Results for ' Electronic trust'

1000+ found
Order:
  1.  13
    Trust and digital privacy in healthcare: a cross-sectional descriptive study of trust and attitudes towards uses of electronic health data among the general public in Sweden.Niels Lynøe, Gert Helgesson & Sara Belfrage - 2022 - BMC Medical Ethics 23 (1):1-8.
    BackgroundThe ability of healthcare to protect sensitive personal data in medical records and registers might influence public trust, which in turn might influence willingness to allow healthcare to use such data. The aim of this study was to examine how the general public’s trust relates to their attitudes towards uses of health data.MethodsA stratified sample from the general Swedish population received a questionnaire about their willingness to share health data. Respondents were also asked about their trust in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  2.  22
    Electronic institutions and neural computing providing law-compliance privacy for trusting agents.Mar Lopez, Javier Carbo, Jose M. Molina & Juanita Pedraza - 2017 - Journal of Applied Logic 24 (PA):119-131.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  3.  13
    Electronic Commerce and Consumer Privacy: Establishing Online Trust in the U.S. Digital Economy.Thomas A. Hemphill - 2002 - Business and Society Review 107 (2):221-239.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  4.  7
    Exploring the antecedents of trust in electronic word-of-mouth platform: The perspective on gratification and positive emotion.Xuemei Xie & Luyao Liu - 2022 - Frontiers in Psychology 13.
    Frequent human-media interaction via the electronic word-of-mouth platform, trust is acknowledged as an ongoing challenge. This study aimed to understand users' trust in the e-wom platform based on uses and gratifications theory and stimulus-organism-response paradigm. Utilitarian gratification was regarded as stimulus, social gratification and positive emotion as organism, and platform trust as response. Data was acquired from 268 users in China using a questionnaire survey, and the PLS-SEM was used to further analyze the results. The results (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  17
    Legal Recognition of Electronic Signature in Commercial Transactions: A Comparison Between the Jordanian Electronic Transactions Law of 2015 and the United Arab Emirates Electronic Transactions and Trust Services Law of 2021.Mohammad Saeed Abdallah Alsheyab - 2023 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 36 (3):1281-1291.
    Electronic commercial transactions have become a vital part of digital economies around the world. However, the countries need to upgrade their policy frameworks and related legal provisions amid a fragile cyber security environment. The authentication of electronic signatures is a complex phenomenon that needs attention for authentication and recognition. This research presents a comparative analysis of the two countries Jordan and the United Arab Emirates. This study analyzes the related legal statutes to figure out differences and compatibility with (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  6
    Trust and transparency in an age of surveillance.Lora Anne Viola & Paweł Laidler (eds.) - 2021 - New York, NY: Routledge.
    Investigating the theoretical and empirical relationships between transparency and trust in the context of surveillance, this volume argues that neither transparency nor trust provides a simple and self-evident path for mitigating the negative political and social consequences of state surveillance practices. Dominant in both the scholarly literature and public debate is the conviction that transparency can promote better-informed decisions, greater oversight, and restore trust damaged by the secrecy of surveillance. The contributions to this volume challenge this conventional (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  44
    A foundation for understanding online trust in electronic commerce.Beverly Kracher, Cynthia L. Corritore & Susan Wiedenbeck - 2005 - Journal of Information, Communication and Ethics in Society 3 (3):131-141.
    Trust is a key concept in business, particularly in electronic commerce. In order to understand online trust, one must first study trust research conducted in the offline world. The findings of such studies, dating from the 1950’s to the present, provide a foundation for online trust theory in e‐commerce. This paper provides an overview of the existing trust literature from the fields of philosophy, psychology, sociology, management, and marketing. Based on these bodies of work, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  8. The role of consumers' trust in online-shopping.Sonja Grabner-Kraeuter - 2002 - Journal of Business Ethics 39 (1-2):43 - 50.
    Many consumers are sceptical or suspicious about the functional mechanisms of electronic commerce, its intransparent processes and effects, and the quality of many products that are offered online. This paper analyses the role of consumer trust as a foundation for the diffusion and acceptance of electronic commerce. Starting from a functional perspective trust is seen as distinct but potentially coexisting mechanism for reducing the uncertainty and complexity of transactions and relationships in electronic markets. The analysis (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  9.  70
    Trust in nurse–patient relationships.Leyla Dinç & Chris Gastmans - 2013 - Nursing Ethics 20 (5):501-516.
