{"title":"边沁麻瓜","authors":"J. Gustafsson","doi":"10.1017/s0953820822000218","DOIUrl":null,"url":null,"abstract":"Abstract A dialogue, in three parts, on utilitarian vulnerability to exploitation.","PeriodicalId":45896,"journal":{"name":"Utilitas","volume":null,"pages":null},"PeriodicalIF":1.2000,"publicationDate":"2022-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Bentham's Mugging\",\"authors\":\"J. Gustafsson\",\"doi\":\"10.1017/s0953820822000218\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract A dialogue, in three parts, on utilitarian vulnerability to exploitation.\",\"PeriodicalId\":45896,\"journal\":{\"name\":\"Utilitas\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.2000,\"publicationDate\":\"2022-08-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Utilitas\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1017/s0953820822000218\",\"RegionNum\":2,\"RegionCategory\":\"哲学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"0\",\"JCRName\":\"PHILOSOPHY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Utilitas","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1017/s0953820822000218","RegionNum":2,"RegionCategory":"哲学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"0","JCRName":"PHILOSOPHY","Score":null,"Total":0}