Shared vulnerabilities in research.

نویسنده

  • Eric Chwang
چکیده

The U.S. Code of Federal Regulations governing federally funded research on human subjects assumes that harmful research is sometimes morally justifiable because the beneficiaries of that research share a particular vulnerability with its subjects. In this article, I argue against this assumption, which occurs in every subpart of the Code of Federal Regulations that deals with specific vulnerable populations (pregnant women, fetuses, neonates, prisoners, and children). I argue that shared vulnerability is no exception to the general principle that harming one person in order to benefit another is no more justifiable if the two people have traits in common. Further, shared vulnerability is not a reasonable proxy for any morally relevant desideratum of research, in particular the desire to benefit the worst off, the desire to avoid exploitation, and the desire to use vulnerable populations in research only when necessary.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Vulnerability Analysis: An Extended Abstract

> Davis. His research areas include computer and network security, > especially analysis of vulnerabilities, building tools to detect > vulnerabilities, and ameliorating or eliminating them. >Subject Category: Vulnerabilities and Attacks > > >Extended Abstract: > >The goal of our work is to develop a methodology for detecting pre viously >unknown vulnerabilities in systems. > >We begin by argui...

متن کامل

Running Head : Bipolar – substance use comorbidity Bipolar Spectrum – Substance Use Co - occurrence : Behavioral Approach System ( BAS ) Sensitivity and Impulsiveness as Shared Personality Vulnerabilities

Acknowledgements: This research was supported by National Institute of Mental Health Grants MH 52617 and MH 77908 to Lauren B. Alloy, and MH 52662 to Lyn Y. Abramson. Abstract Bipolar disorders and substance use disorders (SUDs) show high co-occurrence. One explanation for this co-occurrence may be common personality vulnerabilities involved in both. We tested whether high Behavioral Approach S...

متن کامل

Evaluating CVSS Base Score Using Vulnerability Rewards Programs

CVSS Base Score and the underlying metrics have been widely used. Recently there have been attempts to validate them. Some of the researchers have questioned the CVSS metrics based on a lack of correlation with the reported exploits and attacks. In this research, we use the independent scales used by the vulnerability reward programs (VRPs) to see if they correlate with the CVSS Base Score. We ...

متن کامل

The recognition of the necessity of for community-based disaster risk management to reduce the risk of vulnerability to earthquake disaster (case study: YousefAbad neighborhood of Tehran)

Disaster management and current attitudes in this area only focus on this areachr('39')s physical vulnerabilities, raising urban residentschr('39') exposure to these challenges in front of the earthquake. On the other hand, Incidental actions include reducing the vulnerability and the physical strengthening and promotion of poor organization during the disaster; they ignored the capabilities an...

متن کامل

Bipolar spectrum-substance use co-occurrence: Behavioral approach system (BAS) sensitivity and impulsiveness as shared personality vulnerabilities.

Bipolar disorders and substance use disorders (SUDs) show high co-occurrence. One explanation for this co-occurrence may be common personality vulnerabilities involved in both. The authors tested whether high behavioral approach system (BAS) sensitivity and impulsiveness are shared personality vulnerabilities in bipolar spectrum disorders and substance use problems and their co-occurrence in a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • The American journal of bioethics : AJOB

دوره 14 12  شماره 

صفحات  -

تاریخ انتشار 2014