Authorization Of Resource Rights Essay

1745 words - 7 pages

The issue of resource rights within a particular territory has been addressed by many political philosophers, among who are Leif Wenar and Cara Nine. Both philosophers try to determine and argue to whom this right over resources justly belongs. Wenar argues that resources within a particular geography belong to people of that territory. However, current global commerce can be characterized as failure of institutions to enforce these property rights. Particularly, it gives rise to brutal authoritarians, who take over country resources and capture revenue from selling these resources in the market (Wenar, p.9). So, according to Wenar ownership rights determine resource rights, and because people of a country own its resources, those people have a just right over the resources. On the other hand, Nine argues that the definition of resource rights as ownership lacks an important aspect, which is the self-government of resources (Nine, p. 233). Nine goes on considering three theories that might justify resource rights. Particularly, the author examines the democratic account, liberal nationalism and the theory of legitimate political authority over resources. According to Nine, fist two theories face serious obstacles in justifying resource rights. However, the last theory, proposed by the author, provides a normative foundation for a collective to have a right over resources.
The aim of the paper is to critically assess the arguments of Leif Wenar and Cara Nine on justifications of resource rights within a given geography, and to provide an objective summary.
To begin with, Wenar claims that a country’s natural resources belong to its people Wenar, p. 10). Next, the author argues that national ownership, a case when a state owns country resources, requires that people of that country should have a full awareness of how resources are managed, and should be able to influence the management (Wenar, p 11). Therefore, according to the author, no one has a right to sell these resources without valid authorization. Further, Wenar argues that currently the legal right to sell country resources is equivalent to the capacity for violence. The author writes: “In current international practice all that is necessary for a group to acquire the legal right to sell off a territory’s resources is the power to inflict violence on the territory’s people (Wenar, p. 12). Therefore, any political unit that is able to establish a coercive control over people in a territory acquires an international recognition of legal authority to sell the resources of the territory. Wenar argues: “The property rights of a people are violated, as any owner’s rights would be, whenever someone gains control of this property through deception, force, or extreme manipulation (Wenar, p. 16). Thus, according to Wenar, citizens of Equatorial Guinea, for example, could not give legal authority to the dictator Obiang to sell the country’s resources. There is no transparency in deals that...

Find Another Essay On Authorization of Resource Rights

Comparison Among DB2 And Oracle In Term of Security

4280 words - 17 pages and IBM. The structure of this paper is as follows. Six main security features will be compared among Oracle and DB2. They are security evaluations, authentication, authorization and access control, encryption, LDAP and auditing. After that, a summary of features will be given. And finally, a short conclusion to wrap the paper up.1. IntroductionAs the use of the web grows on both intranets and the public internet, information security is

Health Insurance Portability and Accountability Act (HIPAA)

1793 words - 7 pages Office for Civil Rights. The Common Rule's purposes are the safeguarding of human welfare during research, and the privacy and confidentiality of their information; the alleged violations of this rule are investigated and handled by the institutional review board (IRB) of the institution in which the research is being conducted (Rothstein). However, the DHHS Office for Human Research Protection is charged with the general oversight of the

STUDY OF CLOTHING ONLINE SHOPPING

1847 words - 7 pages . Authorization based on Nahari’s book Authorization refers to rights and privileges granted to an individual or process that enable access to computer resources and information assets. Once the user’s identity is authenticated, authorization determines the level of the rights and privileges that the user can have. To elaborate more, basically authorization defines who can access the system resources and their capabilities towards them. Here are

A report on Network Security based on the text: Ahuja, V. (1996). Network & Internet Security. Massachusetts: Academic Press Inc

1343 words - 5 pages security is authentication. Authentication is the process used to verify the identity claimed by the user. This verification process requires the exchange of shared secrets between the user and the application. Typically, this is a 6 or 8 character password. Another concept is authorization. Authorization is the process of assigning access rights to each user ID. The access rights include specification, such as whether the user is permitted to read

Copyright Or Intellectual Property Right

3419 words - 14 pages electronic databases. In most European languages other than English, copyright is known as author's rights. The expression copyright refers to the main act which, in respect of literary and artistic creations, may be made only by the author or with his authorization. That act is the making of copies of the work. The expression author's rights refer to the creator of the artistic work, its author. It thus underlines the fact, recognized in most laws, that

Alien and Sedition Acts of 1798 and The National Defense Authorization Act of 2014

952 words - 4 pages the Republican Party and anyone who agreed with them. In this paper I will explain the Alien and Sedition Acts of 1798 and the importance of them. I will also examine the legal and social implications that resulted from the passing of these laws. Lastly I will discuss why I believe the National Defense Authorization Act of 2014 is unconstitutional and why it is the worst violation of the constitution since the Alien and Sedition Act of 1798

Change in Audits by Vehicles for Hope Limited

1264 words - 6 pages foundation for effective internal control. It includes the attitudes, awareness and actions of management and those charged with governance. It also sets the tone of an organization influencing the control consciousness of its people. • Human resource Firstly, VHL’s accountant seems to be incompetent at his job. He did not book the significant donations. This failure may lead to material misstatements in the financial statements. Secondly, the lack

Assignment 4

1113 words - 5 pages According to the HIPAA guidelines what is the major purpose for the HIPAA Privacy Rules? The purpose of the HIPPA Privacy rules is to protect the privacy of an individual’s health record. The rule is to prevent unauthorized access by others, and also give the patient more rights to their health information. 2. List specific patient information identified by HIPAA as being “individually identifiable health information.” 1. Name 2. Social Security

Developing Secure Web Applications

1560 words - 6 pages have multiple separate capabilities, but with ACL's each resource has only one list [9]. Capabilities are considered more secure but are more difficult to implement [7]. IV. SESSION MANAGEMENT A web session is a series of HTTP requests and responses that are associated with a user. This session information must be maintained and often includes information about established variables such as access rights [10]. A session attack would involve

Access Control Layer on Top of Pig Using XACML

1366 words - 5 pages attributes of the subject, action, resource, and other relevant information. The PEP then sends this request to a PDP, which examines the request, collects policies that are applicable to this request, and determines whether access should be granted according to the XACML rules for evaluating policies. That answer is returned to the PEP, which can then allow or deny access to the requester XACML provides fine grained authorization, where one can define

Phone Usage in Schools: A Given Luxury, or a Deterrent from Learning?

1085 words - 5 pages , or the freedom of speech, is an example of individual rights. Owning a smartphone, a media player, or any electronic device are rights that belong to an individual citizen of the United States. The rights of citizens are protected by the government, and declared by the Bill of Rights. The Constitution of the United States of America does not directly state anything about public education, yet the Bill of Rights does say that “The powers not

Similar Essays

Labor Relation Paper

818 words - 3 pages University of PhoenixMGT/431 - Human Resource ManagementNovember 12, 2009.This writer will define unions, labor relation, and their impacts on organizations. In addition, this paper will touch on the campaign, the election, contract negotiations, grievance handling, arbitration, labor relation, and strikes. Many organizations today are concerned with establishing positive and effective relationship between management and the union. Therefore

The Dynamism Of Access Control Essay

2999 words - 12 pages strong authentication scheme that will be difficult to crack by unauthorized user. Authorization Authorization establishes if an already authenticated user is allowed to access a system or resource. Authorization checks and balance the limitation of access level granted or permitted to a user. Fig 1.0 Access control framework The class of account a user hold envelops the specification and the classification of the class as well as

Privacy Rights For Public Employees Essay

1018 words - 4 pages individuals from government interference, an employee must provide authorization to a company in order to search and seize confidential information (Wikipedia, 2007). As indicated within the United States Bill of Rights, the right exists "to be free of unreasonable search and seizure," therefore accessing confidential information without the knowledge or consent of the employee would be a federal violation (Wikipedia, 2007).Analyzing the impact of

The Psychology Of Human Rights Violators And Courageous Resistors

1268 words - 5 pages the following: if one can use the similar pathways of “learning by doing” and “authorization” within a pro-social, inclusive world view and create a society where authoritative child rearing need not become authoritarian child rearing, it is possible to say that there may one day be a world where there will be no violations of human rights that will require others to courageously resist.