SlideShare una empresa de Scribd logo
1 de 26
All posts should be written in your own words and be
referenced and cited with at least one scholarly peer-reviewed
journal article to support your position. That means even if you
are replying to another person’s posts, your post still needs to
be original, and referenced, and cited with a scholarly peer -
reviewed journal article. The reason that PRJA citations and
references are a requirement is that it elevates the discussion.
The citation also allows readers to understand exactly what
portion of the post is paraphrased from the reference. No direct
quotes are allowed - paraphrasing is expected.
The source in which you are required to reference and cite in
your discussion posts needs to come from a peer-reviewed
journal article. A book (textbook or otherwise) is not
appropriate. Your post and reference need to be original - not
something that another student has posted and or used.
You must include an APA or AMA formatted citation and
reference in your post. Discussion participants may include the
instructor or students. The post must pertain to the discussion
board issue in which it is being posted.
Posts must be respectful of peers and show an insightful
response to a topic related to ethics in health care.
Your post will be evaluated using the following criteria:
Quality of Post (content, logic, depth, breadth) – 8 points: The
quality (8 of the 20 points) of the post is of primary importance.
The content, logic, depth, and breadth of your post are central
to my assessment of the post's quality. It should be your
original writing and the material you cite and reference to
support should be of the highest quality. It is not purely a
message indicating your opinion. The support must come from
at least one Peer-Reviewed Journal Article (PRJA). The lack of
a PRJA affects the overall quality of the post.
The support of a peer-reviewed journal article – 4 points: How
the PRJA supports the content of the post is critical (4 of to 20
points). The PRJA should provide meaningful evidence to the
cited portion of your message.
Grammar, construction, academic tone – 4 points: The tone of
the Required Discussion Board forums is formal. It is wise for
you to evaluate the writing of your post using an editor, like
grammarly.com. The basic grammarly.com editor (not the
premium version) is an essential tool for you to use.
Grammarly.com is free and gives you nearly immediate
feedback with suggestions for improvement.
Reference properly constructed – 3 points and Citation properly
constructed - 1 point: The reference (3 points out of 20 points)
and the citation (1 point out of 20 points) should be properly
constructed. A folder on the course website contains resources
that will help you with APA and AMA style. These two styles
are the only ones accepted in this class. Pick one and use it
throughout an assignment.
To post a message, click the name of the forum on the left side
of the page. On the next page, click the phrase "Create Thread".
Follow the prompts to indicate a subject and enter your
message. Finally, click
"Submit".
Peer-reviewed articles (PRJA) are a subset of scholarly articles.
They are special because they are published in academic
journals that explicitly state that submitted manuscripts will
undergo peer-review.
In academic publishing, the goal of peer review is to assess the
quality of articles submitted for publication in a scholarly
journal. Before an article is deemed appropriate to be published
in a peer-reviewed journal, it must undergo the following
process:
· The author of the article must submit it to the journal editor
who forwards the article to experts in the field. Because the
reviewers specialize in the same scholarly area as the author,
they are considered the author’s peers (hence “peer review”).
· These impartial reviewers are charged with carefully
evaluating the quality of the submitted manuscript.
· The peer reviewers check the manuscript for accuracy and
assess the validity of the research methodology and procedures.
· If appropriate, they suggest revisions. If they find the article
lacking in scholarly validity and rigor, they reject it.
Because a peer-reviewed journal will not publish articles that
fail to meet the standards established for a given discipline,
peer-reviewed articles that are accepted for publication
exemplify the best research practices in a field.
PRJAs do not come from magazines or newspapers. Magazine
and newspaper articles sometimes identify peer-reviewed
journal articles, so it is possible to use them in order to find a
peer-reviewed journal article.
A published journal is the entity that defines whether or not its
articles are peer reviewed.
Once you find an article that appears to support your response,
you should check with the journal to determine if it is peer
reviewed or not. These days virtually all journals will have a
website.
Let’s say that you have articles from 3 periodicals that appear to
support your response. They are The Journal of the American
Medical Association, Nature, and The New York Times.
If a journal does not state that it is peer-reviewed, it is not. Do
not cite or reference sourced without an explicit statement that
it is peer-reviewed on the journal’s website. You will see that
both JAMA and Nature are peer-reviewed, but the New Your
Times is not.
203© The Author(s) 2016
D.H. Barrett et al. (eds.), Public Health Ethics: Cases Spanning
the Globe,
Public Health Ethics Analysis 3, DOI 10.1007/978-3-319-
23847-0_7
Chapter 7
Vulnerability and Marginalized Populations
Anthony Wrigley and Angus Dawson
7.1 Introduction
Public health practitioners attempt to identify and then remove,
or at least reduce,
threats of harm. However, harm does not affect everyone in the
same way. Some
people and communities are resilient, whereas others are more
susceptible to poten-
tial harm. Much public health work is carried out by, or on
behalf of, government s.
Where people or communities are at great risk of harm,
government has a clear and
fi rm responsibility to protect its citizens. One way of
describing a potential source
of such a risk of harm is to focus on the idea of vulnerability .
This introduction
explores the concept of ‘vulnerability’ and the role that it may
play in public health.
Vulnerability is a concept often used in public health ethics
and more broadly in
bioethics —but its exact meaning is unclear. Roughly, it
indicates that an individual
or group is thought to have a particular status that may
adversely impact upon their
well-being, and that this implies an ethical duty to safeguard
that well-being because
the person or group is unable to do so adequately themselves.
This concept, although
important, consistently eludes precise defi nition. The diffi
culty in defi ning the con-
cept arises from disagreement as to how to characterize the idea
of “special status”
and to whom it applies. As a result, more and more categories
of individuals and
groups are being classifi ed as vulnerable in an ever-increasing
range of situations.
This raises the concern that almost everyone can be classifi ed
as vulnerable in some
The opinions , fi ndings , and conclusions of the authors do
not necessarily refl ect the offi cial posi-
tion , views , or policies of the editors , the editors ’ host
institutions , or the authors ’ host
institutions .
A. Wrigley , PhD
Centre for Professional Ethics , Keele University ,
Staffordshire , UK
A. Dawson , PhD (*)
Center for Values, Ethics and the Law in Medicine, Sydney
School of Public Health ,
The University of Sydney , Sydney , Australia
e-mail: [email protected]
mailto:[email protected]
204
way and, in turn, that almost every activity now requires this
additional attention. If
true, then the concept of ‘vulnerability’ ceases to be useful
because if everyone is
vulnerable, then no one is.
There is currently no clear, single, defi nitive account of this
concept that is univer-
sally accepted, although numerous different approaches have
been adopted by, for
example, various international bodies in their guideline s. In
this chapter, we shall
critically examine some leading defi nitions of vulnerability and
attempt to explain
and classify them to make clear the differences in approach.
Then we will offer an
account of vulnerability that seeks to provide a universal basis
for the everyday use
of the concept while avoiding the pitfalls associated with the
other defi nitions. Our
approach aims to reduce the concept to a simple role, not as a
basic moral concept in
its own right, but as a marker, or signal, to public health
practitioners that something
in the situation before them requires ethical attention. The real
ethical work is to be
done by the practitioner, not by vague appeal to the idea of
vulnerability, but via the
application of other concepts and ethical concerns that are
already familiar in public
health and bioethics . We shall use case studies to illustrate
how this approach works.
7.2 Different Approaches to the Concept of Vulnerability
Before looking at the approaches taken to defi ne vulnerability,
a worthwhile starting
point is to examine the concept that can be derived from the
term’s everyday use.
Vulnerability, in line with the etymological root of the w ord
meaning “to wound,” is
widely interpreted as
( V1 ) Open to harm or under threat of harm.
This basic defi nition is perfectly adequate, for a range of uses,
with context deter-
mining the nature and kind of harm at stake. However, such a
defi nition only captures
a broad background use as to how the concept should be
employed. Though this defi -
nition will be suffi cient for most purposes, further clarity and
greater specifi city of the
concept is needed here. In attempting to refi ne this basic defi
nition, several challenges
arise. First, how we formulate any defi nition will change
whether or not we see some-
one as vulnerable. Therefore, in providing a more substantial
defi nition, one has to
avoid the problem of inadvertently excluding those who should
be considered genu-
inely vulnerable or including those who are not vulnerable.
Second, if we want the
concept of vulnerability to function as something that generates
a duty or responsibil-
ity to prevent harms from befalling people, then we must
move beyond a basic, factual
description and include some normative ethical element,
something along the lines of
what Goodin c haracterizes as “the principle of protecting the
vulnerable” ( 1985 , 110).
Providing a sound defi nition of v ulnerability that satisfi es
these elements is more
diffi cult than might be expected. Hurst ( 2008 ) captured this
diffi culty well by liken-
ing it to the attempts of six blind men trying to describe an
elephant. As each blind
man touches a different part of the elephant—the trunk, ear,
tusk, tail, etc.—they
cannot agree on how to describe the animal. This analogy maps
directly to the chal-
lenge of defi ning vulnerability. Because different perspectives
abound on what con-
A. Wrigley and A. Dawson
205
stitutes the grounds of vulnerability, consensus on the defi
nition is diffi cult to reach
(Schroeder and Gefenas 2009 ).
