Results for ' eavesdropper'

18 found
Order:
  1. Eavesdroppers and epistemic modals.John Hawthorne - 2007 - Philosophical Issues 17 (1):92-101.
  2.  34
    Eavesdropper on the Past: John W. Burrow , Intellectual History and Its Future.Cesare Cuttica - 2014 - History of European Ideas 40 (7):905-924.
    Focused on the much-debated historiographical and academic status of intellectual history, this article addresses for the first time and in detail the methodological views of the British historian John Wyon Burrow . Making use both of his published works and of unpublished material left to the University of Sussex Library , its goal is to provide a thorough account of an original and eclectic intellectual historian and, at the same time, cast new light on the role of the discipline in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  3.  13
    Eavesdroppers in Cyberspace.Frank Jossi - 1994 - Business Ethics 8 (3):22-25.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  4.  13
    Eavesdroppers in Cyberspace.Frank Jossi - 1994 - Business Ethics: The Magazine of Corporate Responsibility 8 (3):22-25.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5. Epistemic Modality, Eavesdroppers and the Objectivity Problem.Wylie Breckenridge - manuscript
    There is an account of modal operators that is both elegant and powerful and that deserves to be called the standard account. There are, however, some epistemic uses of modal operators which seem to be counterexamples to the account – they pose what I call the objectivity problem. It is often thought that the objectivity problem can be fixed by a certain kind of modification to the standard account. I argue that this kind of modification cannot work. Then I argue (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  31
    Of gossips, eavesdroppers, and peeping toms.H. W. S. Francis - 1982 - Journal of Medical Ethics 8 (3):134-143.
    British accounts of medical ethics concentrate on confidentiality to the exclusion of wider questions of privacy. This paper argues for consideration of privacy within medical ethics, and illustrates through the television series `Hospital', what may go awry when this wider concept is forgotten.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  7. The Case against Semantic Relativism.Teresa Marques - 2019 - In Martin Kusch (ed.), The Routledge Handbook of Philosophy of Relativism. Routledge.
    This paper presents reasons against semantic relativism. Semantic relativism is motivated by intuitions that are presumed to raise problems for traditional or contextualist semantics in contested domains of discourse. Intuition-based arguments are those based on competent speakers’ putative intuitions about seeming faultless disagreement, eavesdropper, and retraction cases. I will organize the discussion in three parts. First, I shall provide a brief introduction to the intuition-based arguments offered in favor of semantic relativism. Second, I shall indicate that there are ways (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  8. Testimonial entitlement, norms of assertion and privacy.Philip J. Nickel - 2013 - Episteme 10 (2):207-217.
    According to assurance views of testimonial justification, in virtue of the act of testifying a speaker provides an assurance of the truth of what she asserts to the addressee. This assurance provides a special justificatory force and a distinctive normative status to the addressee. It is thought to explain certain asymmetries between addressees and other unintended hearers (bystanders and eavesdroppers), such as the phenomenon that the addressee has a right to blame the speaker for conveying a falsehood but unintended hearers (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  9.  29
    Ethics, Markets, and the Legalization of Insider Trading.Bruce W. Klaw & Don Mayer - 2019 - Journal of Business Ethics 168 (1):55-70.
    In light of recent doctrinal changes, we examine the confused state of U.S. insider trading law, identifying gaps that permit certain market participants to trade on the basis of material nonpublic information, and contrast U.S. insider trading doctrine with the European approach. We then explore the ethical implications of the status quo in the U.S., explaining why the dominant legal justifications for prohibiting classical insider trading and misappropriation—the fiduciary duty and property rights theories—fail to account for the wrongfulness of insider (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  10. Epistemic Modal Eavesdropping: a straight solution to a relativist challenge.Joe Salerno - manuscript
    A primary challenge from the relativist to the contextualist about epistemic modals is to explain eavesdropping data—i.e., why the eavesdropper is inclined to judge the speaker as having uttered an epistemic modal falsehood (when she is so inclined), even though the speaker’s utterance is true according to reasonable contextualist truth conditions. The issue turns in large part on the strength and shape of the data, both of which are in dispute. One complaint is that an eavesdropper’s truth value (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  11. Reflexive rules as content: the case of deictic demonstratives.Eduarda Calado Barbosa - 2019 - Sofia 8 (1):54-66.
    Determining what content is expressed by a demonstrative when its reference cannot be determined is a problem for those who assume that demonstrative reference is cognized by interpreters and demonstrative meaning has a mere indicative role. Here, I explore a concept of content that gives meaning a cognitively relevant role, namely, John Perry’s classificatory concept of content. With that purpose, I compare the interpretation of a deictic demonstrative in two cases: for an eavesdropper and a conversational participant, aiming to (...)
    No categories
     
