Rules of conscience. Betray ethics, betray trust.
نویسنده
چکیده
Letters Rules of conscience Betray ethics, betray trust The harm caused by the interrogation methods described by Pope and Gutheil goes far beyond the considerable damage, sometimes fatal, of methods commonly understood to be torture. 1 When psychologists or doctors design and help to inflict such methods, they engage in three betrayals. They betray the trust and human rights of those who are tortured. They betray fundamental professional ethics. 2 And they betray the trust society places in such professionals. 3 The harm caused by acts that are physically, sexually, or psychologically damaging—for example, child abuse—is greater when a trusted figure is involved. 4 The Orwellian transformation of trusted professionals into those who use their training and skills to design and help inflict methods whose reality is masked by euphemisms such as "harsh" or "extreme" can interfere with the ability to reason realistically. 5 The trauma that occurs when professionals betray individuals, fundamental ethics, and society affects us all.
منابع مشابه
On Robustness of Trust Systems
Trust systems assist in dealing with users who may betray one another. Cunning users (attackers) may attempt to hide the fact that they betray others, deceiving the system. Trust systems that are difficult to deceive are considered more robust. To formally reason about robustness, we formally model the abilities of an attacker. We prove that the attacker model is maximal, i.e. 1) the attacker c...
متن کاملTrust and Privacy in Our Networked World
Trust is the attitude of expectation that another will behave according to the constraints of morality... There can be no trust where there is no possibility of error. More specifically, man cannot know that he is trusted unless he has the right to act without constant surveillance so that he knows he can betray the trust. Privacy confers that essential right... Without privacy and the possibil...
متن کاملTrustable Relays for Anonymous Communication
Current systems providing anonymous interactive communication [15, 22] are based on networks of anonymity-providing relays called MIXes. An important issue with such systems is that a MIX is able to betray its users, and thus it is necessary to use several MIXes sequentially for each communication, which distributes the trust among them. This increases the complexity of the protocols as well as...
متن کاملFingerprinting Algorithm Based on the Figure’s Collusion Data Base
Under the application occasion of using data base as the soft products publication, there should be corresponding safety system, which could abstain the privacy actions from the betray users. A privacy tracing and solution resolution is raised in this thesis based on the digital fingerprinting relationship data base. Data fingerprinting database, which combined by patent watermarking and user’s...
متن کاملPublic trust and government betrayal
This paper presents a simple model of government reputation which captures two characteristics of policy outcomes in less developed countries: governments which betray public trust do so erratically, and, after a betrayal, public trust is regained only gradually. ∗This paper was formerly titled “Randomly Bad Government.” The author has benefited greatly from discussions with Andrew Atkeson, V.V...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- BMJ
دوره 338 شماره
صفحات -
تاریخ انتشار 2009