Much of the focus on vulnerability in the bioethics literature
has been in research
ethics, where many international guidelines recommend or
impose some duty to
provide extra protection for those considered vulnerable.
However, these guideline s
generally fail to defi ne the concept (although the Council for
International
Organizations of Medical Sciences [CIOMS] ( 2002 ) does
provide a defi nition) and,
instead, list groups commonly considered vulnerable (U.S.
Department of Health,
Education, and Welfare 1979 ; World Medical Association
2013 ; CIOMS 1993 ).
Although this practice is slowly changing, strategies for
analyzing and defi ning the
concept are usually limited to simply adding or subtracting from
a list of properties,
conditions, or categories that typify what it is to be considered
vulnerable.
The approaches taken to defi ne vulnerability beyond everyday
use ( V1 ) can be
categorized broadly into three basic types:
( V2 ) Vulnerability is a universal condition that humanity has
in virtue of our physi-
cal or social nature (Fineman 2008 ; Hoffmaster 2006 ; Turner
2006 ; Rogers et al.
2012 ; MacIntyre 1999 ; International Bioethics Committee of
UNESCO [IBC]
2013 ; and to s ome extent Hart 1961 ).
or
( V3 ) Vulnerability involves one or more specifi c attributes,
contexts, or group types
(Rendtorff 2002 ; and this is perhaps also the approach taken
by the International
Bioethics Committee of UNESCO when it considers what it
calls special vulner-
abilities, 2013 , 5–6).
or
( V4 ) Vulnerability involves one (or more) familiar but
overarching ethical conc ept(s)
(Goodin 1985 ; Wrigley 2010 ).
Before we critically examine each approach, it is worth noting
that all defi nitions
are perfectly adequate depending on what we want the concept
to do or what role
we want it to play. One possible explanation for the failure to
produce a single, uni-
versally agreed-upon defi nition of this concept is that, put
simply, those who use the
term have different aims and roles in mind.
7.3 Concerns Surrounding Approach (V2): Universal
Condition
Approaches to the concept along the lines of ( V2 ) use
vulnerability to mark every
human as somehow open to harm—including physical injury,
dependency on oth-
ers, loss of power, and so forth—just by virtue of being human
(Fineman 2008 ).
Hence, by that logic, everyone is vulnerable because we all
have bodies that can be
injured, disabled, and fail through illness and old age. On this
view, we are also
7 Vulnerability and Marginalized Populations
206
vulnerable because whilst we live in social units that require
interdependence , high
quality interaction does not always exist.
( V2 ) is a very particular way of thinking about the concept of
vulnerability inas-
much as it motivates and drives discussion of the human
condition in general. However,
the major problem with such accounts is that the general truth
that we, as humans, are
open to harms of various kinds or that we live in social
groups, fails to pick out a spe-
cial category because it applies to absolutely everyone. It
becomes diffi cult to talk of
‘ degrees ’ or ‘ types ’ of vulnerability on such accounts. This,
in turn, has led to the criti-
cism that such an approach results in the “naturalizing” of the
concept, whereby it is
held to be normal or natural to be vulnerable in one way or
another (Luna 2009 ). Of
course, if the idea behind using the term ‘ vulnerable ’ is ( a ) to
articulate a fundamental
aspect of the human condition, ( b ), to say something
substantive about the interdepen-
dence of humans, and, perhaps, ( c ) to thereby affi rm a natural
commitment to human
solidarity , then much substantive (and controversial) content
is built into the concept,
and our discussion moves far from the everyday meaning of
vulnerability. If we are all
vulnerable, then appealing to this concept as a means to avoid a
harm or seek special
protection becomes problematic, as it is hard to see how
particular priorities can be set.
This approach makes vulnerability far too broad to serve as
anything other than
an underlying presumption about all human beings, and so it is
unable to generate
ethical duties beyond what we owe to every human by virtue
of being human. As a
result, this approach does not provide an account of
vulnerability that can identify
cases where people or groups are potentially open to harm in
any special way.
7.4 Concerns Surrounding Approach (V3): Specifi c
Attributes, Contexts, or Groups
In direct contrast to the approach taken in ( V2 ), ( V3 )
characterizes vulnerability by
identifying it with some specifi c attribute, context, or group
membership. This
approach focuses on vulnerability in terms of something , such
as physical vulnera-
bility, social vulnerability, vulnerability in terms of lacking
capacity, vulnerability in
terms of belonging to a certain identifi able group, or
vulnerability because of
belonging to a marginalized population, etc.
This approach to defi ning the concept is an excellent way of
illustrating the sorts
of conditions that we might want to pick out as requiring special
consideration in
terms of susceptibility to harm. As such, ( V3 ) serves as a
useful heuristic device
because it gives examples of the sorts of things that are often
considered vulnerabili-
ties. However, this check-list approach is to borrow David
Lewis’s ( 1986 ) phrase, an
attempt at explanation by “way of example,” whereby we
provide some key para-
digmatic examples or illustrations of what constitutes
vulnerability and state that
vulnerabilities are “these sorts of things.”
This approach does a poor job of defi ning vulnerability.
Listing everything that
falls under a concept, even if it were possible, does not give us
a good defi nition of
that concept. ( V3 ) neither tells us whether the examples listed
are appropriate nor
guides our decision making on controversial cases where
identifying someone as
A. Wrigley and A. Dawson
207
vulnerable is unclear. Further, by using the ( V3 ) approach,
attention is directed
away from the underlying question of what vulnerability is ;
and instead, the focus
is on whether or not to add a particular group to a continually
expanding unstruc-
tured list of examples (Rogers et al. 2012 ). Of course, any
such list might prove
useful as an aide memoir during, for example, an emergency
event. Such a prag-
matic role may be useful, but it should not be mistaken for an
ontological category
or conceptual boundary.
The ( V3 ) approach has therefore met with the criticism that it
is both too broad
and too narrow to satisfactorily defi ne vulnerability (Levine et
al. 2004 ; Schroeder
and Gefenas 2009 ; Luna 2009 ). Concerns about being too
broad stem from the list
of vulnerabilities becoming infl ated to the point where
“virtually all potential human
subjects are included” (Levine et al. 2004 ). As such, the same
concern for ( V2 )
applies to ( V3 ), since both approaches fail to specify in suffi
cient detail those who
need additional or special protection from harms .
( V3 ) is also, potentially, too narrow because it focuses all
attention onto specifi c
or group characteristics and therefore fails to address concerns
outside the particular
designated categories (Rogers et al. 2012 ). It will, therefore,
potentially miscatego-
rize certain individuals or groups as not being vulnerable if,
for example, they are a
group that has not been encountered previously or if some trait
has not made it onto
the list of specifi ed characteristics. Moreover, by focusing on
specifi c or group char-
acteristics, ( V3 ) can stereotype individuals who fall under
category headings (Scully
2013 ). If, for example, we assign names to different categories
of vulnerability (e.g.,
‘the elderly’, ‘the disabled,’ or ‘women,’ or ‘the poor’ as
categories of vulnerabil-
ity), then many people could be classifi ed as vulnerable
without them necessarily
being at any greater risk of harm.
7.5 Concerns Surrounding Approach (V4): Overarching
Concepts
The ( V4 ) approach explains vulnerability in terms of one or
more overarching but
more familiar ethical concept(s). Perhaps the best example of
this kind is Goodin ’s
( 1985 ) account of vulnerability, which builds on the everyday
use of the term
( V1 )— open to or under threat of harm— but goes a step
further by exploring what
the relevant harms might be. This leads Goodin to interpret
“harm” in terms of a
person’s “welfare” or “interests” so giving us an initial defi
nition of being vulnera-
ble in terms of ‘ being susceptible to harms to one ’ s interests
’( 1985 , 110–114).
However, as the concepts of ‘welfare’ and ‘interests’ can in
turn be open to a
great deal of interpretation, including the possibility of focusing
on subjective expli-
cations involving the satisfaction of preferences or desires,
further clarifi cation is
needed. To this end, Goodin suggests that a particular sub-group
of interests, that
is—people’s “vital interests” or “needs”—are the universally
important welfare
considerations that we need to be concerned about. On this
view, one is vulnerable
if one’s needs are threatened. And one is most vulnerable if
one’s most vital needs
are threatened.
7 Vulnerability and Marginalized Populations
208
Goodin also adds an explicit normative role to the concept of
vulnerability by
imposing an ethical duty to safeguard the potentially
vulnerable from harm. This
role is imperative if the concept of vulnerability is to be
anything more than a factual
description of an individual’s or a group’s characteristics.
Goodin does this by link-
ing his account of vulnerability to the “principle of protecting
the vulnerable,”
which is, essentially, an obligation to protect the vital
interests of others. Hence
there is a direct link between the classifi cation of someone as
being vulnerable, with
a requirement on the part of others to protect them from any
potential harms.
Despite being a highly infl uential account of vulnerability,
this approach has
been criticized. One concern is that it potentially promotes
widespread paternalism
in an attempt to meet others’ needs (Rogers et al. 2012 ),
thereby characterizing all
vulnerable people as, in some way, being helpless. This
criticism misses the mark,
though, because being vulnerable by Goodin’s account does not
mean one is power-
less. More telling, however, are the concerns that this account
does nothing more
than reduce the concept of vulnerability to the well-recognized
concept of needs,
together with a moral theory that demands we aid those in need.
In essence, this
implies that the concept of vulnerability is redundant and could
be replaced with the
concept of being in (serious) need.
7.6 Simplifying the Concept of Vulnerability (V5):
The Moral-Marker Approach
Rather than continuing this attempt to defi ne vulnerability
along the lines of the
approaches already mentioned ( V2 , V3 , and V4 ), an account
of vulnerability can be
offered in much simpler terms. Instead of seeking a substantive
defi nition that tries
to establish conditions for vulnerability, another option is to
interpret the word “vul-
nerability” as nothing more than an empty marker or signal for
potential moral
concern. This approach can be seen in Hurst’ s view of
vulnerability as a sign of
“increased likelihood of incurring additional or greater wrong” (
2008 ). However,
this view can be taken further. A formal moral-marker approach
simplifi es the
account of vulnerability by avoiding any reliance on moral
theory or preconceived
wrongs as part of the defi nition. On this account,
vulnerability will simply be
( V5 ) A marker that additional consideration needs to be
given to whatever existing
ethical issues there may be.
It can be seen that what is then in dispute between the different
accounts presented
is what sorts of considerations are the relevant ones. However,
if we stop at the point
where “vulnerability” is recognized as just a warning marker,
we don’t need to
engage with the substantial task of trying to provide a catch-all
defi nition that some-
how incorporates all physical, mental, or emotional, etc. cases
that might constitute
vulnerability. Instead, we can focus on substantive ethical
concepts such as harm,
consent, exploitation, etc. and explore how each applies to the
particular case before
us. On the basis of this approach, “vulnerability” says nothing
at all about what gen-
erates the need for any special scrutiny because the substantive
ethical weight of the
A. Wrigley and A. Dawson
209
concern (and how to address it) requires us to engage with these
substantive moral
concepts. So, for example, it says little to talk about
marginalized populations as
being vulnerable, but if we recognize the ‘moral marker’ of
vulnerability here, we
might then explore how exploitation, inequity , and harm are
relevant when deliberating
about a particular case. One of the priorities for educating
public health profession als
about ethical issues is to seek to increase their sensitivity to the
relevant features of
each situation, rather than teach them the formulaic application
of rules or vague
concepts such as that of “vulnerability” (Coughlin et al. 2012 ).
The ( V5 ) approach offers other advantages as well. For
example, it avoids stereo-
typing based merely on belonging to a specifi ed category; it
avoids exclusion on the
grounds of not already being on the list of vulnerable groups;
and it avoids the vacu-
ity of identifying “all” as vulnerable, while maintaining the
crucial aspect that the
concept marks out the need for special ethical scrutiny. Trying
to provide more
substantial components to the defi nition of vulnerability
diverts scrutiny and energy
from where it matters most—sensitive, rational thought about
specifi c problems—
and instead, promotes a formulaic approach to ethical
safeguarding.
Although other writers on vulnerability, such as Levine et al. (
2004 ) and Luna
( 2009 ), criticize this approach claiming generic guidance
about paying “special atten-
tion” or giving “special consideration” to something is not
useful, the same criticism
could also apply to an account that identifi es specifi c
categories or relies on some over-
riding concept. For example, if we try the specifi c category or
context route ( V3 ) so
that, say, we hold “the elderly” vulnerable, how would that
guide our actions without
reference to established concerns about, for example, physical
harms or exploitation?
The same holds true of ( V4 ) accounts such as Goodin ’s
focus on vulnerability as being
open to harms to one’s interests, which then requires further
analysis of “vital” needs.
The best that can be said for such accounts is that each provides
something of a heuris-
tic, teaching anyone who wants to learn ways in which harms
or wrongs might arise.
The importance and implications of these issues become
apparent as we consider the
various cases in the rest of this chapter. The implications of (
V2 ), the approach focused
on vulnerability as arising from the human condition, is that all
are vulnerable, includ-
ing the police and immigration offi cials in Blight’s and
McDougall’s cases, the public
health offi cials with responsibility for launching national
programs to reduce Sudden
Infant Death Syndrome (SIDS) in the Jonas and Haretuku
case, and the prison governor
in Christopher et al.’s case. This outcome demonstrates the key
problem with this view.
The very concept of vulnerability ceases to have much meaning,
although presumably
there might be a retreat to the thought that some individuals and
populations are ‘more’
vulnerable than others, although it is unclear how this is to be
specifi ed.
Many of the cases could more obviously be used to endorse (
V3 ), the approach
focused on specifi c groups, contexts, or categories. Many of
these cases focus on
marginalized groups within society, such as prison inmates
(Christopher et al.),
immigrants, asylum seekers , refugees (McDougall; Blight),
substance abusers
(Christopher et al.), minority communities of various kinds
(Bernard et al.; Blight;
Jonas and Haretuku), and the poor (Vergès et al.). This is a
traditional, infl uential,
and powerful way of thinking about vulnerability. However, as
stated previously,
this approach has its problems. Does it necessarily follow that if
you belong to one
of these groups that you are vulnerable? You may well be at
increased risk of harm
7 Vulnerability and Marginalized Populations
210
of various kinds if you belong to such groups. However, you
might also be at
increased risk of harm as a recreational drug user, skydiver, or
American football
player, although individuals belonging to such groups are not
likely to be seen,
intuitively, as being necessarily vulnerable.
The more specifi c focus on providing a normative explanation
for vulnerability pre-
sented in the work of writers such as Goodin ( V4 ), is more
useful, in that we can begin
to clearly identify subgroups that are at risk of harm to their
vital interests (the girl fed
through a tube and unable to feel pain involved in a forced
deportation case: Blight),
rather than just being routinely disadvantaged (the surrogate
encouraged to take on that
role because of poverty: Vergès et al.) or at increased risk of
harm due to the cultural
traditions or choices of their parent s (Jonas and Haretuku).
How should we think about
risk factors and vulnerability? Some will think of smoking
around children (increasing
the risk of SIDS) as being an individual’s choice. Others will
argue that it is unfair to
assume that it is always individuals that are responsible for such
choices and the
resultant outcomes, as people may be addicted to nicotine or
they may have become
smokers through the infl uence of norms within their social
environment.
The advantage of the ‘moral-marker’ approach ( V5 ) is that it
allows us to dive
beneath the surface offered by the label of ‘vulnerability’ and
offer more sophisticated
explanations for the situations described in the cases, as well as
providing the oppor-
tunity to develop strong normative reasons to respond. For
example, all of these cases
are about various kinds of injustice, disadvantage, and
inequities in society, and their
impact on individual and community health . They are
appropriate issues for those
working in public health to be concerned about precisely
because they provide refer-
ence to the identifi cation of various harms at the population-
level, and many of the
solutions to these issues will have to come through collective
and public action.
As the discussion of the different approaches to defi ning
vulnerability consid-
ered above illustrate, most of the approaches to vulnerability do
little more than
encourage us to engage in additional ethical scrutiny using
already well recognized
and well understood moral concepts. The fi nal ‘moral-marker’
approach ( V5 ) sug-
gests that this is exactly what the concept should be used for,
and nothing more.
References
Coughlin, S.S., A. Barker, and A. Dawson. 2012. Ethics and
scientifi c integrity in public health,
epidemiological and clinical research. Public Health Reviews
34(1): 71–83. http://www.publi-
chealthreviews.eu/upload/pdf_fi les/11/00_Coughlin.pdf .
Accessed 20 June 2015.
Council for International Organizations of Medical Sciences
(CIOMS). 1993. International ethical
guidelines for biomedical research involving human subjects ,
1st ed. Geneva: CIOMS.
Council for International Organizations of Medical Sciences.
2002. International ethical guide-
lines for biomedical research involving human subjects , 2nd ed.
Geneva: CIOMS.
Fineman, M.A. 2008. The vulnerable subject: Anchoring
equality in the human condition. Yale
Journal of Law and Feminism 20(1): 1–23.
Goodin, R.E. 1985. Protecting the vulnerable: A reanalysis of
our social responsibilities . Chicago:
University of Chicago Press.
Hart, H.L.A. 1961. The concept of law . Oxford: Oxford
University Press.
Hoffmaster, B. 2006. What does vulnerability mean? Hastings
Center Report 36(2): 38–45.
A. Wrigley and A. Dawson
http://www.publichealthreviews.eu/upload/pdf_files/11/00_Cou
ghlin.pdf
http://www.publichealthreviews.eu/upload/pdf_files/11/00_Cou
ghlin.pdf
211
Hurst, S.A. 2008. Vulnerability in research and health care,
describing the elephant in the room?
Bioethics 22(4): 191–202.
International Bioethics Committee (IBC) of UNESCO. 2013.
The principle of respect for human
vulnerability and personal integrity .
http://unesdoc.unesco.org/images/0021/002194/219494e.
pdf . Accessed 20 June 2105.
Levine, C., R. Faden, C. Grady, et al. 2004. The limitations of
“vulnerability” as a protection for
human research participants. American Journal of Bioethics
4(3): 44–49.
Lewis, D. 1986. On the plurality of worlds . Oxford:
Blackwell.
Luna, F. 2009. Elucidating the concept of vulnerability: Layers
not labels. International Journal of
Feminist Approaches to Bioethics 2(1): 121–139.
MacIntyre, A. 1999. Dependent rational animals: Why human
beings need the virtues . Chicago:
Open Court.
Rendtorff, J.D. 2002. Basic ethical principles in European
bioethics and biolaw: Autonomy, dig-
nity, integrity and vulnerability—Towards a foundation of
bioethics and biolaw. Medicine,
Health Care, and Philosophy 5(3): 235–244.
Rogers, W., C. MacKenzie, and S. Dodds. 2012. Why bioethics
needs a concept of vulnerability.
International Journal of Feminist Approaches to Bioethics
5(2): 11–38.
Schroeder, D., and E. Gefenas. 2009. Vulnerability: Too vague
and too broad? Cambridge
Quarterly of Healthcare Ethics 18(2): 113–121.
Scully, J.L. 2013. Disability and vulnerability: On bodies,
dependence, and power. In Vulnerability:
New essays in ethics and feminist philosophy , ed. C.
Mackenzie, W. Rogers, and S. Dodds.
New York: Oxford University Press.
Turner, B. 2006. Vulnerability and human rights . University
Park: Pennsylvania State University
Press.
U.S. Department of Health, Education, and Welfare. 1979. The
Belmont report: Ethical principles
and guidelines for the protection of human subjects of research ,
vol. Publication No. (OS)
78-0012. Washington, DC: U.S. Government Printing Offi ce.
Wrigley, A. 2010. Vulnerable and non-competent subjects. In
European textbook on ethics in
research , ed. J. Hughes, 49–74. Luxembourg: Publications Offi
ce of the European Union.
World Medical Association. 2013. Declaration of Helsinki —
Ethical …
All posts should be written in your own words and be referenced an

