moral theories of punishment focus on what is deserved by criminals, I theorize punishment within the specific context of the state's relationship to its citizens. Central to my account is Rawls's “liberal principle of legitimacy,” which requires that all state coercion be justifiable to all citizens. I extend this idea to the justification of political coercion to criminals qua citizens. (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Drones, information technology, and distance: mapping the moral epistemology of remote fighting. [REVIEW]Mark Coeckelbergh - 2013 - Ethics and Information Technology 15 (2):87-98.
    Ethical reflection on drone fighting suggests that this practice does not only create physical distance, but also moral distance: far removed from one’s opponent, it becomes easier to kill. This paper discusses this thesis, frames it as a moral-epistemological problem, and explores the role of information technology in bridging and creating distance. Inspired by a broad range of conceptual and empirical resources including ethics of robotics, psychology, phenomenology, and media reports, it is first argued that drone fighting, like other long-range (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Unblinking eyes: the ethics of automating surveillance.Kevin Macnish - 2012 - Ethics and Information Technology 14 (2):151-167.
    In this paper I critique the ethical implications of automating CCTV surveillance. I consider three modes of CCTV with respect to automation: manual, fully automated, and partially automated. In each of these I examine concerns posed by processing capacity, prejudice towards and profiling of surveilled subjects, and false positives and false negatives. While it might seem as if fully automated surveillance is an improvement over the manual alternative in these areas, I demonstrate that this is not necessarily the case. In (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Reassembling the Social: An Introduction to the Actor-Network Theory.Bruno Latour - 2005 - Oxford, England and New York, NY, USA: Oxford University Press.
    Latour is a world famous and widely published French sociologist who has written with great eloquence and perception about the relationship between people, science, and technology. He is also closely associated with the school of thought known as Actor Network Theory. In this book he sets out for the first time in one place his own ideas about Actor Network Theory and its relevance to management and organization theory.
    Download  
     
    Export citation  
     
    Bookmark   661 citations  
  • Privacy, Intimacy, and Isolation.Julie C. Inness - 1992 - New York, US: OUP Usa.
    From the Supreme Court to the bedroom, privacy is an intensely contested interest in our everyday lives and privacy law. Some people appeal to privacy to protect such critical areas as abortion, sexuality, and personal information. Yet, privacy skeptics argue that there is no such thing as a right to privacy. I argue that we cannot abandon the concept of privacy. If we wish to avoid extending this elusive concept to cover too much of our lives or shrinking it to (...)
    Download  
     
    Export citation  
     
    Bookmark   47 citations  
  • What Stakeholder Theory is Not.Andrew C. Wicks - 2003 - Business Ethics Quarterly 13 (4):479-502.
    Abstract:The term stakeholder is a powerful one. This is due, to a significant degree, to its conceptual breadth. The term means different things to different people and hence evokes praise or scorn from a wide variety of scholars and practitioners. Such breadth of interpretation, though one of stakeholder theory’s greatest strengths, is also one of its most prominent theoretical liabilities. The goal of the current paper is like that of a controlled burn that clears away some of the underbrush of (...)
    Download  
     
    Export citation  
     
    Bookmark   169 citations  
  • Proportionality and Self-Defense.Suzanne Uniacke - 2011 - Law and Philosophy 30 (3):253-272.
    Proportionality is widely accepted as a necessary condition of justified self-defense. What gives rise to this particular condition and what role it plays in the justification of self-defense seldom receive focused critical attention. In this paper I address the standard of proportionality applicable to personal self-defense and the role that proportionality plays in justifying the use of harmful force in self-defense. I argue against an equivalent harm view of proportionality in self-defense, and in favor of a standard of proportionality in (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • What Is Terrorism?Igor Primoratz - 1990 - Journal of Applied Philosophy 7 (2):129-138.
    ABSTRACT My aim in this paper is not to try to formulate the meaning the word ‘terrorism’has in ordinary use; the word is used in so many different, even incompatible ways, that such an enterprise would quickly prove futile. My aim is rather to try for a definition that captures the trait, or traits, of terrorism which cause most of us to view it with moral repugnance. I discuss the following questions: Is the historical connection of terrorism with terror to (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations