Journal of Value Inquiry 53 (1):33-53 (2019)
Authors |
|
Abstract |
In this article I seek a more complete understanding of evil action. To this end, in
the first half of the article I assess the conceptual strengths and weaknesses of the
most compelling theories of evil action found in the contemporary philosophical
literature. I conclude that the theories that fall under the category I call ‘‘Nuanced
Harm Accounts’’ successfully identify the necessary and sufficient conditions of the
concept. However, necessary and sufficient conditions are not coextensive with
significant features, and Nuanced Harm Accounts are incomplete even if they are
correct. In order to supplement them, in the second half of the article I examine the
normative relation that obtains between perpetrators and victims of evil and find
them to be parties to a relation of asymmetrical power in which the vulnerability of
the weaker party is exploited by the stronger party for its advantage, pleasure, or
otherwise to achieve its aims. Moreover, the parties in the relation reciprocally
enable each other’s role relative to one another. The strength of the more powerful
party emerges out of the states of vulnerability of the victims, and the victims are
vulnerable relative to the power(s) of the perpetrator.
|
Keywords | Evil action Vulnerability Exploitation |
Categories | (categorize this paper) |
ISBN(s) | |
DOI | 10.1007/s10790-018-9637-x |
Options |
![]() ![]() ![]() ![]() |
Download options
References found in this work BETA
Frontiers of Justice: Disability, Nationality, Species Membership.Martha C. Nussbaum (ed.) - 2006 - Belknap Press.
View all 75 references / Add more references
Citations of this work BETA
No citations found.
Similar books and articles
Vulnerability and Exploitation in a Globalized World.Agomoni Ganguli Mitra & Nikola Biller-Andorno - 2013 - International Journal of Feminist Approaches to Bioethics 6 (1):91-102.
Exploitation and the Vulnerability Clause.Hallie Liberto - 2014 - Ethical Theory and Moral Practice 17 (4):619-629.
Exploitation as Wrongful Use: Beyond Taking Advantage of Vulnerabilities. [REVIEW]Tea Logar - 2010 - Acta Analytica 25 (3):329-346.
Human Being @ Risk: Enhancement, Technology, and the Evaluation of Vulnerability Transformations.Mark Coeckelbergh - 2013 - Springer.
Together in Need: Relational Selfhood, Vulnerability to Harm, and Enriching Attachments.Katharine Wolfe - 2016 - Southern Journal of Philosophy 54 (1):129-148.
Relational Evil, Relational Good: Thomas Aquinas and Process Thought.Catherine Jack Deavel - 2007 - International Philosophical Quarterly 47 (3):297-313.
Niccolò Machiavelli: Adviser of Princes.Philip J. Kain - 1995 - Canadian Journal of Philosophy 25 (1):33 - 55.
'Vulnerability', an Interesting Concept for Public Health: The Case of Older Persons.Florencia Luna - 2014 - Public Health Ethics 7 (2):180-194.
Niccolò Machiavelli --- Adviser of Princes.Philip J. Kain - 1995 - Canadian Journal of Philosophy 25 (1):33-55.
Evil Revisited - Responses to Hamilton.Eve Garrard - 1999 - Philosophical Explorations 2 (2):139 – 142.
Midwest Studies in Philosophy: The Concept of Evil.Peter A. French & Zachary J. Goldberg - 2012 - Wiley-Blackwell.
An Ethnomethodological Approach to Examine Exploitation in the Context of Capacity, Trust and Experience of Commercial Surrogacy in India.Sheela Saravanan - 2013 - Philosophy, Ethics, and Humanities in Medicine 8:10.
Analytics
Added to PP index
2018-05-16
Total views
36 ( #313,611 of 2,498,792 )
Recent downloads (6 months)
6 ( #118,323 of 2,498,792 )
2018-05-16
Total views
36 ( #313,611 of 2,498,792 )
Recent downloads (6 months)
6 ( #118,323 of 2,498,792 )
How can I increase my downloads?
Downloads