    The aim of this study was to report the results of a literature review of empirical studies on trust within the nurse–patient relationship. A search of electronic databases yielded 34 articles published between 1980 and 2011. Twenty-two studies used a qualitative design, and 12 studies used quantitative research methods. The context of most quantitative studies was nurse caring behaviours, whereas most qualitative studies focused on trust in the nurse–patient relationship. Most of the quantitative studies used a descriptive (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  10.  36
    Designing trust with software agents: A case study.Stijn Bernaer, Martin Meganck, Greet Vanden Berghe & Patrick De Causmaecker - 2006 - Journal of Information, Communication and Ethics in Society 4 (1):37-48.
    In this paper, we will address anonymity, privacy and trust issues that arise during the research on a communication platform for multi-modal transport. Though most logistic information is currently available in electronic form, it is not widely accessible yet to all the parties concerned with transport. The major goal of a communication platform is to improve the conditions for exchanging information, which should lead to better organisation/collaboration within the transport sector. We need to merit credibility by faithfully modelling (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  11.  17
    Control, trust and the sharing of health information: the limits of trust.Soren Holm, Thomas Birk Kristiansen & Thomas Ploug - 2021 - Journal of Medical Ethics 47 (12):e35-e35.
    Clinical information about patients is increasingly being stored in electronic form and has therefore become more easily shareable. Data are collected as part of clinical care but have multiple other potential uses in relation to health system planning, audit and research. The use of clinical information for these secondary uses is controversial, and the ability to safeguard personal and sensitive data under current practices is contested.In this study, we investigate the attitudes of a representative sample of the Danish population (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  12.  35
    Consumer protection and electronic commerce in the Sultanate of Oman.Rakesh Belwal, Rahima Al Shibli & Shweta Belwal - 2021 - Journal of Information, Communication and Ethics in Society 19 (1):38-60.
    PurposeWithin a larger mandate of reviewing the key global trends concerning consumer protection in the electronic commerce (e-commerce) literature, this study aims to study the legal framework concerning e-commerce and consumer protection in the Sultanate of Oman and to analyse the current regulations concerning e-commerce and consumer protection.Design/methodology/approachThis study followed the normative legal research approach and resorted to the desk research process to facilitate content analysis of literature containing consumer protection legislation and regulatory provisions in Oman in particular and (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  32
    Trust and privacy in the future internet—a research perspective.Dirk Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
    With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for data linking and mining, together with unseen data collection, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14. Trust and privacy in the future internet—a research perspective.Dirk van Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
    With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for data linking and mining, together with unseen data collection, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  15.  37
    Information rights: trust and human dignity in e-Government.Toni Carbo - 2007 - International Review of Information Ethics 7 (9):1-7.
    The words ―Rights,‖ ―Trust,‖ ―Human Dignity,‖ and even ―Government‖ have widely varying meanings and connotations, differing across time, languages and cultures. Concepts of rights, trust, and human dignity have been examined for centuries in great depth by ethicists and other philosophers and by religious think-ers, and more recently by social scientists and, especially as related to information, by information scientists. Similarly, discussions of government are well documented in writings back to Plato and Aristotle, with investi-gations of electronic (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  16.  31
    Investigating Australians' Trust: Findings from a National Survey.Samantha B. Meyer, Tini C. N. Luong, Paul R. Ward, George Tsourtos & Tiffany K. Gill - 2012 - International Journal of Social Quality 2 (2):3-23.
    Trust has been identified as an indicator within Social Quality theory. As an important component of social quality, trust has become increasingly important in modern society because literature suggests that trust in a number of democratic countries is declining. Modern technologies and specialties are often beyond the understanding of lay individuals and thus, the need for trusting relations between lay individuals and organizations/individuals has grown. The purpose of the study was to examine the extent to which Australians (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17.  41
    Trust, secrecy and accuracy in voting systems: the case for transparency. [REVIEW]Roberto Casati - 2010 - Mind and Society 9 (1):19-23.