Más contenido relacionado

La actualidad más candente

The problem and purpose statement
The problem and purpose statementThe problem and purpose statement
The problem and purpose statementDam Frank
 
Ms 95 - research methodology for management decisions
Ms 95 - research methodology for management decisionsMs 95 - research methodology for management decisions
Ms 95 - research methodology for management decisionssmumbahelp
 
Behavior analysis and_behavior_modification-malott-tillema-glenn-1978-499pgs-edu
Behavior analysis and_behavior_modification-malott-tillema-glenn-1978-499pgs-eduBehavior analysis and_behavior_modification-malott-tillema-glenn-1978-499pgs-edu
Behavior analysis and_behavior_modification-malott-tillema-glenn-1978-499pgs-eduRareBooksnRecords
 
Problem statement of research
Problem statement of researchProblem statement of research
Problem statement of researchRichard Asare
 
Stating a problem (2)
Stating a problem (2)Stating a problem (2)
Stating a problem (2)Wiwin Maria
 
Specifying a purpose, Purpose statement, Hypostheses and research questions
Specifying a purpose, Purpose statement, Hypostheses and research questionsSpecifying a purpose, Purpose statement, Hypostheses and research questions
Specifying a purpose, Purpose statement, Hypostheses and research questionsMuhammad Naushad Ghazanfar
 
Research Objectives, Questions & Significance of the study
Research Objectives, Questions & Significance of the studyResearch Objectives, Questions & Significance of the study
Research Objectives, Questions & Significance of the studyMangasini Katundu
 
PSP3 presentation assessment grid_2122_maynard.pdf
PSP3 presentation assessment grid_2122_maynard.pdfPSP3 presentation assessment grid_2122_maynard.pdf
PSP3 presentation assessment grid_2122_maynard.pdfAlexMaynard6
 
Research Introduction & Background Information
Research Introduction & Background InformationResearch Introduction & Background Information
Research Introduction & Background InformationDr. Russell Rodrigo
 
Week6 7a- developing a questionnaire
Week6 7a- developing a questionnaireWeek6 7a- developing a questionnaire
Week6 7a- developing a questionnaireHafizul Mukhlis
 

La actualidad más candente (14)

The problem and purpose statement
The problem and purpose statementThe problem and purpose statement
The problem and purpose statement
 
Ms 95 - research methodology for management decisions
Ms 95 - research methodology for management decisionsMs 95 - research methodology for management decisions
Ms 95 - research methodology for management decisions
 
Behavior analysis and_behavior_modification-malott-tillema-glenn-1978-499pgs-edu
Behavior analysis and_behavior_modification-malott-tillema-glenn-1978-499pgs-eduBehavior analysis and_behavior_modification-malott-tillema-glenn-1978-499pgs-edu
Behavior analysis and_behavior_modification-malott-tillema-glenn-1978-499pgs-edu
 
Presentación semana 4 (preguntas de investigación)
Presentación semana 4 (preguntas de investigación)Presentación semana 4 (preguntas de investigación)
Presentación semana 4 (preguntas de investigación)
 
Ch9
Ch9Ch9
Ch9
 
Problem statement of research
Problem statement of researchProblem statement of research
Problem statement of research
 
Stating a problem (2)
Stating a problem (2)Stating a problem (2)
Stating a problem (2)
 
Specifying a purpose, Purpose statement, Hypostheses and research questions
Specifying a purpose, Purpose statement, Hypostheses and research questionsSpecifying a purpose, Purpose statement, Hypostheses and research questions
Specifying a purpose, Purpose statement, Hypostheses and research questions
 
Research Objectives, Questions & Significance of the study
Research Objectives, Questions & Significance of the studyResearch Objectives, Questions & Significance of the study
Research Objectives, Questions & Significance of the study
 
PSP3 presentation assessment grid_2122_maynard.pdf
PSP3 presentation assessment grid_2122_maynard.pdfPSP3 presentation assessment grid_2122_maynard.pdf
PSP3 presentation assessment grid_2122_maynard.pdf
 
Research process
Research process Research process
Research process
 
PBoD feedback.pdf
PBoD feedback.pdfPBoD feedback.pdf
PBoD feedback.pdf
 
Research Introduction & Background Information
Research Introduction & Background InformationResearch Introduction & Background Information
Research Introduction & Background Information
 
Week6 7a- developing a questionnaire
Week6 7a- developing a questionnaireWeek6 7a- developing a questionnaire
Week6 7a- developing a questionnaire
 

Similar a All posts should be written in your own words and be referenced an

1. Make sure you’re providing realistic solutions to the issue you.docx
1. Make sure you’re providing realistic solutions to the issue you.docx1. Make sure you’re providing realistic solutions to the issue you.docx
1. Make sure you’re providing realistic solutions to the issue you.docxketurahhazelhurst
 
1. Make sure you’re providing realistic solutions to the issue you.docx
1. Make sure you’re providing realistic solutions to the issue you.docx1. Make sure you’re providing realistic solutions to the issue you.docx
1. Make sure you’re providing realistic solutions to the issue you.docxjeremylockett77
 
How to-prepare-for-journal-club2016
How to-prepare-for-journal-club2016How to-prepare-for-journal-club2016
How to-prepare-for-journal-club2016Ramin Nazari M.D
 
Write a letter to the editor (3–5 double-spaced typed pages) of .docx
Write a letter to the editor (3–5 double-spaced typed pages) of .docxWrite a letter to the editor (3–5 double-spaced typed pages) of .docx
Write a letter to the editor (3–5 double-spaced typed pages) of .docxedgar6wallace88877
 
Developing A Health Care Perspective Letter.docx
Developing A Health Care Perspective Letter.docxDeveloping A Health Care Perspective Letter.docx
Developing A Health Care Perspective Letter.docxwrite5
 
ENGL147N-60265 Modules Week 4 Discussion Source Evaluation!.docx
ENGL147N-60265 Modules Week 4 Discussion Source Evaluation!.docxENGL147N-60265 Modules Week 4 Discussion Source Evaluation!.docx
ENGL147N-60265 Modules Week 4 Discussion Source Evaluation!.docxgidmanmary
 
HLTH 630Article Review 3During this moduleweek you will fin.docx
HLTH 630Article Review 3During this moduleweek you will fin.docxHLTH 630Article Review 3During this moduleweek you will fin.docx
HLTH 630Article Review 3During this moduleweek you will fin.docxpooleavelina
 
Advocates Differences Discussion.pdf
Advocates Differences Discussion.pdfAdvocates Differences Discussion.pdf
Advocates Differences Discussion.pdfbkbk37
 
Analyze a Current Health Care Problem or Issue.docx
Analyze a Current Health Care Problem or Issue.docxAnalyze a Current Health Care Problem or Issue.docx
Analyze a Current Health Care Problem or Issue.docxwrite22
 
Healthcare Models Essays.docx
Healthcare Models Essays.docxHealthcare Models Essays.docx
Healthcare Models Essays.docxbkbk37
 
HLT 307V ALL MODULE DISCUSSIONS (Grand Canyon)
HLT 307V ALL MODULE DISCUSSIONS (Grand Canyon)HLT 307V ALL MODULE DISCUSSIONS (Grand Canyon)
HLT 307V ALL MODULE DISCUSSIONS (Grand Canyon)JanaNildof
 
Best Practices Addressing a Current Health Care Problem Research.docx
Best Practices Addressing a Current Health Care Problem Research.docxBest Practices Addressing a Current Health Care Problem Research.docx
Best Practices Addressing a Current Health Care Problem Research.docxwrite31
 
POLA43Describe the governor’s roles in influencing the budgetary.docx
POLA43Describe the governor’s roles in influencing the budgetary.docxPOLA43Describe the governor’s roles in influencing the budgetary.docx
POLA43Describe the governor’s roles in influencing the budgetary.docxLeilaniPoolsy
 
Article Review
Article ReviewArticle Review
Article ReviewEmma Burke
 
Write a letter to the editor of an academic or professional jo.docx
Write a letter to the editor of an academic or professional jo.docxWrite a letter to the editor of an academic or professional jo.docx
Write a letter to the editor of an academic or professional jo.docxwashingtonrosy
 
WEEK6 DISCUSSION.docx
WEEK6 DISCUSSION.docxWEEK6 DISCUSSION.docx
WEEK6 DISCUSSION.docxwrite5
 

Similar a All posts should be written in your own words and be referenced an (18)

1. Make sure you’re providing realistic solutions to the issue you.docx
1. Make sure you’re providing realistic solutions to the issue you.docx1. Make sure you’re providing realistic solutions to the issue you.docx
1. Make sure you’re providing realistic solutions to the issue you.docx
 
1. Make sure you’re providing realistic solutions to the issue you.docx
1. Make sure you’re providing realistic solutions to the issue you.docx1. Make sure you’re providing realistic solutions to the issue you.docx
1. Make sure you’re providing realistic solutions to the issue you.docx
 
How to-prepare-for-journal-club2016
How to-prepare-for-journal-club2016How to-prepare-for-journal-club2016
How to-prepare-for-journal-club2016
 
Write a letter to the editor (3–5 double-spaced typed pages) of .docx
Write a letter to the editor (3–5 double-spaced typed pages) of .docxWrite a letter to the editor (3–5 double-spaced typed pages) of .docx
Write a letter to the editor (3–5 double-spaced typed pages) of .docx
 