    Export citation  
     
    Bookmark  
  12.  44
    Shedding Light on Keeping People in the Dark.Don Fallis - 2018 - Topics in Cognitive Science 12 (2):535-554.
    We want to keep hackers in the dark about our passwords and our credit card numbers. We want to keep potential eavesdroppers in the dark about our private communications with friends and business associates. This need for secrecy raises important questions in epistemology (how do we do it?) and in ethics (should we do it?). In order to answer these questions, it would be useful to have a good understanding of the concept of keeping someone in the dark. Several philosophers (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  13.  26
    A Semiotic Interpretation of the Innate Releasing Mechanism Concept and Other Ethological Triadic Relations.Gabriel Francescoli - 2017 - Biosemiotics 10 (3):461-468.
    This paper tries to link Ethology to Biosemiotics by analysing the similarities between some triadic relationships like biosemiotics’ Object—Representamen—Interpretant and the one established in Ethology between Sign-stimuli— Innate Releasing Mechanism—Modal Action Pattern, or the one potentially established in communication networks comprising Sender—Receiver—Eavesdropper. I argue here that a collaborative relationship is supported by the fact that the observational method used by Ethology is based on the triadic relationship Sender—Receiver—Eavesdropper. This method, by introducing the human observer at the Interpreter/Eavesdropper (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  14.  13
    WASPs and Other Endangered Species.Robert E. Streeter - 1977 - Critical Inquiry 3 (4):725-739.
    After all, ever since the abandonment of the classical curriculum in the mid-nineteenth century, the courses of studies in American colleges have been characterized by ever-increasing diversity, responses to highly particular social and individual demands, spin-offs from traditional disciplines, specializations breeding subspecializations, and the like. Stringent counterrevolutions, such as the one undertaken in the College of the University of Chicago some thirty years ago, have been infrequent and brief. What, then, is so special about the present seductive disarray in literary (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  15.  73
    The case of the hidden hand.Hans P. van Ditmarsch - 2005 - Journal of Applied Non-Classical Logics 15 (4):437-452.
    In unconditionally secure protocols, a sender and receiver are able to communicate their secrets to each other without the eavesdropper(s) being able to learn the secret, even when the eavesdropper intercepts the entire communication. We investigate such protocols for the special case of deals of cards over players, where two players aim to communicate to each other their hand of cards without the remaining player(s) learning a single card from either hand. In this contribution we show that a (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  16.  19
    Defining Dialogue: From Socrates to the Internet.Geoffrey Rockwell - 2003 - Humanity Books.
    This original cross-disciplinary work examines the crucial role of dialogue in philosophy from the oral dialogues of Socrates; through the written dialogues of Plato, Cicero, Lucian, Valla, Hume, and Heidegger; to the present ubiquitous form of dialogue on the Internet. Geoffrey Rockwell's main point is that in dialogue, be it oral, written, or electronic, there is a common mode of persuasion at work. The dialogue is an orchestrated event meant to be overheard. While the author is absent, the readers of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  43
    Quantum Cryptography.Serge Fehr - 2010 - Foundations of Physics 40 (5):494-531.
    Quantum cryptography makes use of the quantum-mechanical behavior of nature for the design and analysis of cryptographic schemes. Optimally (but not always), quantum cryptography allows for the design of cryptographic schemes whose security is guaranteed solely by the laws of nature. This is in sharp contrast to standard cryptographic schemes, which can be broken in principle, i.e., when given sufficient computing power. From a theory point of view, quantum cryptography offers a beautiful interplay between the mathematics of adversarial behavior and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  18.  24
    On "Revolutionary Road": A Proposal for Extending the Gricean Model of Communication to Cover Multiple Hearers.Marta Dynel - 2010 - Lodz Papers in Pragmatics 6 (2):283-304.
    On "Revolutionary Road": A Proposal for Extending the Gricean Model of Communication to Cover Multiple Hearers The paper addresses the problem of multiple hearers in the context of the Gricean model of communication, which is based on speaker meaning and the Cooperative Principle, together with its subordinate maxims, legitimately flouted to yield implicatures. Grice appears to have conceived of the communicative process as taking place between two interlocutors, assuming that the speaker communicates meanings, while the hearer makes compatible inferences. A (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation