Plausible Deniability and Evasion of Burden of Proof
نویسنده
چکیده
This article examines the normative structure of certain distinctive types of arguments that use techniques of plausible deniablility to evade fulfillment of legitimate requirements of burden of proof. Understanding how such techniques are used in everyday argumentation is shown to be crucial to gaining insight into how informal fallacies work as effective tactics of deception when two parties reason together. The techniques use an indirect form of putting forward a proposition that a target respondent (or audience) is meant to accept, while building in a defense to shield off the need to respond to any request to justify (or give evidence to support) the proposition queried by the respondent. Jamieson (1992, p. 84) cites a technique of "veiled attack" used in recent political campaigns where a "double message" buries a "taboo" proposition in a socially acceptable surface (coded) text of discourse. The goal is to achieve "plausible deniability," as illustrated by the following case (Jamieson, 1992, p. 84):
منابع مشابه
Plausible Deniability
In this paper, we introduce the notion of Plausible Deniability in an information theoretic framework. We consider a scenario where an entity that eavesdrops through a broadcast channel summons one of the parties in a communication protocol to reveal their message (or signal vector). It is desirable that the summoned party have the option to reveal as little of the true message as possible by p...
متن کاملIt wasn't me! Plausible Deniability in Web Search
Our ability to control the flow of sensitive personal information to online systems is key to trust in personal privacy on the internet. We ask how to detect, assess and defend user privacy in the face of search engine personalisation? We develop practical and scalable tools allowing a user to detect, assess and defend against threats to plausible deniability. We show that threats to plausible ...
متن کاملPlausible Deniability in Web Search - From Detection to Assessment
Web personalisation uses what systems know about us to create content targeted at our interests. When unwanted personalisation suggests we are interested in sensitive or embarrassing topics a natural reaction is to deny interest. This is a practical response only if denial of our interest is credible or plausible. Adopting a definition of plausible deniability in the usual sense of “on the bala...
متن کاملOn The Plausible Deniability Feature of Internet Protocols
We present an examination of a design feature named “plausible deniability” which has been widely adopted in key exchange protocols, in particular, in IKEv2 and in signature-based modes of IKE. We expose an authentication flaw in these modes of IKE and IKEv2 which is due in part to the presence of this plausible deniability feature. The flaw is also present in the protocols SIGMA [18] and Σ0, Σ...
متن کاملفرار مالیاتی در واردات ایران، رویکرد مدل ترکیبی شبکه عصبی مصنوعی و الگوریتم تبرید تدریجی
Import tax is one of the government revenue sources that some of its portion is not accessible to government due to tax evasion. In this study, the factors affecting tax evasion in import, have been identified by using the combinatorial model of artificial neural network and simulated annealing algorithms that is capable to analyze the nonlinear systems. For this purpose, four explanatory varia...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1996