    If voting systems are to be trusted, they not only need to preserve both secrecy (if requested) and accuracy, but the mechanisms that preserve these features should be transparent, in the sense of being both cognitively understandable and accessible. Electronic voting systems, much as they promise accuracy in counting, and on top of being criticized for their insufficient protection of secrecy, violate the transparency requirement.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  18. Greenwash and Green Trust: The Mediation Effects of Green Consumer Confusion and Green Perceived Risk. [REVIEW]Yu-Shan Chen & Ching-Hsun Chang - 2013 - Journal of Business Ethics 114 (3):489-500.
    The paper explores the influence of greenwash on green trust and discusses the mediation roles of green consumer confusion and green perceived risk. The research object of this study focuses on Taiwanese consumers who have the purchase experience of information and electronics products in Taiwan. This research employs an empirical study by means of the structural equation modeling. The results show that greenwash is negatively related to green trust. Therefore, this study suggests that companies must reduce their greenwash (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   29 citations  
  19. The Drivers of Green Brand Equity: Green Brand Image, Green Satisfaction, and Green Trust.Yu-Shan Chen - 2010 - Journal of Business Ethics 93 (2):307-319.
    This article proposed four novel constructs – green brand image, green satisfaction, green trust, and green brand equity, and explored the positive relationships between green brand equity and its three drivers – green brand image, green satisfaction, and green trust. The object of this research study was information and electronics products in Taiwan. This research employed an empirical study by use of the questionnaire survey method. The questionnaires were randomly mailed to consumers who had the experience of purchasing (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  20. E-money and Trusts: A Property Analysis.Johanna Jacques - 2022 - Law Quarterly Review 138 (Oct):605-623.
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  88
    Developing artificial agents worthy of trust: “Would you buy a used car from this artificial agent?”. [REVIEW]F. S. Grodzinsky, K. W. Miller & M. J. Wolf - 2011 - Ethics and Information Technology 13 (1):17-27.
    There is a growing literature on the concept of e-trust and on the feasibility and advisability of “trusting” artificial agents. In this paper we present an object-oriented model for thinking about trust in both face-to-face and digitally mediated environments. We review important recent contributions to this literature regarding e-trust in conjunction with presenting our model. We identify three important types of trust interactions and examine trust from the perspective of a software developer. Too often, the (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  22.  69
    Who Do You Trust?William P. Smith & Filiz Tabak - 2005 - Proceedings of the International Association for Business and Society 16:33-37.
    The rapid diffusion of computers and information technology into organizational settings is bringing profound changes to employee-employer relationships.Managers and employees are faced with challenges of electronic monitoring of communications and collection and use of information about employees (Mello, 2003). This paper proposes to discuss several issues related to electronic workplace monitoring. Specifically, the purpose of this paper is to explore the interplay between privacy and ethical issues with processes related to the initiation and formation of trust between (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  76
    Explanation and trust: what to tell the user in security and AI? [REVIEW]Wolter Pieters - 2011 - Ethics and Information Technology 13 (1):53-64.
    There is a common problem in artificial intelligence (AI) and information security. In AI, an expert system needs to be able to justify and explain a decision to the user. In information security, experts need to be able to explain to the public why a system is secure. In both cases, an important goal of explanation is to acquire or maintain the users’ trust. In this paper, I investigate the relation between explanation and trust in the context of (...)
    Direct download (13 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  24.  36
    Minimal credential disclosure in trust negotiations.Federica Paci, David Bauer, Elisa Bertino, Douglas M. Blough, Anna Squicciarini & Aditi Gupta - 2009 - Identity in the Information Society 2 (3):221-239.
    The secure release of identity attributes is a key enabler for electronic business interactions. Users should have the maximum control possible over the release of their identity attributes and should state under which conditions these attributes can be disclosed. Moreover, users should disclose only the identity attributes that are actually required for the transactions at hand. In this paper we present an approach for the controlled release of identity attributes that addresses such requirements. The approach is based on the (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  47
    Factors affecting willingness to share electronic health data among California consumers.Katherine K. Kim, Pamela Sankar, Machelle D. Wilson & Sarah C. Haynes - 2017 - BMC Medical Ethics 18 (1):25.
