Thoughts on the Theory and Practice of Speculative Markets qua Event Predictors

Essays in Philosophy 6 (1):26 (2005)
  Copy   BIBTEX

Abstract

This paper analyzes the proposed use of combinatorial derivatives markets for event prediction, especially for catastrophic events such as terrorism, war, or political assasination. Following a presentation of the philosophical principles underlying these politico-economic tools, I examine case studies (U.S. DoD proposals) that evaluate their advantages and disadvantages in terms of both efficacy and moral considerations. I conclude that these markets are both fatally flawed due to internal conceptual contradictions and morally problematic.

Other Versions

No versions found

Similar books and articles

A Moral Analysis of Effective Prediction Markets on Terrorism.Dan Weijers - 2014 - International Journal of Technoethics 5 (1):28-43.
Is the repugnance about betting on terrorist attacks misguided?Dan Weijers & Jennifer Richardson - 2014 - Ethics and Information Technology 16 (3):251-262.
Derivatives.Jakob Arnoldi - 2004 - Theory, Culture and Society 21 (6):23-42.
Derivatives.Jakob Arnoldi - 2004 - Theory, Culture and Society 21 (6):23-42.
Democracy and the Epistemic Limits of Markets.Kevin J. Elliott - 2019 - Critical Review: A Journal of Politics and Society 31 (1):1-25.
Ethics and the Reach of Actually Existing Capitalist Markets.David Sherman - 2015 - Moral Philosophy and Politics 2 (2):333-355.
On the concept of terrorism.Willem Schinkel - 2009 - Contemporary Political Theory 8 (2):176-198.
Terrorism and Collective Responsibility.Seumas Miller - 2004 - International Journal of Applied Philosophy 18 (2):263-281.

Analytics

Added to PP
2010-09-03

Downloads
985 (#22,540)

6 months
111 (#55,082)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Mason Richey
State University of New York at Binghamton

Citations of this work

Is the repugnance about betting on terrorist attacks misguided?Dan Weijers & Jennifer Richardson - 2014 - Ethics and Information Technology 16 (3):251-262.

Add more citations

References found in this work

No references found.

Add more references