How to choose journals for submitting your paper
How to choose journals for submitting your paperHow to choose journals for submitting your paper
How to choose journals for submitting your paper
 
Developing A Health Care Perspective Letter.docx
Developing A Health Care Perspective Letter.docxDeveloping A Health Care Perspective Letter.docx
Developing A Health Care Perspective Letter.docx
 
ENGL147N-60265 Modules Week 4 Discussion Source Evaluation!.docx
ENGL147N-60265 Modules Week 4 Discussion Source Evaluation!.docxENGL147N-60265 Modules Week 4 Discussion Source Evaluation!.docx
ENGL147N-60265 Modules Week 4 Discussion Source Evaluation!.docx
 
HLTH 630Article Review 3During this moduleweek you will fin.docx
HLTH 630Article Review 3During this moduleweek you will fin.docxHLTH 630Article Review 3During this moduleweek you will fin.docx
HLTH 630Article Review 3During this moduleweek you will fin.docx
 
Advocates Differences Discussion.pdf
Advocates Differences Discussion.pdfAdvocates Differences Discussion.pdf
Advocates Differences Discussion.pdf
 
Analyze a Current Health Care Problem or Issue.docx
Analyze a Current Health Care Problem or Issue.docxAnalyze a Current Health Care Problem or Issue.docx
Analyze a Current Health Care Problem or Issue.docx
 
Healthcare Models Essays.docx
Healthcare Models Essays.docxHealthcare Models Essays.docx
Healthcare Models Essays.docx
 
HLT 307V ALL MODULE DISCUSSIONS (Grand Canyon)
HLT 307V ALL MODULE DISCUSSIONS (Grand Canyon)HLT 307V ALL MODULE DISCUSSIONS (Grand Canyon)
HLT 307V ALL MODULE DISCUSSIONS (Grand Canyon)
 
Best Practices Addressing a Current Health Care Problem Research.docx
Best Practices Addressing a Current Health Care Problem Research.docxBest Practices Addressing a Current Health Care Problem Research.docx
Best Practices Addressing a Current Health Care Problem Research.docx
 
POLA43Describe the governor’s roles in influencing the budgetary.docx
POLA43Describe the governor’s roles in influencing the budgetary.docxPOLA43Describe the governor’s roles in influencing the budgetary.docx
POLA43Describe the governor’s roles in influencing the budgetary.docx
 
Article Review
Article ReviewArticle Review
Article Review
 
Write a letter to the editor of an academic or professional jo.docx
Write a letter to the editor of an academic or professional jo.docxWrite a letter to the editor of an academic or professional jo.docx
Write a letter to the editor of an academic or professional jo.docx
 
WEEK6 DISCUSSION.docx
WEEK6 DISCUSSION.docxWEEK6 DISCUSSION.docx
WEEK6 DISCUSSION.docx
 
A Teacher's Inner Voice
A Teacher's Inner VoiceA Teacher's Inner Voice
A Teacher's Inner Voice
 

Más de makdul

According to Davenport (2014) social media and health care are c.docx
According to Davenport (2014) social media and health care are c.docxAccording to Davenport (2014) social media and health care are c.docx
According to Davenport (2014) social media and health care are c.docxmakdul
 
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docxAccording to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docxmakdul
 
According to Libertarianism, there is no right to any social service.docx
According to Libertarianism, there is no right to any social service.docxAccording to Libertarianism, there is no right to any social service.docx
According to Libertarianism, there is no right to any social service.docxmakdul
 
According to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxAccording to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxmakdul
 
According to cultural deviance theorists like Cohen, deviant sub.docx
According to cultural deviance theorists like Cohen, deviant sub.docxAccording to cultural deviance theorists like Cohen, deviant sub.docx
According to cultural deviance theorists like Cohen, deviant sub.docxmakdul
 
According to Gray et al, (2017) critical appraisal is the proce.docx
According to Gray et al, (2017) critical appraisal is the proce.docxAccording to Gray et al, (2017) critical appraisal is the proce.docx
According to Gray et al, (2017) critical appraisal is the proce.docxmakdul
 
According to article Insecure Policing Under Racial Capitalism by.docx
According to article Insecure Policing Under Racial Capitalism by.docxAccording to article Insecure Policing Under Racial Capitalism by.docx
According to article Insecure Policing Under Racial Capitalism by.docxmakdul
 
Abstract In this experiment, examining the equivalence poi.docx
Abstract  In this experiment, examining the equivalence poi.docxAbstract  In this experiment, examining the equivalence poi.docx
Abstract In this experiment, examining the equivalence poi.docxmakdul
 
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docxACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docxmakdul
 
ACC 601 Managerial Accounting Group Case 3 (160 points) .docx
ACC 601 Managerial Accounting Group Case 3 (160 points) .docxACC 601 Managerial Accounting Group Case 3 (160 points) .docx
ACC 601 Managerial Accounting Group Case 3 (160 points) .docxmakdul
 
Academic Integrity A Letter to My Students[1] Bill T.docx
Academic Integrity A Letter to My Students[1]  Bill T.docxAcademic Integrity A Letter to My Students[1]  Bill T.docx
Academic Integrity A Letter to My Students[1] Bill T.docxmakdul
 
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docxAccess the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docxmakdul
 
According to DSM 5 This patient had very many symptoms that sugg.docx
According to DSM 5 This patient had very many symptoms that sugg.docxAccording to DSM 5 This patient had very many symptoms that sugg.docx
According to DSM 5 This patient had very many symptoms that sugg.docxmakdul
 
Acceptable concerts include professional orchestras, soloists, jazz,.docx
Acceptable concerts include professional orchestras, soloists, jazz,.docxAcceptable concerts include professional orchestras, soloists, jazz,.docx
Acceptable concerts include professional orchestras, soloists, jazz,.docxmakdul
 
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docxACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docxmakdul
 
Access the FASB website. Once you login, click the FASB Accounting S.docx
Access the FASB website. Once you login, click the FASB Accounting S.docxAccess the FASB website. Once you login, click the FASB Accounting S.docx
Access the FASB website. Once you login, click the FASB Accounting S.docxmakdul
 
Academic Paper  Overview  This performance task was intended to asse.docx
Academic Paper  Overview  This performance task was intended to asse.docxAcademic Paper  Overview  This performance task was intended to asse.docx
Academic Paper  Overview  This performance task was intended to asse.docxmakdul
 
Academic Research Team Project PaperCOVID-19 Open Research Datas.docx
Academic Research Team Project PaperCOVID-19 Open Research Datas.docxAcademic Research Team Project PaperCOVID-19 Open Research Datas.docx
Academic Research Team Project PaperCOVID-19 Open Research Datas.docxmakdul
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
 
Abstract                                 Structure of Abstra.docx
Abstract                                 Structure of Abstra.docxAbstract                                 Structure of Abstra.docx
Abstract                                 Structure of Abstra.docxmakdul
 

Más de makdul (20)

According to Davenport (2014) social media and health care are c.docx
According to Davenport (2014) social media and health care are c.docxAccording to Davenport (2014) social media and health care are c.docx
According to Davenport (2014) social media and health care are c.docx
 
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docxAccording to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
 
According to Libertarianism, there is no right to any social service.docx
According to Libertarianism, there is no right to any social service.docxAccording to Libertarianism, there is no right to any social service.docx
According to Libertarianism, there is no right to any social service.docx
 
According to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxAccording to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docx
 
According to cultural deviance theorists like Cohen, deviant sub.docx
According to cultural deviance theorists like Cohen, deviant sub.docxAccording to cultural deviance theorists like Cohen, deviant sub.docx
According to cultural deviance theorists like Cohen, deviant sub.docx
 
According to Gray et al, (2017) critical appraisal is the proce.docx
According to Gray et al, (2017) critical appraisal is the proce.docxAccording to Gray et al, (2017) critical appraisal is the proce.docx
According to Gray et al, (2017) critical appraisal is the proce.docx
 
According to article Insecure Policing Under Racial Capitalism by.docx
According to article Insecure Policing Under Racial Capitalism by.docxAccording to article Insecure Policing Under Racial Capitalism by.docx
According to article Insecure Policing Under Racial Capitalism by.docx
 
Abstract In this experiment, examining the equivalence poi.docx
Abstract  In this experiment, examining the equivalence poi.docxAbstract  In this experiment, examining the equivalence poi.docx
Abstract In this experiment, examining the equivalence poi.docx
 
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docxACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
 
ACC 601 Managerial Accounting Group Case 3 (160 points) .docx
ACC 601 Managerial Accounting Group Case 3 (160 points) .docxACC 601 Managerial Accounting Group Case 3 (160 points) .docx
ACC 601 Managerial Accounting Group Case 3 (160 points) .docx
 
Academic Integrity A Letter to My Students[1] Bill T.docx
Academic Integrity A Letter to My Students[1]  Bill T.docxAcademic Integrity A Letter to My Students[1]  Bill T.docx
Academic Integrity A Letter to My Students[1] Bill T.docx
 
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docxAccess the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
 
According to DSM 5 This patient had very many symptoms that sugg.docx
According to DSM 5 This patient had very many symptoms that sugg.docxAccording to DSM 5 This patient had very many symptoms that sugg.docx
According to DSM 5 This patient had very many symptoms that sugg.docx
 
Acceptable concerts include professional orchestras, soloists, jazz,.docx
Acceptable concerts include professional orchestras, soloists, jazz,.docxAcceptable concerts include professional orchestras, soloists, jazz,.docx
Acceptable concerts include professional orchestras, soloists, jazz,.docx
 