    Robust technology infrastructure is needed to enable learning health care systems to improve quality, access, and cost. Such infrastructure relies on the trust and confidence of individuals to share their health data for healthcare and research. Few studies have addressed consumers’ views on electronic data sharing and fewer still have explored the dual purposes of healthcare and research together. The objective of the study is to explore factors that affect consumers’ willingness to share electronic health information for (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  26.  11
    Empowering employees: the other side of electronic performance monitoring.Karma Sherif, Omolola Jewesimi & Mazen El-Masri - 2021 - Journal of Information, Communication and Ethics in Society 19 (2):207-221.
    Purpose Advances in electronic performance monitoring have raised employees’ concerns regarding the invasion of privacy and erosion of trust. On the other hand, EPM promises to improve performance and processes. This paper aims to focus on how the alignment of EPM design and organizational culture through effective organizational mechanisms can address privacy concerns, and, hence, positively affect employees’ perception toward technology. Design/methodology/approach Based on a theoretical lens extending two conceptual frameworks, a qualitative approach was used to analyze interview (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  15
    A survey on gender-based violence – The paradox of trust between women and men in South Africa: A missiological scrutiny.Zuze J. Banda - 2020 - HTS Theological Studies 76 (1):9.
    South Africa continues to be plagued by gender-based violence (GBV). Recurring incidents of GBV cram news tabloids, social and electronic media, creating the impression of a country at war with itself. Of great concern is that, at the centre of these killings, men are allegedly the main culprits. This then has unleashed national protest campaigns, one notably, by the name #menaretrash, led by activists, mostly women, who angrily voice their disquiet against men. As a response, it was followed by (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  28.  45
    Dynamics of the key elements of consumer trust building online.Erkki Patokorpi & Kai K. Kimppa - 2006 - Journal of Information, Communication and Ethics in Society 4 (1):17-26.
    We lead increasingly electronic lives, in which a significant part of our existence takes place online. The concepts of eGovernment, eCommerce, eHealth and eLiving are an indication of this development. Against this background, there is an ever growing urgency of thinking through the problem of building trust in an online context. This paper examines the contextual conditions which affect building trust online. It will be argued that different combinations of the contextual conditions of trust building will (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  29.  18
    The role of control and other factors in the electronic surveillance workplace.Jengchung V. Chen & Yangil Park - 2005 - Journal of Information, Communication and Ethics in Society 3 (2):79-91.
    Many office workers use computers and the Internet not only to get their daily jobs done but also to deal with their personal businesses. Therefore employers nowadays monitor their employees electronically to prevent the misuse of the company resources. The use of electronic monitoring in organizations causes issues of trust and privacy. This study is dedicated to developing a conceptual model on the two issues under electronic monitoring. Control, considered as the essence of the definition of privacy (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30.  6
    Taxonomy Based Models for Reasoning: Making Inferences from Electronic Road Sign Information.Brigitte Lavalette, Charles Tijus, Christine Leproux & Olivier Bauer - 2005 - Foundations of Science 10 (1):25-45.
    Taxonomy Based modeling was applied to describe drivers’ mental models of variable message signs (VMS’s) displayed on expressways. Progress in road telematics has made it possible to introduce variable message signs (VMS’s). Sensors embedded in the carriageway every 500m record certain variables (speed, flow rate, etc.) that are transformed in real time into “driving times” to a given destination if road conditions do not change.VMS systems are auto-regulative Man-Machine (AMMI) systems which incorporate a model of the user: if the traffic (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  31. Taxonomy based models for reasoning : making inferences from electronic road sign information.B. Cambon-De-Lavalette, C. Tijus, C. Leproux & Olivier Bauer - 2005 - Foundations of Science.
    Taxonomy Based modeling was applied to describe drivers' mental models of variable message signs (VMS's) displayed on expressways. Progress in road telematics has made it possible to introduce variable message signs (VMS's). Sensors embedded in the carriageway every 500m record certain variables (speed, flow rate, etc.) that are transformed in real time into 'driving times' to a given destination if road conditions do not change. VMS systems are auto-regulative Man-Machine (AMMI) systems which incorporate a model of the user: if the (...)
