Security as Completeness

European Journal of Pragmatism and American Philosophy 9 (1) (2017)
  Copy   BIBTEX

Abstract

Peirce’s anti-psychologism hinges on two main assumptions. First, logic and psychology belong to two separate disciplines – respectively, the normative sciences and the experimental sciences. Second, externalism must be understood as a crucial and inescapable epistemological criterion. The introspectionist illusion, according to which individuals have direct and epistemologically flawless access to their own internal states, should be dismissed. As Colapietro (2003) and Calcaterra (2006) observe, Peirce’s standpoint is far different from the Kantian classical account of anti-psychologism. This original take on anti-psychologism leaves room for a functional distinction between logic and psychology, emerging from a semiotic and communicative continuity. This means that psychology, unlike logic as a formal doctrine of signs, will be epistemologically appropriate for dealing with internal psychological states, on the condition that this inquiry be focused on the communicative processes through which these internal states are expressed and conveyed. Such a Peircean account of anti-psychologism forms the epistemological background of this paper. My goal is to show how Peirce’s approach to communication and semiosis can be applied in order to discuss a specific psychological theory, in this case, attachment theory. Specifically, I propose employing Giovanni Maddalena’s Peircean distinction between complete and incomplete gestures (Maddalena 2015) to account for the distinction between secure, dismissing and preoccupied attachment patterns. To this end, I will be discussing three different measurements of attachment: the Adult Attachment Interview (AAI, George, Kaplan & Main 1985), the Adult Attachment Projection (AAP, George & West 2006), and the Patient Attachment Coding System (PACS, Talia, Miller-Bottome & Daniel 2015). Throughout this discussion, I will examine the connection between the semiotic and phenomenological category of completeness, and the psychological category of security. This connection involves an interesting normative import, which I briefly discuss in the conclusions.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,386

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Completeness: from Gödel to Henkin.Maria Manzano & Enrique Alonso - 2014 - History and Philosophy of Logic 35 (1):1-26.
Presuppositional completeness.Wojciech Buszkowski - 1989 - Studia Logica 48 (1):23 - 34.
Security: Against What? For What? With What?André Gorz - 1983 - Telos: Critical Theory of the Contemporary 1983 (58):158-168.
Reve{a,i}ling the Risks.Wolter Pieters - 2010 - Techné: Research in Philosophy and Technology 14 (3):194-206.
Reve{a,i}ling the Risks.Wolter Pieters - 2010 - Techné: Research in Philosophy and Technology 14 (3):194-206.
Defining Information Security.Lundgren Björn & Möller Niklas - 2019 - Science and Engineering Ethics 25 (2):419-441.
The Fascist Moment: Security, Exclusion, Extermination.Mark Neocleous - 2009 - Studies in Social Justice 3 (1):23-37.
Security, Knowledge and Well-being.Stephen John - 2011 - Journal of Moral Philosophy 8 (1):68-91.
Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.

Analytics

Added to PP
2017-12-09

Downloads
8 (#1,287,956)

6 months
5 (#629,136)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Citations of this work

Jung and James.Anna Dadaian - 2023 - European Journal of Pragmatism and American Philosophy 15 (2).

Add more citations