Shared vulnerabilities in research.
نویسنده
چکیده
The U.S. Code of Federal Regulations governing federally funded research on human subjects assumes that harmful research is sometimes morally justifiable because the beneficiaries of that research share a particular vulnerability with its subjects. In this article, I argue against this assumption, which occurs in every subpart of the Code of Federal Regulations that deals with specific vulnerable populations (pregnant women, fetuses, neonates, prisoners, and children). I argue that shared vulnerability is no exception to the general principle that harming one person in order to benefit another is no more justifiable if the two people have traits in common. Further, shared vulnerability is not a reasonable proxy for any morally relevant desideratum of research, in particular the desire to benefit the worst off, the desire to avoid exploitation, and the desire to use vulnerable populations in research only when necessary.
منابع مشابه
Vulnerability Analysis: An Extended Abstract
> Davis. His research areas include computer and network security, > especially analysis of vulnerabilities, building tools to detect > vulnerabilities, and ameliorating or eliminating them. >Subject Category: Vulnerabilities and Attacks > > >Extended Abstract: > >The goal of our work is to develop a methodology for detecting pre viously >unknown vulnerabilities in systems. > >We begin by argui...
متن کاملRunning Head : Bipolar – substance use comorbidity Bipolar Spectrum – Substance Use Co - occurrence : Behavioral Approach System ( BAS ) Sensitivity and Impulsiveness as Shared Personality Vulnerabilities
Acknowledgements: This research was supported by National Institute of Mental Health Grants MH 52617 and MH 77908 to Lauren B. Alloy, and MH 52662 to Lyn Y. Abramson. Abstract Bipolar disorders and substance use disorders (SUDs) show high co-occurrence. One explanation for this co-occurrence may be common personality vulnerabilities involved in both. We tested whether high Behavioral Approach S...
متن کاملEvaluating CVSS Base Score Using Vulnerability Rewards Programs
CVSS Base Score and the underlying metrics have been widely used. Recently there have been attempts to validate them. Some of the researchers have questioned the CVSS metrics based on a lack of correlation with the reported exploits and attacks. In this research, we use the independent scales used by the vulnerability reward programs (VRPs) to see if they correlate with the CVSS Base Score. We ...
متن کاملThe recognition of the necessity of for community-based disaster risk management to reduce the risk of vulnerability to earthquake disaster (case study: YousefAbad neighborhood of Tehran)
Disaster management and current attitudes in this area only focus on this areachr('39')s physical vulnerabilities, raising urban residentschr('39') exposure to these challenges in front of the earthquake. On the other hand, Incidental actions include reducing the vulnerability and the physical strengthening and promotion of poor organization during the disaster; they ignored the capabilities an...
متن کاملBipolar spectrum-substance use co-occurrence: Behavioral approach system (BAS) sensitivity and impulsiveness as shared personality vulnerabilities.
Bipolar disorders and substance use disorders (SUDs) show high co-occurrence. One explanation for this co-occurrence may be common personality vulnerabilities involved in both. The authors tested whether high behavioral approach system (BAS) sensitivity and impulsiveness are shared personality vulnerabilities in bipolar spectrum disorders and substance use problems and their co-occurrence in a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- The American journal of bioethics : AJOB
دوره 14 12 شماره
صفحات -
تاریخ انتشار 2014