     
    Export citation  
     
    Bookmark  
  32.  61
    Taxonomy based models for reasoning: Making inferences from electronic road sign information. [REVIEW]Brigitte Cambon de Lavalette, Charles Tijus, Christine Leproux & Olivier Bauer - 2005 - Foundations of Science 10 (1):25-45.
    Taxonomy Based modeling was applied to describe drivers’ mental models of variable message signs (VMS’s) displayed on expressways. Progress in road telematics has made it possible to introduce variable message signs (VMS’s). Sensors embedded in the carriageway every 500m record certain variables (speed, flow rate, etc.) that are transformed in real time into “driving times” to a given destination if road conditions do not change. VMS systems are auto-regulative Man-Machine (AMMI) systems which incorporate a model of the user: if the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33.  26
    How Group Perception Affects What People Share and How People Feel: The Role of Entitativity and Epistemic Trust in the “Saying-Is-Believing” Effect.Tingchang Liang, Zhao Lin & Toshihiko Souma - 2021 - Frontiers in Psychology 12.
    This research investigated how interpersonal communication with a large audience can influence communicators’ attitudes. Research on the saying-is-believing effect has shown that when an individual’s attitude is perceived in advance by a communicator, the communicator tunes the message to the person, which biases the communicator’s attitude toward the person’s attitude. In this study, we examined the conditions under which audience tuning and attitude bias can occur with audiences containing more than one individual. We manipulated communicators’ perceived group entity for a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  6
    Democracy and the Environment on the Internet: Electronic Citizen Participation in Regulatory Rulemaking.David Schlosberg, Stuart Shulman & Stephen Zavestoski - 2006 - Science, Technology, and Human Values 31 (4):383-408.
    We hypothesize that recent uses of the Internet as a public-participation mechanism in the United States fail to overcome the adversarial culture that characterizes the American regulatory process. Although the Internet has the potential to facilitate deliberative processes that could result in more widespread public involvement, greater transparency in government processes, and a more satisfied citizenry, we argue that efforts to implement Internet-based public participation have overlaid existing problematic government processes without fully harnessing the transformative power of information technologies. Public (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  35.  7
    Response to commentaries on ‘Should free-text data in electronic medical records be shared for research? A citizens’ jury study in the UK’.Elizabeth Ford & Malcolm Oswald - 2020 - Journal of Medical Ethics 46 (6):384-385.
    We note a range of interesting and challenging points which take forward the discourse around the ethics of sharing patient data. Of most note are criticisms of our jury recruitment and methods; questioning how we can engender trust and support from the wider, uninformed public when we only have the view of a small informed public; asking what work needs to be done to ethically transfer data from a clinical care setting to that of research; suggesting that dynamic consent (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  36.  13
    Limits of data anonymity: lack of public awareness risks trust in health system activities. [REVIEW]Caroline Brall & Felix Gille - 2021 - Life Sciences, Society and Policy 17 (1):1-8.
    Public trust is paramount for the well functioning of data driven healthcare activities such as digital health interventions, contact tracing or the build-up of electronic health records. As the use of personal data is the common denominator for these healthcare activities, healthcare actors have an interest to ensure privacy and anonymity of the personal data they depend on. Maintaining privacy and anonymity of personal data contribute to the trustworthiness of these healthcare activities and are associated with the public (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  37.  12
    Physics and Metaphysics: Theories of Space and Time.Jennifer Trusted - 1991 - New York: Routledge.
    Jennifer Trusted's new book argues that metaphysical beliefs are essential for scientific inquiry. The theories, presuppositions and beliefs that neither science nor everyday experience can justify are the realm of metaphysics, literally `beyond physics'. These basic beliefs form a framework for our activities and can be discovered in science, common sense and religion. By examining the history of science from the eleventh century to the present, this book shows how religious and mystical beliefs, as well as philosophical speculation have had (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  38.  16
    Physics and Metaphysics: Theories of Space and Time.Jennifer Trusted - 1991 - New York: Routledge.