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docxACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
 
Access the FASB website. Once you login, click the FASB Accounting S.docx
Access the FASB website. Once you login, click the FASB Accounting S.docxAccess the FASB website. Once you login, click the FASB Accounting S.docx
Access the FASB website. Once you login, click the FASB Accounting S.docx
 
Academic Paper  Overview  This performance task was intended to asse.docx
Academic Paper  Overview  This performance task was intended to asse.docxAcademic Paper  Overview  This performance task was intended to asse.docx
Academic Paper  Overview  This performance task was intended to asse.docx
 
Academic Research Team Project PaperCOVID-19 Open Research Datas.docx
Academic Research Team Project PaperCOVID-19 Open Research Datas.docxAcademic Research Team Project PaperCOVID-19 Open Research Datas.docx
Academic Research Team Project PaperCOVID-19 Open Research Datas.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
Abstract                                 Structure of Abstra.docx
Abstract                                 Structure of Abstra.docxAbstract                                 Structure of Abstra.docx
Abstract                                 Structure of Abstra.docx
 

Último

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 

Último (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

All posts should be written in your own words and be referenced an

  • 1. All posts should be written in your own words and be referenced and cited with at least one scholarly peer-reviewed journal article to support your position. That means even if you are replying to another person’s posts, your post still needs to be original, and referenced, and cited with a scholarly peer - reviewed journal article. The reason that PRJA citations and references are a requirement is that it elevates the discussion. The citation also allows readers to understand exactly what portion of the post is paraphrased from the reference. No direct quotes are allowed - paraphrasing is expected. The source in which you are required to reference and cite in your discussion posts needs to come from a peer-reviewed journal article. A book (textbook or otherwise) is not appropriate. Your post and reference need to be original - not something that another student has posted and or used. You must include an APA or AMA formatted citation and reference in your post. Discussion participants may include the instructor or students. The post must pertain to the discussion board issue in which it is being posted. Posts must be respectful of peers and show an insightful response to a topic related to ethics in health care. Your post will be evaluated using the following criteria: Quality of Post (content, logic, depth, breadth) – 8 points: The quality (8 of the 20 points) of the post is of primary importance. The content, logic, depth, and breadth of your post are central to my assessment of the post's quality. It should be your original writing and the material you cite and reference to support should be of the highest quality. It is not purely a message indicating your opinion. The support must come from at least one Peer-Reviewed Journal Article (PRJA). The lack of a PRJA affects the overall quality of the post. The support of a peer-reviewed journal article – 4 points: How
  • 2. the PRJA supports the content of the post is critical (4 of to 20 points). The PRJA should provide meaningful evidence to the cited portion of your message. Grammar, construction, academic tone – 4 points: The tone of the Required Discussion Board forums is formal. It is wise for you to evaluate the writing of your post using an editor, like grammarly.com. The basic grammarly.com editor (not the premium version) is an essential tool for you to use. Grammarly.com is free and gives you nearly immediate feedback with suggestions for improvement. Reference properly constructed – 3 points and Citation properly constructed - 1 point: The reference (3 points out of 20 points) and the citation (1 point out of 20 points) should be properly constructed. A folder on the course website contains resources that will help you with APA and AMA style. These two styles are the only ones accepted in this class. Pick one and use it throughout an assignment. To post a message, click the name of the forum on the left side of the page. On the next page, click the phrase "Create Thread". Follow the prompts to indicate a subject and enter your message. Finally, click "Submit". Peer-reviewed articles (PRJA) are a subset of scholarly articles. They are special because they are published in academic journals that explicitly state that submitted manuscripts will undergo peer-review. In academic publishing, the goal of peer review is to assess the quality of articles submitted for publication in a scholarly journal. Before an article is deemed appropriate to be published in a peer-reviewed journal, it must undergo the following process: · The author of the article must submit it to the journal editor who forwards the article to experts in the field. Because the reviewers specialize in the same scholarly area as the author, they are considered the author’s peers (hence “peer review”). · These impartial reviewers are charged with carefully
  • 3. evaluating the quality of the submitted manuscript. · The peer reviewers check the manuscript for accuracy and assess the validity of the research methodology and procedures. · If appropriate, they suggest revisions. If they find the article lacking in scholarly validity and rigor, they reject it. Because a peer-reviewed journal will not publish articles that fail to meet the standards established for a given discipline, peer-reviewed articles that are accepted for publication exemplify the best research practices in a field. PRJAs do not come from magazines or newspapers. Magazine and newspaper articles sometimes identify peer-reviewed journal articles, so it is possible to use them in order to find a peer-reviewed journal article. A published journal is the entity that defines whether or not its articles are peer reviewed. Once you find an article that appears to support your response, you should check with the journal to determine if it is peer reviewed or not. These days virtually all journals will have a website. Let’s say that you have articles from 3 periodicals that appear to support your response. They are The Journal of the American Medical Association, Nature, and The New York Times. If a journal does not state that it is peer-reviewed, it is not. Do not cite or reference sourced without an explicit statement that it is peer-reviewed on the journal’s website. You will see that both JAMA and Nature are peer-reviewed, but the New Your Times is not.
  • 4. 203© The Author(s) 2016 D.H. Barrett et al. (eds.), Public Health Ethics: Cases Spanning the Globe, Public Health Ethics Analysis 3, DOI 10.1007/978-3-319- 23847-0_7 Chapter 7 Vulnerability and Marginalized Populations Anthony Wrigley and Angus Dawson 7.1 Introduction Public health practitioners attempt to identify and then remove, or at least reduce, threats of harm. However, harm does not affect everyone in the same way. Some people and communities are resilient, whereas others are more susceptible to poten- tial harm. Much public health work is carried out by, or on behalf of, government s. Where people or communities are at great risk of harm, government has a clear and fi rm responsibility to protect its citizens. One way of describing a potential source of such a risk of harm is to focus on the idea of vulnerability . This introduction explores the concept of ‘vulnerability’ and the role that it may play in public health. Vulnerability is a concept often used in public health ethics and more broadly in bioethics —but its exact meaning is unclear. Roughly, it
  • 5. indicates that an individual or group is thought to have a particular status that may adversely impact upon their well-being, and that this implies an ethical duty to safeguard that well-being because the person or group is unable to do so adequately themselves. This concept, although important, consistently eludes precise defi nition. The diffi culty in defi ning the con- cept arises from disagreement as to how to characterize the idea of “special status” and to whom it applies. As a result, more and more categories of individuals and groups are being classifi ed as vulnerable in an ever-increasing range of situations. This raises the concern that almost everyone can be classifi ed as vulnerable in some The opinions , fi ndings , and conclusions of the authors do not necessarily refl ect the offi cial posi- tion , views , or policies of the editors , the editors ’ host institutions , or the authors ’ host institutions . A. Wrigley , PhD Centre for Professional Ethics , Keele University , Staffordshire , UK A. Dawson , PhD (*) Center for Values, Ethics and the Law in Medicine, Sydney School of Public Health , The University of Sydney , Sydney , Australia e-mail: [email protected] mailto:[email protected]
  • 6. 204 way and, in turn, that almost every activity now requires this additional attention. If true, then the concept of ‘vulnerability’ ceases to be useful because if everyone is vulnerable, then no one is. There is currently no clear, single, defi nitive account of this concept that is univer- sally accepted, although numerous different approaches have been adopted by, for example, various international bodies in their guideline s. In this chapter, we shall critically examine some leading defi nitions of vulnerability and attempt to explain and classify them to make clear the differences in approach. Then we will offer an account of vulnerability that seeks to provide a universal basis for the everyday use of the concept while avoiding the pitfalls associated with the other defi nitions. Our approach aims to reduce the concept to a simple role, not as a basic moral concept in its own right, but as a marker, or signal, to public health practitioners that something in the situation before them requires ethical attention. The real ethical work is to be done by the practitioner, not by vague appeal to the idea of vulnerability, but via the application of other concepts and ethical concerns that are already familiar in public health and bioethics . We shall use case studies to illustrate how this approach works.
  • 7. 7.2 Different Approaches to the Concept of Vulnerability Before looking at the approaches taken to defi ne vulnerability, a worthwhile starting point is to examine the concept that can be derived from the term’s everyday use. Vulnerability, in line with the etymological root of the w ord meaning “to wound,” is widely interpreted as ( V1 ) Open to harm or under threat of harm. This basic defi nition is perfectly adequate, for a range of uses, with context deter- mining the nature and kind of harm at stake. However, such a defi nition only captures a broad background use as to how the concept should be employed. Though this defi - nition will be suffi cient for most purposes, further clarity and greater specifi city of the concept is needed here. In attempting to refi ne this basic defi nition, several challenges arise. First, how we formulate any defi nition will change whether or not we see some- one as vulnerable. Therefore, in providing a more substantial defi nition, one has to avoid the problem of inadvertently excluding those who should be considered genu- inely vulnerable or including those who are not vulnerable. Second, if we want the concept of vulnerability to function as something that generates a duty or responsibil- ity to prevent harms from befalling people, then we must move beyond a basic, factual description and include some normative ethical element, something along the lines of
  • 8. what Goodin c haracterizes as “the principle of protecting the vulnerable” ( 1985 , 110). Providing a sound defi nition of v ulnerability that satisfi es these elements is more diffi cult than might be expected. Hurst ( 2008 ) captured this diffi culty well by liken- ing it to the attempts of six blind men trying to describe an elephant. As each blind man touches a different part of the elephant—the trunk, ear, tusk, tail, etc.—they cannot agree on how to describe the animal. This analogy maps directly to the chal- lenge of defi ning vulnerability. Because different perspectives abound on what con- A. Wrigley and A. Dawson 205 stitutes the grounds of vulnerability, consensus on the defi nition is diffi cult to reach (Schroeder and Gefenas 2009 ). Much of the focus on vulnerability in the bioethics literature has been in research ethics, where many international guidelines recommend or impose some duty to provide extra protection for those considered vulnerable. However, these guideline s generally fail to defi ne the concept (although the Council for International Organizations of Medical Sciences [CIOMS] ( 2002 ) does provide a defi nition) and,
  • 9. instead, list groups commonly considered vulnerable (U.S. Department of Health, Education, and Welfare 1979 ; World Medical Association 2013 ; CIOMS 1993 ). Although this practice is slowly changing, strategies for analyzing and defi ning the concept are usually limited to simply adding or subtracting from a list of properties, conditions, or categories that typify what it is to be considered vulnerable. The approaches taken to defi ne vulnerability beyond everyday use ( V1 ) can be categorized broadly into three basic types: ( V2 ) Vulnerability is a universal condition that humanity has in virtue of our physi- cal or social nature (Fineman 2008 ; Hoffmaster 2006 ; Turner 2006 ; Rogers et al. 2012 ; MacIntyre 1999 ; International Bioethics Committee of UNESCO [IBC] 2013 ; and to s ome extent Hart 1961 ). or ( V3 ) Vulnerability involves one or more specifi c attributes, contexts, or group types (Rendtorff 2002 ; and this is perhaps also the approach taken by the International Bioethics Committee of UNESCO when it considers what it calls special vulner- abilities, 2013 , 5–6). or ( V4 ) Vulnerability involves one (or more) familiar but
  • 10. overarching ethical conc ept(s) (Goodin 1985 ; Wrigley 2010 ). Before we critically examine each approach, it is worth noting that all defi nitions are perfectly adequate depending on what we want the concept to do or what role we want it to play. One possible explanation for the failure to produce a single, uni- versally agreed-upon defi nition of this concept is that, put simply, those who use the term have different aims and roles in mind. 7.3 Concerns Surrounding Approach (V2): Universal Condition Approaches to the concept along the lines of ( V2 ) use vulnerability to mark every human as somehow open to harm—including physical injury, dependency on oth- ers, loss of power, and so forth—just by virtue of being human (Fineman 2008 ). Hence, by that logic, everyone is vulnerable because we all have bodies that can be injured, disabled, and fail through illness and old age. On this view, we are also 7 Vulnerability and Marginalized Populations 206 vulnerable because whilst we live in social units that require interdependence , high quality interaction does not always exist.
  • 11. ( V2 ) is a very particular way of thinking about the concept of vulnerability inas- much as it motivates and drives discussion of the human condition in general. However, the major problem with such accounts is that the general truth that we, as humans, are open to harms of various kinds or that we live in social groups, fails to pick out a spe- cial category because it applies to absolutely everyone. It becomes diffi cult to talk of ‘ degrees ’ or ‘ types ’ of vulnerability on such accounts. This, in turn, has led to the criti- cism that such an approach results in the “naturalizing” of the concept, whereby it is held to be normal or natural to be vulnerable in one way or another (Luna 2009 ). Of course, if the idea behind using the term ‘ vulnerable ’ is ( a ) to articulate a fundamental aspect of the human condition, ( b ), to say something substantive about the interdepen- dence of humans, and, perhaps, ( c ) to thereby affi rm a natural commitment to human solidarity , then much substantive (and controversial) content is built into the concept, and our discussion moves far from the everyday meaning of vulnerability. If we are all vulnerable, then appealing to this concept as a means to avoid a harm or seek special protection becomes problematic, as it is hard to see how particular priorities can be set. This approach makes vulnerability far too broad to serve as anything other than an underlying presumption about all human beings, and so it is unable to generate
  • 12. ethical duties beyond what we owe to every human by virtue of being human. As a result, this approach does not provide an account of vulnerability that can identify cases where people or groups are potentially open to harm in any special way. 7.4 Concerns Surrounding Approach (V3): Specifi c Attributes, Contexts, or Groups In direct contrast to the approach taken in ( V2 ), ( V3 ) characterizes vulnerability by identifying it with some specifi c attribute, context, or group membership. This approach focuses on vulnerability in terms of something , such as physical vulnera- bility, social vulnerability, vulnerability in terms of lacking capacity, vulnerability in terms of belonging to a certain identifi able group, or vulnerability because of belonging to a marginalized population, etc. This approach to defi ning the concept is an excellent way of illustrating the sorts of conditions that we might want to pick out as requiring special consideration in terms of susceptibility to harm. As such, ( V3 ) serves as a useful heuristic device because it gives examples of the sorts of things that are often considered vulnerabili- ties. However, this check-list approach is to borrow David Lewis’s ( 1986 ) phrase, an attempt at explanation by “way of example,” whereby we provide some key para- digmatic examples or illustrations of what constitutes vulnerability and state that
  • 13. vulnerabilities are “these sorts of things.” This approach does a poor job of defi ning vulnerability. Listing everything that falls under a concept, even if it were possible, does not give us a good defi nition of that concept. ( V3 ) neither tells us whether the examples listed are appropriate nor guides our decision making on controversial cases where identifying someone as A. Wrigley and A. Dawson 207 vulnerable is unclear. Further, by using the ( V3 ) approach, attention is directed away from the underlying question of what vulnerability is ; and instead, the focus is on whether or not to add a particular group to a continually expanding unstruc- tured list of examples (Rogers et al. 2012 ). Of course, any such list might prove useful as an aide memoir during, for example, an emergency event. Such a prag- matic role may be useful, but it should not be mistaken for an ontological category or conceptual boundary. The ( V3 ) approach has therefore met with the criticism that it is both too broad and too narrow to satisfactorily defi ne vulnerability (Levine et al. 2004 ; Schroeder and Gefenas 2009 ; Luna 2009 ). Concerns about being too
  • 14. broad stem from the list of vulnerabilities becoming infl ated to the point where “virtually all potential human subjects are included” (Levine et al. 2004 ). As such, the same concern for ( V2 ) applies to ( V3 ), since both approaches fail to specify in suffi cient detail those who need additional or special protection from harms . ( V3 ) is also, potentially, too narrow because it focuses all attention onto specifi c or group characteristics and therefore fails to address concerns outside the particular designated categories (Rogers et al. 2012 ). It will, therefore, potentially miscatego- rize certain individuals or groups as not being vulnerable if, for example, they are a group that has not been encountered previously or if some trait has not made it onto the list of specifi ed characteristics. Moreover, by focusing on specifi c or group char- acteristics, ( V3 ) can stereotype individuals who fall under category headings (Scully 2013 ). If, for example, we assign names to different categories of vulnerability (e.g., ‘the elderly’, ‘the disabled,’ or ‘women,’ or ‘the poor’ as categories of vulnerabil- ity), then many people could be classifi ed as vulnerable without them necessarily being at any greater risk of harm. 7.5 Concerns Surrounding Approach (V4): Overarching Concepts The ( V4 ) approach explains vulnerability in terms of one or more overarching but
  • 15. more familiar ethical concept(s). Perhaps the best example of this kind is Goodin ’s ( 1985 ) account of vulnerability, which builds on the everyday use of the term ( V1 )— open to or under threat of harm— but goes a step further by exploring what the relevant harms might be. This leads Goodin to interpret “harm” in terms of a person’s “welfare” or “interests” so giving us an initial defi nition of being vulnera- ble in terms of ‘ being susceptible to harms to one ’ s interests ’( 1985 , 110–114). However, as the concepts of ‘welfare’ and ‘interests’ can in turn be open to a great deal of interpretation, including the possibility of focusing on subjective expli- cations involving the satisfaction of preferences or desires, further clarifi cation is needed. To this end, Goodin suggests that a particular sub-group of interests, that is—people’s “vital interests” or “needs”—are the universally important welfare considerations that we need to be concerned about. On this view, one is vulnerable if one’s needs are threatened. And one is most vulnerable if one’s most vital needs are threatened. 7 Vulnerability and Marginalized Populations 208 Goodin also adds an explicit normative role to the concept of
  • 16. vulnerability by imposing an ethical duty to safeguard the potentially vulnerable from harm. This role is imperative if the concept of vulnerability is to be anything more than a factual description of an individual’s or a group’s characteristics. Goodin does this by link- ing his account of vulnerability to the “principle of protecting the vulnerable,” which is, essentially, an obligation to protect the vital interests of others. Hence there is a direct link between the classifi cation of someone as being vulnerable, with a requirement on the part of others to protect them from any potential harms. Despite being a highly infl uential account of vulnerability, this approach has been criticized. One concern is that it potentially promotes widespread paternalism in an attempt to meet others’ needs (Rogers et al. 2012 ), thereby characterizing all vulnerable people as, in some way, being helpless. This criticism misses the mark, though, because being vulnerable by Goodin’s account does not mean one is power- less. More telling, however, are the concerns that this account does nothing more than reduce the concept of vulnerability to the well-recognized concept of needs, together with a moral theory that demands we aid those in need. In essence, this implies that the concept of vulnerability is redundant and could be replaced with the concept of being in (serious) need.
  • 17. 7.6 Simplifying the Concept of Vulnerability (V5): The Moral-Marker Approach Rather than continuing this attempt to defi ne vulnerability along the lines of the approaches already mentioned ( V2 , V3 , and V4 ), an account of vulnerability can be offered in much simpler terms. Instead of seeking a substantive defi nition that tries to establish conditions for vulnerability, another option is to interpret the word “vul- nerability” as nothing more than an empty marker or signal for potential moral concern. This approach can be seen in Hurst’ s view of vulnerability as a sign of “increased likelihood of incurring additional or greater wrong” ( 2008 ). However, this view can be taken further. A formal moral-marker approach simplifi es the account of vulnerability by avoiding any reliance on moral theory or preconceived wrongs as part of the defi nition. On this account, vulnerability will simply be ( V5 ) A marker that additional consideration needs to be given to whatever existing ethical issues there may be. It can be seen that what is then in dispute between the different accounts presented is what sorts of considerations are the relevant ones. However, if we stop at the point where “vulnerability” is recognized as just a warning marker, we don’t need to engage with the substantial task of trying to provide a catch-all defi nition that some-
  • 18. how incorporates all physical, mental, or emotional, etc. cases that might constitute vulnerability. Instead, we can focus on substantive ethical concepts such as harm, consent, exploitation, etc. and explore how each applies to the particular case before us. On the basis of this approach, “vulnerability” says nothing at all about what gen- erates the need for any special scrutiny because the substantive ethical weight of the A. Wrigley and A. Dawson 209 concern (and how to address it) requires us to engage with these substantive moral concepts. So, for example, it says little to talk about marginalized populations as being vulnerable, but if we recognize the ‘moral marker’ of vulnerability here, we might then explore how exploitation, inequity , and harm are relevant when deliberating about a particular case. One of the priorities for educating public health profession als about ethical issues is to seek to increase their sensitivity to the relevant features of each situation, rather than teach them the formulaic application of rules or vague concepts such as that of “vulnerability” (Coughlin et al. 2012 ). The ( V5 ) approach offers other advantages as well. For example, it avoids stereo- typing based merely on belonging to a specifi ed category; it
  • 19. avoids exclusion on the grounds of not already being on the list of vulnerable groups; and it avoids the vacu- ity of identifying “all” as vulnerable, while maintaining the crucial aspect that the concept marks out the need for special ethical scrutiny. Trying to provide more substantial components to the defi nition of vulnerability diverts scrutiny and energy from where it matters most—sensitive, rational thought about specifi c problems— and instead, promotes a formulaic approach to ethical safeguarding. Although other writers on vulnerability, such as Levine et al. ( 2004 ) and Luna ( 2009 ), criticize this approach claiming generic guidance about paying “special atten- tion” or giving “special consideration” to something is not useful, the same criticism could also apply to an account that identifi es specifi c categories or relies on some over- riding concept. For example, if we try the specifi c category or context route ( V3 ) so that, say, we hold “the elderly” vulnerable, how would that guide our actions without reference to established concerns about, for example, physical harms or exploitation? The same holds true of ( V4 ) accounts such as Goodin ’s focus on vulnerability as being open to harms to one’s interests, which then requires further analysis of “vital” needs. The best that can be said for such accounts is that each provides something of a heuris- tic, teaching anyone who wants to learn ways in which harms or wrongs might arise.
  • 20. The importance and implications of these issues become apparent as we consider the various cases in the rest of this chapter. The implications of ( V2 ), the approach focused on vulnerability as arising from the human condition, is that all are vulnerable, includ- ing the police and immigration offi cials in Blight’s and McDougall’s cases, the public health offi cials with responsibility for launching national programs to reduce Sudden Infant Death Syndrome (SIDS) in the Jonas and Haretuku case, and the prison governor in Christopher et al.’s case. This outcome demonstrates the key problem with this view. The very concept of vulnerability ceases to have much meaning, although presumably there might be a retreat to the thought that some individuals and populations are ‘more’ vulnerable than others, although it is unclear how this is to be specifi ed. Many of the cases could more obviously be used to endorse ( V3 ), the approach focused on specifi c groups, contexts, or categories. Many of these cases focus on marginalized groups within society, such as prison inmates (Christopher et al.), immigrants, asylum seekers , refugees (McDougall; Blight), substance abusers (Christopher et al.), minority communities of various kinds (Bernard et al.; Blight; Jonas and Haretuku), and the poor (Vergès et al.). This is a traditional, infl uential, and powerful way of thinking about vulnerability. However, as stated previously,
  • 21. this approach has its problems. Does it necessarily follow that if you belong to one of these groups that you are vulnerable? You may well be at increased risk of harm 7 Vulnerability and Marginalized Populations 210 of various kinds if you belong to such groups. However, you might also be at increased risk of harm as a recreational drug user, skydiver, or American football player, although individuals belonging to such groups are not likely to be seen, intuitively, as being necessarily vulnerable. The more specifi c focus on providing a normative explanation for vulnerability pre- sented in the work of writers such as Goodin ( V4 ), is more useful, in that we can begin to clearly identify subgroups that are at risk of harm to their vital interests (the girl fed through a tube and unable to feel pain involved in a forced deportation case: Blight), rather than just being routinely disadvantaged (the surrogate encouraged to take on that role because of poverty: Vergès et al.) or at increased risk of harm due to the cultural traditions or choices of their parent s (Jonas and Haretuku). How should we think about risk factors and vulnerability? Some will think of smoking around children (increasing the risk of SIDS) as being an individual’s choice. Others will
  • 22. argue that it is unfair to assume that it is always individuals that are responsible for such choices and the resultant outcomes, as people may be addicted to nicotine or they may have become smokers through the infl uence of norms within their social environment. The advantage of the ‘moral-marker’ approach ( V5 ) is that it allows us to dive beneath the surface offered by the label of ‘vulnerability’ and offer more sophisticated explanations for the situations described in the cases, as well as providing the oppor- tunity to develop strong normative reasons to respond. For example, all of these cases are about various kinds of injustice, disadvantage, and inequities in society, and their impact on individual and community health . They are appropriate issues for those working in public health to be concerned about precisely because they provide refer- ence to the identifi cation of various harms at the population- level, and many of the solutions to these issues will have to come through collective and public action. As the discussion of the different approaches to defi ning vulnerability consid- ered above illustrate, most of the approaches to vulnerability do little more than encourage us to engage in additional ethical scrutiny using already well recognized and well understood moral concepts. The fi nal ‘moral-marker’ approach ( V5 ) sug- gests that this is exactly what the concept should be used for,
  • 23. and nothing more. References Coughlin, S.S., A. Barker, and A. Dawson. 2012. Ethics and scientifi c integrity in public health, epidemiological and clinical research. Public Health Reviews 34(1): 71–83. http://www.publi- chealthreviews.eu/upload/pdf_fi les/11/00_Coughlin.pdf . Accessed 20 June 2015. Council for International Organizations of Medical Sciences (CIOMS). 1993. International ethical guidelines for biomedical research involving human subjects , 1st ed. Geneva: CIOMS. Council for International Organizations of Medical Sciences. 2002. International ethical guide- lines for biomedical research involving human subjects , 2nd ed. Geneva: CIOMS. Fineman, M.A. 2008. The vulnerable subject: Anchoring equality in the human condition. Yale Journal of Law and Feminism 20(1): 1–23. Goodin, R.E. 1985. Protecting the vulnerable: A reanalysis of our social responsibilities . Chicago: University of Chicago Press. Hart, H.L.A. 1961. The concept of law . Oxford: Oxford University Press. Hoffmaster, B. 2006. What does vulnerability mean? Hastings Center Report 36(2): 38–45. A. Wrigley and A. Dawson
  • 24. http://www.publichealthreviews.eu/upload/pdf_files/11/00_Cou ghlin.pdf http://www.publichealthreviews.eu/upload/pdf_files/11/00_Cou ghlin.pdf 211 Hurst, S.A. 2008. Vulnerability in research and health care, describing the elephant in the room? Bioethics 22(4): 191–202. International Bioethics Committee (IBC) of UNESCO. 2013. The principle of respect for human vulnerability and personal integrity . http://unesdoc.unesco.org/images/0021/002194/219494e. pdf . Accessed 20 June 2105. Levine, C., R. Faden, C. Grady, et al. 2004. The limitations of “vulnerability” as a protection for human research participants. American Journal of Bioethics 4(3): 44–49. Lewis, D. 1986. On the plurality of worlds . Oxford: Blackwell. Luna, F. 2009. Elucidating the concept of vulnerability: Layers not labels. International Journal of Feminist Approaches to Bioethics 2(1): 121–139. MacIntyre, A. 1999. Dependent rational animals: Why human beings need the virtues . Chicago: Open Court. Rendtorff, J.D. 2002. Basic ethical principles in European bioethics and biolaw: Autonomy, dig-
  • 25. nity, integrity and vulnerability—Towards a foundation of bioethics and biolaw. Medicine, Health Care, and Philosophy 5(3): 235–244. Rogers, W., C. MacKenzie, and S. Dodds. 2012. Why bioethics needs a concept of vulnerability. International Journal of Feminist Approaches to Bioethics 5(2): 11–38. Schroeder, D., and E. Gefenas. 2009. Vulnerability: Too vague and too broad? Cambridge Quarterly of Healthcare Ethics 18(2): 113–121. Scully, J.L. 2013. Disability and vulnerability: On bodies, dependence, and power. In Vulnerability: New essays in ethics and feminist philosophy , ed. C. Mackenzie, W. Rogers, and S. Dodds. New York: Oxford University Press. Turner, B. 2006. Vulnerability and human rights . University Park: Pennsylvania State University Press. U.S. Department of Health, Education, and Welfare. 1979. The Belmont report: Ethical principles and guidelines for the protection of human subjects of research , vol. Publication No. (OS) 78-0012. Washington, DC: U.S. Government Printing Offi ce. Wrigley, A. 2010. Vulnerable and non-competent subjects. In European textbook on ethics in research , ed. J. Hughes, 49–74. Luxembourg: Publications Offi ce of the European Union. World Medical Association. 2013. Declaration of Helsinki — Ethical …