Switch to: References

Citations of:

Freedom of Speech and Its Limits

Springer Verlag (1999)

Add citations

You must login to add citations.
  1. Legitimacy, political equality, and majority rule.Wojciech Sadurski - 2008 - Ratio Juris 21 (1):39-65.
    This paper claims that the intuitive and widespread legitimating power of majority rule (MR) arises from the link between majority rule and the principle of equality of political opportunity. The egalitarian character of MR is established by exploring “puzzles” in democratic theory, such as the insensitivity of democratic voting procedures to unequal intensity of citizens' preferences, and the relationship between the principle of unanimity (sometimes thought better to respect citizens' equality) and MR. Special attention is directed to the relationship between (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • Why Snowden and not Greenwald? On the Accountability of the Press for Unauthorized Disclosures of Classified Information.Dorota Mokrosinska - 2020 - Law and Philosophy 39 (2):203-238.
    In 2013, following the leaks by Edward Snowden, The Guardian published a number of classified NSA documents. Both leaking and publishing leaks violate the law prohibiting unauthorized disclosures. Accordingly, there are two potential targets for prosecution: the leakers and the press. In practice, however, only the leakers are prosecuted: Snowden is facing a threat of 30 years’ imprisonment; no charges have been made against The Guardian. If both leaking and publishing leaks violate the law, why prosecute only the leakers and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Freedom of Expression, Internet Responsibility, and Business Ethics: The Yahoo! Saga and Its Implications. [REVIEW]Raphael Cohen-Almagor - 2012 - Journal of Business Ethics 106 (3):353-365.
    In the late 1990s, the Internet seemed a perfect medium for business: a facilitator of unlimited economical propositions to people without any regulatory limitations. Cases such as that of Yahoo! mark the beginning of the end of that illusion. They demonstrate that Internet service providers (ISPs) have to respect domestic state legislation in order to avoid legal risks. Yahoo! was wrong to ignore French national laws and the plea to remove Nazi memorabilia from its auction site. Its legal struggle proved (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  • Should Managers Talk About Rights?Tom Campbell - 2003 - Philosophy of Management 3 (2):3-11.
    Controversy surrounds the ‘intrusion’ of the discourse of rights into workplace relationships. This is explored by examining the nature of rights through the analysis of the idea of a ‘right to manage’. Purported justifications of the right to manage in terms of either property or contract are shown to be inadequate, thus illustrating the need to incorporate a degree of consequentialism in the articulation and justification of rights. The value of a rights-approach is argued to lie in the identification of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  • Constitutional Conflicts, Moral Dilemmas, and Legal Solutions.Silvina Alvarez - 2011 - Ratio Juris 24 (1):59-74.
    The article focuses on the definition of constitutional conflicts as moral dilemmas. It discusses the conception of tragic conflicts by which “loss” is a distinctive feature that identifies both moral and constitutional dilemmas. It also asserts the peculiarity of constitutional conflicts vis-à-vis moral dilemmas, as well as the possibility of legal solutions to constitutional conflicts.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Technology as Terrorism: Police Control Technologies and Drone Warfare.Jessica Wolfendale - 2021 - In Scott Robbins, Alastair Reed, Seamus Miller & Adam Henschke (eds.), Counter-Terrorism, Ethics, and Technology: Emerging Challenges At The Frontiers Of Counter-Terrorism,. Springer. pp. 1-21.
    Debates about terrorism and technology often focus on the potential uses of technology by non-state terrorist actors and by states as forms of counterterrorism. Yet, little has been written about how technology shapes how we think about terrorism. In this chapter I argue that technology, and the language we use to talk about technology, constrains and shapes our understanding of the nature, scope, and impact of terrorism, particularly in relation to state terrorism. After exploring the ways in which technology shapes (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation