Results for ' false security'

1000+ found
Order:
  1.  20
    The Dangers of Directives or the False Security of Forms.Diane E. Hoffmann, Sheryl Itkin Zimmerman & Catherine J. Tompkins - 1996 - Journal of Law, Medicine and Ethics 24 (1):5-17.
    During the past several years, numerous studies have been conducted regarding advance directives for health care). Studies have examined how many individuals have executed advance directives, who is more likely to execute such directives, and whether factors such as education, income, race, religiosity, or family status affect the likelihood of having executed an advance directive or one's willingness to do so. Studies have also investigated the effectiveness of different educational strategies aimed at increasing the number of individuals who execute these (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  2.  14
    The Dangers of Directives or the False Security of Forms.Diane E. Hoffmann, Sheryl Itkin Zimmerman & Catherine J. Tompkins - 1996 - Journal of Law, Medicine and Ethics 24 (1):5-17.
    During the past several years, numerous studies have been conducted regarding advance directives for health care). Studies have examined how many individuals have executed advance directives, who is more likely to execute such directives, and whether factors such as education, income, race, religiosity, or family status affect the likelihood of having executed an advance directive or one's willingness to do so. Studies have also investigated the effectiveness of different educational strategies aimed at increasing the number of individuals who execute these (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  3. The False Promise of Collective Security Through Preventive War.Neta C. Crawford - 2007 - In Henry Shue & David Rodin (eds.), Preemption: Military Action and Moral Justification. Oxford University Press.
     
    Export citation  
     
    Bookmark   2 citations  
  4.  12
    A false sense of security.Piero A. Bonatti - 2022 - Artificial Intelligence 310 (C):103741.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  78
    Securing singular thought about merely hypothetical entities.Greg Ackerman - 2016 - Philosophical Studies 173 (8):2193-2213.
    Although we are still in the dark when it comes to giving necessary and jointly sufficient criteria for what it takes to be thinking a singular thought, the paradigm cases are just ones where an agent is thinking about some particular object. When we erroneously think that Vulcan is a planet, our thought appears to be singular since it is, after all, about Vulcan. A promising way to explain this is to claim that there is something, a merely hypothetical entity, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  94
    Information, Security, Privacy, and Anonymity : Definitional and Conceptual Issues.Björn Lundgren - 2018 - Dissertation, Kth Royal Institute of Technology
    This doctoral thesis consists of five research papers that address four tangential topics, all of which are relevant for the challenges we are facing in our socio-technical society: information, security, privacy, and anonymity. All topics are approached by similar methods, i.e. with a concern about conceptual and definitional issues. In Paper I—concerning the concept of information and a semantic conception thereof—it is argued that the veridicality thesis is false. In Paper II—concerning information security—it is argued that the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7. False Names, Demonstratives and the Refutation of Linguistic Naturalism in Plato's "Cratylus" 427 d1-431c3.Imogen Smith - 2008 - Phronesis 53 (2):125-151.
    This paper offers an interpretation of Plato's Cratylus 427d1-431c3 that supports a reading of the dialogue as a whole as concluding in favour of a conventionalist account of naming. While many previous interpretations note the value of this passage as evidence for Platonic investigations of false propositions, this paper argues that its demonstration that there can be false (or incorrect) naming in turn refutes the naturalist account of naming; that is, it shows that a natural relation between name (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  65
    Daniel J. Solove, Nothing to Hide: The False Tradeoff between Privacy and Security: New Haven and London: Yale University Press, 2011. ISBN 10:0300172311, $25.00, Hbk. [REVIEW]Tony Doyle - 2012 - Journal of Value Inquiry 46 (1):107-112.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  9.  3
    False Financial Statement Identification Based on Fuzzy C-Means Algorithm.Jixiao Li - 2021 - Complexity 2021:1-11.
    Financial accountants falsify financial statements by means of financial techniques such as financial practices and financial standards, and when compared with conventional financial data, it is found that the falsified financial data often lack correlation or even contradict each other in terms of financial data indicators. At the same time, there are also inherent differences in reporting patterns from conventional financial data, but these differences are difficult to test manually. In this paper, the fuzzy C-means clustering method is used to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  16
    Secure Fingerprint Authentication Using Deep Learning and Minutiae Verification.S. Vadivel, Saad Bayezeed & V. M. Praseetha - 2019 - Journal of Intelligent Systems 29 (1):1379-1387.
    Nowadays, there has been an increase in security concerns regarding fingerprint biometrics. This problem arises due to technological advancements in bypassing and hacking methodologies. This has sparked the need for a more secure platform for identification. In this paper, we have used a deep Convolutional Neural Network as a pre-verification filter to filter out bad or malicious fingerprints. As deep learning allows the system to be more accurate at detecting and reducing false identification by training itself again and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  26
    The Impact of Fraudulent False Information on Equity Values.Saif Ullah, Nadia Massoud & Barry Scholnick - 2014 - Journal of Business Ethics 120 (2):219-235.
    There are two types of stock price manipulation examined in the theoretical literature: insider trading, which involves private information that is true and the public spreading of fraudulent false information. While there is a large empirical literature on insider trading, this is the first empirical article to examine the impact of false, fraudulent public information on stock prices and trading volume. We find that such false information, even after being denied by a credible source such as the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  8
    Implementation of network information security monitoring system based on adaptive deep detection.Lavish Kansal, Abdullah M. Baqasah, Roobaea Alroobaea & Jing Niu - 2022 - Journal of Intelligent Systems 31 (1):454-465.
    For a better detection in Network information security monitoring system, the author proposes a method based on adaptive depth detection. A deep belief network was designed and implemented, and the intrusion detection system model was combined with a support vector machine. The data set adopts the NSL-KDD network communication data set, and this data set is authoritative in the security field. Redundant cleaning, data type conversion, normalization, and other processing operations are performed on the data set. Using the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  38
    Work, Domination, and the False Hope of Universal Basic Income.Orlando Lazar - 2020 - Res Publica 27 (3):427-446.
    Universal basic income is increasingly proposed as a simple answer to the problem of domination at work—one policy whose knock-on effects will transform the balance of power between workers and employers. I argue against such ‘UBI-first’ approaches. Compared to UBI proposals for other purposes, a UBI sufficient or near-sufficient for minimising domination at work would be especially demanding in two ways. First, the level of the grant would be more demanding compared to UBIs suitable for other purposes, in order for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  14.  48
    Reversibility and chiasm: false equivalents? An alternative approach to understanding difference in Merleau-Ponty’s late philosophy.Fiona Hughes - 2017 - British Journal for the History of Philosophy 25 (2):356-379.
    The chiasm is usually considered the key notion for Merleau-Ponty’s later philosophy. I argue against a common conclusion, namely that ‘the chiasm’ is equivalent to ‘reversibility’. Even when the two terms are not taken as interchangeable, the precise nature of their relation has not been adequately established. Focusing exclusively on ‘reversibility’ has implications for a range of philosophical issues, including relations between self and other. The danger of substituting one term for the other is that existential relations are construed as (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  39
    Epicurus, determinism and the security of knowledge.Kevin Magill - 1992 - Theoria 58 (2-3):183-196.
    The article criticises various interpretations of Epicurus's claim that belief in determinism is self-invalidating: -/- - 'The man who says that all things come to pass by necessity cannot criticise one who denies that all things come to pass by necessity, for he admits that this too happens of necessity.' - -/- especially Ted Honderich's argument that the real force of the Epicurean claim is that if belief acquisition is causally necessitated, we will be excluded from possible facts and inquiries (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  16.  12
    Humanitarianism Sacrificed: Integration's False Promise.Nicolas de Torrenté - 2004 - Ethics and International Affairs 18 (2):3-12.
    In recent years, there have been concerted efforts to ensure that the different components of the international response to crisis-affected countries, whether conducted under the banner of the United Nations or not, are integrated in pursuit of a stated goal of comprehensive, durable, and just resolution of conflict. This includes a drive to purposefully make humanitarian assistance to victims, one of the principal forms of outside involvement in crisis situations, supportive of the “international community's” political ambition. The implication of the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  17.  7
    Application of data mining technology in detecting network intrusion and security maintenance.Mehedi Masud, Roobaea Alroobaea, Fahad M. Almansour, Gurjot Singh Gaba & Yongkuan Zhu - 2021 - Journal of Intelligent Systems 30 (1):664-676.
    In order to correct the deficiencies of intrusion detection technology, the entire computer and network security system are needed to be more perfect. This work proposes an improved k-means algorithm and an improved Apriori algorithm applied in data mining technology to detect network intrusion and security maintenance. The classical KDDCUP99 dataset has been utilized in this work for performing the experimentation with the improved algorithms. The algorithm’s detection rate and false alarm rate are compared with the experimental (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  47
    Humanitarianism Sacrificed: Integration's False Promise.Nicolas Torrenté - 2004 - Ethics International Affairs 18 (2):3-12.
    In recent years, there have been concerted efforts to ensure that the different components of the international response to crisis-affected countries, whether conducted under the banner of the United Nations or not, are integrated in pursuit of a stated goal of comprehensive, durable, and just resolution of conflict. This includes a drive to purposefully make humanitarian assistance to victims, one of the principal forms of outside involvement in crisis situations, supportive of the “international community's” political ambition. The implication of the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19.  17
    Culturological reconstruction of ChatGPT's socio-cultural threats and information security of Russian citizens.Pavel Gennadievich Bylevskiy - forthcoming - Philosophy and Culture (Russian Journal).
    The subject of the study is the socio-cultural threats to the information security of Russian citizens associated with ChatGPT technologies (Chat Generative Pre-trained Transformer, a machine-generated text response generator simulating a dialogue). The object of research − evaluation of the ratio of advantages and threats of generative language models based on "machine learning" in modern (2021-2023) scientific literature (journals HAC K1, K2 and Scopus Q1, Q2). The scientific novelty of the research lies in the culturological approach to the analysis (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  13
    E-commerce Review System to Detect False Reviews.Manjur Kolhar - 2018 - Science and Engineering Ethics 24 (5):1577-1588.
    E-commerce sites have been doing profitable business since their induction in high-speed and secured networks. Moreover, they continue to influence consumers through various methods. One of the most effective methods is the e-commerce review rating system, in which consumers provide review ratings for the products used. However, almost all e-commerce review rating systems are unable to provide cumulative review ratings. Furthermore, review ratings are influenced by positive and negative malicious feedback ratings, collectively called false reviews. In this paper, we (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  19
    Ethics, Information Manipulation and Cyber Security in Social Media.Aynur Tekke & Aybala Lale - 2021 - Akademik İncelemeler Dergisi 16 (2):44-62.
    The aim of this study is to analyze the information in the social media which is being produced and included into the stream by mass media in the context of digital ethics and cyber security. The principles of digital ethics includes norms that takes individual’s privacy of life into consideration. In addition to being a concept related to cyberspace, computer, and computer networks, it also includes the whole human-made activities, for this reason manipulation techniques in cyberspace appear as an (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  22. Why inference to the best explanation doesn’t secure empirical grounds for mathematical platonism.Kenneth Boyce - 2018 - Synthese 198 (1):1-13.
    Proponents of the explanatory indispensability argument for mathematical platonism maintain that claims about mathematical entities play an essential explanatory role in some of our best scientific explanations. They infer that the existence of mathematical entities is supported by way of inference to the best explanation from empirical phenomena and therefore that there are the same sort of empirical grounds for believing in mathematical entities as there are for believing in concrete unobservables such as quarks. I object that this inference depends (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  23.  10
    Distributed Energy Management for Port Power System under False Data Injection Attacks.Qihe Shan, Xin Zhang, Qiongyue Zhang & Qiuye Sun - 2022 - Complexity 2022:1-15.
    This paper investigates a distributed energy management strategy for the port power system under false data injection attacks. The attacker can tamper with the interaction information of energy equipment, penetrate the boundary between port information system and port power system, and cause serious operation failure of port energy equipment. Firstly, a hierarchical topology is proposed to allocate the security resources of the port power system. Secondly, by reconstructing the topological structure of the port information system, the robustness of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24. Is Terrorism a Serious Threat to International and National Security? NO: The Myth of Terrorism as an Existential Threat.Jessica Wolfendale - 2012 - In Richard Jackson & Samuel Justin Sinclair (eds.), Contemporary Debates on Terrorism. Routledge. pp. 80-87.
    In contemporary academic, political, and media discourse, terrorism is typically portrayed as an existential threat to lives and states, a threat driven by religious extremists who seek the destruction of Western civilization and who are immune to reason and negotiation. In many countries, including the US, the UK, and Australia, this existential threat narrative of terrorism has been used to justify sweeping counterterrorism legislation, as well as military operations and even the use of tactics such as torture and indefinite detention. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  10
    Northern Ireland’s Interregnum. Anna Burns’s Depiction of a (Post)-Troubles State of (In)security.Ryszard Bartnik - 2021 - Text Matters - a Journal of Literature, Theory and Culture 11:64-83.
    This paper aims to present the main contours of Burns’s literary output which, interestingly enough, grows into a personal understanding of the collective mindset of -Troubles Northern Ireland. It is legitimate, I argue, to construe her fiction as a body of work shedding light on certain underlying mechanisms of sectarian violence. Notwithstanding the lapse of time between 1998 and 2020, the Troubles’ toxic legacy has indeed woven an unbroken thread in the social fabric of the region. My reading of the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26. Note E discussioni-notes and discussions.False Complaints - 1990 - Epistemologia 13:145-150.
     
    Export citation  
     
    Bookmark  
  27. Illan Rua Wall.Turbulent Legality : Sovereignty, Security & The Police - 2018 - In Andreas Philippopoulos-Mihalopoulos (ed.), Routledge Handbook of Law and Theory. New York, NY: Routledge.
     
    Export citation  
     
    Bookmark  
  28. On this page.Introducing False Eur & E. U. R. False - 2000 - Complexity 286 (1).
    No categories
     
    Export citation  
     
    Bookmark  
  29. The Pragmatics of Explanation.I. False Ideals - 1980 - In Elmer Daniel Klemke, Robert Hollinger, David Wÿss Rudge & A. David Kline (eds.), Introductory readings in the philosophy of science. Amherst, N.Y.: Prometheus Books. pp. 264.
  30. The Very Idea of Theory in Business History.Alan Roberts & Isma Centre for Education and Research in Securities Markets - 1998 - University of Reading, Department of Economics, and Isma Centre for Education and Research in Securities Markets.
     
    Export citation  
     
    Bookmark  
  31. Australasian Journal of Philosophy Contents of Volume 91.Present Desire Satisfaction, Past Well-Being, Volatile Reasons, Epistemic Focal Bias, Some Evidence is False, Counting Stages, Vague Entailment, What Russell Couldn'T. Describe, Liberal Thinking & Intentional Action First - 2013 - Australasian Journal of Philosophy 91 (4).
    No categories
     
    Export citation  
     
    Bookmark   1 citation  
  32.  9
    Marginal Comforts Keep Us in Hell.Jake Jackson - 2020-08-27 - In Kimberly S. Engels (ed.), The Good Place and Philosophy. Wiley. pp. 131–140.
    In The Good Place, the characters’ attempts to find “marginal comforts” worsen their suffering by lulling them into a false sense of security and keeping them from fully resisting or rebelling against their situation. People will justify the worst and most hellish marriages, jobs, and living situations, if they can find small marginal comforts that keep them stable. Being comfortable is not a “why” in life, and it's really just a good way to hurt oneself all the more. (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  49
    To Describe, Transmit or Inquire: Ethics and technology in school.Viktor Gardelli - 2016 - Dissertation, Luleå University of Technology
    Ethics is of vital importance to the Swedish educational system, as in many other educational systems around the world.Yet, it is unclear how ethics should be dealt with in school, and prior research and evaluations have found serious problems regarding ethics in education.The field of moral education lacks clear and widely accepted definitions of key concepts, and these ambiguities negatively impact both research and educational practice. This thesis draws a distinction between three approaches to ethics in school – the descriptive (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  34.  11
    Logiḳah be-peʻulah =.Doron Avital - 2012 - Or Yehudah: Zemorah-Bitan, motsiʼim le-or.
    Logic in Action/Doron Avital Nothing is more difficult, and therefore more precious, than to be able to decide (Napoleon Bonaparte) Introduction -/- This book was born on the battlefield and in nights of secretive special operations all around the Middle East, as well as in the corridors and lecture halls of Western Academia best schools. As a young boy, I was always mesmerized by stories of great men and women of action at fateful cross-roads of decision-making. Then, like as today, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  35. Walls in the Heart.Kristin E. Heyer - 2022 - Journal of Catholic Social Thought 19 (1):25-40.
    In Fratelli tutti, Pope Francis probes structural and ideological threats to people’s social instincts and shared good in contexts of fragmentation and false securities. His approach to these pervasive temptations to build a culture of walls “in the heart” and “on the land” employs structural analyses but also elevates ideologies abetting the harms these walls wreak, signaling a development in the use of social sin in line with related emerging theological scholarship. This essay traces and contextualizes Francis’s application of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  22
    “Heroism on an empty stomach”: Weil and hillesum on love and happiness amid the holocaust1.Timothy P. Jackson - 2012 - Journal of Religious Ethics 40 (1):72-98.
    I do four things in this essay: (1) briefly rehearse the biographies of Simone Weil and Etty Hillesum, (2) outline and compare some of the key themes in their lives and works, noting interesting (and also troubling) similarities between them, as well as salient differences, (3) use their examples as lenses through which to look at contemporary attitudes toward altruism vs. self-interest, freedom vs. necessity, eating vs. fasting, and acting vs. writing, and (4) highlight both their strengths and their weaknesses (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  7
    Inconsistencies.Marcus Steinweg - 2017 - Cambridge, MA: The MIT Press. Edited by Amanda DeMarco.
    Meditations, aphorisms, maxims, notes, and comments construct a philosophy of thought congruent with the inconsistency of our reality. Those who continue to think never return to their point of departure. —Inconsistencies These 130 short texts—aphoristic, interlacing, and sometimes perplexing—target a perennial philosophical problem: Our consciousness and our experience of reality are inconsistent, fragmentary, and unstable; God is dead, and our identity as subjects discordant. How can we establish a new mode of thought that does not cling to new gods or (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  38. Knowledge is Believing Something Because It's True.Tomas Bogardus & Will Perrin - 2022 - Episteme 19 (2):178-196.
    Modalists think that knowledge requires forming your belief in a “modally stable” way: using a method that wouldn't easily go wrong, or using a method that wouldn't have given you this belief had it been false. Recent Modalist projects from Justin Clarke-Doane and Dan Baras defend a principle they call “Modal Security,” roughly: if evidence undermines your belief, then it must give you a reason to doubt the safety or sensitivity of your belief. Another recent Modalist project from (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  39.  23
    Book Review: Aesthetics in Feminist Perspective. [REVIEW]Julie Van Camp - 1995 - Philosophy and Literature 19 (1):178-179.
    In lieu of an abstract, here is a brief excerpt of the content:Reviewed by:Aesthetics in Feminist PerspectiveJulie Van CampAesthetics in Feminist Perspective, edited by Hilde Hein and Carolyn Korsmeyer; xv & 252 pp. Bloomington: Indiana University Press, 1993, $39.95 cloth, $14.95 paper.Has feminism been hijacked by one lock-step agenda, suppressing all dialogue and debate? Far from it, judging from this collection of seventeen essays on feminist aesthetics. The first such collection in English, it includes eleven essays previously published in Hypatia (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  40.  13
    Investor-Paid Ratings and Conflicts of Interest.Leo Tang, Marietta Peytcheva & Pei Li - 2020 - Journal of Business Ethics 163 (2):365-378.
    The Securities and Exchange Commission (SEC) sanctioned investor-paid rating agency Egan-Jones for falsely stating that it did not know its clients’ investment positions. The SEC’s action against Egan-Jones raises the broad question whether knowledge of clients’ investment positions creates a conflict of interest for investor-paid ratings. In an experimental setting, we find that investor-paid rating agencies are likely to assign credit ratings that are biased in favor of their clients’ positions, and that this effect is attenuated when the rated company (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  52
    Perception in Kant's Model of Experience.Hemmo Laiho - 2012 - Dissertation, University of Turku
    In order to secure the limits of the critical use of reason, and to succeed in the critique of speculative metaphysics, Immanuel Kant (1724–1804) had to present a full account of human cognitive experience. Perception in Kant’s Model of Experience is a detailed investigation of this aspect of Kant’s grand enterprise with a special focus: perception. The overarching goal is to understand this common phenomenon both in itself and as the key to understanding Kant’s views of experience. In the process, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  42.  25
    Відправні концепти радянської урбанізації або protos pseudos соцміста.Oleh Turenko - 2016 - Схід 5 (145):108-113.
    The article reconstructs the false foundations of Soviet designs imaginable urbanization detects starting social places concepts of "classical" days of building socialism. Projected into the future the idea of permanent revolution, the destruction of "bourgeois barbarism" and desire the establishment of legal order Bolsheviks led the workers to the approval of a new type of state and the formation of a new anthropological type of person. This type - "eternal revolutionary", "architect of the new world" had to live with (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  62
    Moral Progress.Philip Kitcher, Jan-Christoph Heilinger, Rahel Jaeggi & Susan Neiman - 2021 - New York: Oxford University Press. Edited by Jan-Christoph Heilinger.
    "The overall aim of this book is to understand the character of moral progress, so that making moral progress may become more systematic and secure, less chancy and less bloody. Drawing on three historical examples - the abolition of chattel slavery, the expansion of opportunities for women, and the increasing acceptance of same-sex love - it asks how those changes were brought about, and seeks a methodology for streamlining the kinds of developments that occurred. Moral progress is conceived as pragmatic (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  44. Impossible Worlds and the Logic of Imagination.Francesco Berto - 2017 - Erkenntnis 82 (6):1277-1297.
    I want to model a finite, fallible cognitive agent who imagines that p in the sense of mentally representing a scenario—a configuration of objects and properties—correctly described by p. I propose to capture imagination, so understood, via variably strict world quantifiers, in a modal framework including both possible and so-called impossible worlds. The latter secure lack of classical logical closure for the relevant mental states, while the variability of strictness captures how the agent imports information from actuality in the imagined (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   50 citations  
  45. Perceptual plasticity and theoretical neutrality: A reply to Jerry Fodor.Paul M. Churchland - 1988 - Philosophy of Science 55 (June):167-87.
    The doctrine that the character of our perceptual knowledge is plastic, and can vary substantially with the theories embraced by the perceiver, has been criticized in a recent paper by Fodor. His arguments are based on certain experimental facts and theoretical approaches in cognitive psychology. My aim in this paper is threefold: to show that Fodor's views on the impenetrability of perceptual processing do not secure a theory-neutral foundation for knowledge; to show that his views on impenetrability are almost certainly (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   209 citations  
  46. Selfhood in Question: The Ontogenealogies of Bear Encounters.Anne Sauka - 2022 - Open Philosophy 5 (1):532-550.
    Recent years have witnessed an increase in bear sightings in Latvia, causing a change of tone in the country’s media outlets, regarding the return of “wild” animals. The unease around bear reappearance leads me to investigate the affective side of relations with beings that show strength and resilience in more-than-human encounters in human-inhabited spaces. These relations are characterized by the contrasting human feelings of alienation vis-à-vis their environments today and a false sense of security, resulting in disbelief to (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  47. On the immorality of threatening.Scott A. Anderson - 2011 - Ratio 24 (3):229-242.
    A plausible explanation of the wrongfulness of threatening, advanced most explicitly by Mitchell Berman, is that the wrongfulness of threatening derives from the wrongfulness of the act threatened. This essay argues that this explanation is inadequate. We can learn something important about the wrongfulness of threatening (with implications for thinking about coercion) by comparing credible threats to some other claims of impending harm. A credible bluff threat to do harm is likely to be more and differently wrongful than making intentionally (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  48.  7
    The Problem of Disinformation: A Critical Approach.Tim Hayward - forthcoming - Social Epistemology.
    The term disinformation is generally used to refer to information that is false and harmful, by contrast with misinformation (false but harmless) and malinformation (harmful but true); disinformation is also generally understood to involve coordination and to be intentionally false and/or harmful. However, particular studies rarely apply all these criteria when discussing cases. Doing so would involve applying at least three distinct problem framings: an epistemic framing to detect that a proposition in circulation is false, a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  30
    Fewer Mistakes and Presumed Consent.Alexander Zambrano - 2021 - Journal of Medicine and Philosophy 46 (1):58-79.
    “Opt-out” organ procurement policies based on presumed consent are typically advertised as being superior to “opt-in” policies based on explicit consent at securing organs for transplantation. However, Michael Gill has argued that presumed consent policies are also better than opt-in policies at respecting patient autonomy. According to Gill’s Fewer Mistakes Argument, we ought to implement the procurement policy that results in the fewest frustrated wishes regarding organ donation. Given that the majority of Americans wish to donate their organs, it is (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  50.  34
    Liberal aristocracy & the limits of democracy.Christopher Wareham - unknown
    I define and defend a non-democratic authority with the power to annul the decisions of democratic branches of government when such decisions infringe upon citizens’ basic rights and liberties. I refer to this non-democratic authority as Liberal Aristocracy. The argument for Liberal Aristocracy has two parts: the first part demonstrates that Liberal Aristocracy will arrive at decisions that further the moral end of sustaining citizens’ rights; the second part holds that Liberal Aristocracy is a moral means to this end. First, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000