Plausible Deniability and Evasion of Burden of Proof

نویسنده

  • DOUGLAS WALTON
چکیده

This article examines the normative structure of certain distinctive types of arguments that use techniques of plausible deniablility to evade fulfillment of legitimate requirements of burden of proof. Understanding how such techniques are used in everyday argumentation is shown to be crucial to gaining insight into how informal fallacies work as effective tactics of deception when two parties reason together. The techniques use an indirect form of putting forward a proposition that a target respondent (or audience) is meant to accept, while building in a defense to shield off the need to respond to any request to justify (or give evidence to support) the proposition queried by the respondent. Jamieson (1992, p. 84) cites a technique of "veiled attack" used in recent political campaigns where a "double message" buries a "taboo" proposition in a socially acceptable surface (coded) text of discourse. The goal is to achieve "plausible deniability," as illustrated by the following case (Jamieson, 1992, p. 84):

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Plausible Deniability

In this paper, we introduce the notion of Plausible Deniability in an information theoretic framework. We consider a scenario where an entity that eavesdrops through a broadcast channel summons one of the parties in a communication protocol to reveal their message (or signal vector). It is desirable that the summoned party have the option to reveal as little of the true message as possible by p...

متن کامل

It wasn't me! Plausible Deniability in Web Search

Our ability to control the flow of sensitive personal information to online systems is key to trust in personal privacy on the internet. We ask how to detect, assess and defend user privacy in the face of search engine personalisation? We develop practical and scalable tools allowing a user to detect, assess and defend against threats to plausible deniability. We show that threats to plausible ...

متن کامل

Plausible Deniability in Web Search - From Detection to Assessment

Web personalisation uses what systems know about us to create content targeted at our interests. When unwanted personalisation suggests we are interested in sensitive or embarrassing topics a natural reaction is to deny interest. This is a practical response only if denial of our interest is credible or plausible. Adopting a definition of plausible deniability in the usual sense of “on the bala...

متن کامل

On The Plausible Deniability Feature of Internet Protocols

We present an examination of a design feature named “plausible deniability” which has been widely adopted in key exchange protocols, in particular, in IKEv2 and in signature-based modes of IKE. We expose an authentication flaw in these modes of IKE and IKEv2 which is due in part to the presence of this plausible deniability feature. The flaw is also present in the protocols SIGMA [18] and Σ0, Σ...

متن کامل

فرار مالیاتی در واردات ایران، رویکرد مدل ترکیبی شبکه عصبی مصنوعی و الگوریتم تبرید تدریجی

Import tax is one of the government revenue sources that some of its portion is not accessible to government due to tax evasion. In this study, the factors affecting tax evasion in import, have been identified by using the combinatorial model of artificial neural network and simulated annealing algorithms that is capable to analyze the nonlinear systems. For this purpose, four explanatory varia...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996