    Jennifer Trusted's new book argues that metaphysical beliefs are essential for scientific inquiry. The theories, presuppositions and beliefs that neither science nor everyday experience can justify are the realm of metaphysics, literally `beyond physics'. These basic beliefs form a framework for our activities and can be discovered in science, common sense and religion. By examining the history of science from the eleventh century to the present, this book shows how religious and mystical beliefs, as well as philosophical speculation have had (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  39. Moral Principles and Social Values.Jennifer Trusted - 1987 - Routledge.
    First published in 1987. Routledge is an imprint of Taylor & Francis, an informa company.
     
    Export citation  
     
    Bookmark   11 citations  
  40. Physics and metaphysics: theories of space and time.Jennifer Trusted - 1991 - New York: Routledge.
    The emergence of modern science is a history of disentanglement, as science detached itself first from religion and then from philosophy. Jennifer Trusted in Physics and Metaphysics argues that science -- in its haste to tear itself from its historical links -- has neglected the various roles religious and philosophical ideas have actually played and continue to play in scientific thinking. This book seeks to redress the balance by exploring how metaphysical beliefs have functioned in the history of scientific inquiry (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  41.  11
    Imagining past and present: a rhetorical strategy in Aeschines 3, Against Ctesiphon.Electronic Antiquity - 2007 - Classical Quarterly 57:490-501.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  42.  7
    Free Will and Responsibilty.Jennifer Trusted - 1984 - New York: Oxford University Press.
    This book was written for those who have a general interest in how the concepts of personal freedom and determinism affect their daily lives and their dealings with other people.
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  43.  7
    Physics and Metaphysics: Theories of Space and Time.Jennifer Trusted - 1991 - New York: Routledge.
    He emergence of modern science is a history of disentanglement, as science detached itself first from religion and then from philosophy. Jennifer Trusted in Physics and Metaphysics argues that science -- in its haste to tear itself from its historical links -- has neglected the various roles religious and philosophical ideas have actually played and continue to play in scientific thinking. This book seeks to redress the balance by exploring how metaphysical beliefs have functioned in the history of scientific inquiry (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  44. Angela Davis.Trust No Man - 2006 - In Elizabeth Hackett & Sally Anne Haslanger (eds.), Theorizing Feminisms: A Reader. Oxford University Press.
  45. Scientific quasi-realism.Jennifer Trusted - 1990 - Mind 99 (393):109-111.
  46. Upcoming CPD Seminars.Trust Accounting Profitability - forthcoming - Ethos: Journal of the Society for Psychological Anthropology.
  47.  10
    An introduction to the philosophy of knowledge.Jennifer Trusted - 1981 - London: Macmillan.
    A short account of the philosophy of knowledge for students reading philosophy for the first time. It also serves as a general introduction to those interested in the subject.
    Direct download  
     
    Export citation  
     
    Bookmark  
  48.  7
    Beliefs and Biology: Theories of Life and Living.Jennifer Trusted - 2003 - Palgrave-Macmillan.
    The purpose of this book is to show how the science of biology has been influenced by ethical, religious, social, cultural and philosophical beliefs as to the nature of life and our human place in the natural world. It follows that there are accounts of theories and investigations from those of Aristotle to research in molecular biology today. These have been selected to illustrate the theme and there is no intention to present a comprehensive history of biology. It is suggested (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  19
    Berkeley's philosophy of mathematics.Jennifer Trusted - 1995 - History of European Ideas 21 (1):105-106.
    This book examines the place of mathematics in Berkeley's philosophy and Berkeley's place in the history of mathematics. Beginning with an account of the traditional "abstractionist" philosophy of mathematics which Berkeley opposed, it examines his case against abstract ideas as well as his differing accounts of arithmetic and geometry. Berkeley's critique of the calculus is also examined in detail, beginning with a historical treatment of the origins of the calculus, proceeding to analyze Berkeley's objections in his 1734 work "The Analyst", (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  50.  4
    Inquiry and understanding: an introduction to explanation in the physical and human sciences.Jennifer Trusted - 1987 - Houndmills, Basingstoke, Hampshire: Macmillan Education.
1 — 50 / 1000