Results for 'Alarm system'

991 found
Order:
  1.  19
    Monologues from "Four Intruders Plus Alarm Systems" and "Safe".Adrian Piper - 1995 - In Peg Zeglin Brand Weiser & Carolyn Korsmeyer (eds.), Feminism and Tradition in Aesthetics. Pennsylvania State University Press. pp. 235-244.
    Editor's note: Adrian Piper is a conceptual artist whose work from the past twenty-five years has included performances, graphic art, and installation pieces. Always provocative, Piper seeks to challenge viewers' assumptions about the nature of art, aesthetic response, and modes of evaluating by creating art that involves issues of gender and race. Piper uses political art to confront viewers with emotionally charged environments that preclude our maintaining a safe, aesthetically distanced stance toward the subject matter. being forced to confront our (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  2.  36
    The ALARM Theory of Consciousness: A Two-Level Theory of Phenomenal Consciousness.Albert Newen & Carlos Montemayor - 2023 - Journal of Consciousness Studies 30 (3):84-105.
    The scientific investigation of consciousness generates new findings at a rapid pace. We argue that we need a novel theoretical framework, which we call the ALARM theory of consciousness, in order to account for all central observations. According to this theory, we need to distinguish two levels of consciousness, namely basic arousal and general alertness. Basic arousal functions as a specific alarm system, keeping a biological organism alive under sudden intense threats, and general alertness enables flexible learning (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  3. ALEX: An Expert System for Alarms Processing.Diana L. Ryan, Kamal Jabbour & Charles H. M. Saylor - 1991 - Ai 1991 Frontiers in Innovative Computing for the Nuclear Industry Topical Meeting, Jackson Lake, Wy, Sept. 15-18, 1991 1.
  4.  8
    Giving A Hand To Pilots With Animated Alarms Based On Mirror System Functioning.Emilie Jahanpour, Eve Fabre, Frederic Dehais & Mickael Causse - 2018 - Frontiers in Human Neuroscience 12.
  5.  39
    Damasio, Descartes, alarms and meta-management.A. Sloman - unknown
    This paper discusses some of the requirements for the control architecture of an intelligent human-like agent with multiple independent dynamically changing motives in a dynamically changing only partly predictable world. The architecture proposed includes a combination of reactive, deliberative and meta-management mechanisms along with one or more global ``alarm'' systems. The engineering design requirements are discussed in relation our evolutionary history, evidence of brain function and recent theories of Damasio and others about the relationships between intelligence and emotions. (The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  6. No Need for Alarm: A Critical Analysis of Greene’s Dual-Process Theory of Moral Decision-Making.Robyn Bluhm - 2014 - Neuroethics 7 (3):299-316.
    Joshua Greene and his colleagues have proposed a dual-process theory of moral decision-making to account for the effects of emotional responses on our judgments about moral dilemmas that ask us to contemplate causing direct personal harm. Early formulations of the theory contrast emotional and cognitive decision-making, saying that each is the product of a separable neural system. Later formulations emphasize that emotions are also involved in cognitive processing. I argue that, given the acknowledgement that emotions inform cognitive decision-making, a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  7.  8
    Simultaneous Process Mining of Process Events and Operator Actions for Alarm Management.László Bántay, Gyula Dörgö, Ferenc Tandari & János Abonyi - 2022 - Complexity 2022:1-13.
    Alarm management is an important task to ensure the safety of industrial process technologies. A well-designed alarm system can reduce the workload of operators parallel with the support of the production, which is in line with the approach of Industry 5.0. Using Process Mining tools to explore the operator-related event scenarios requires a goal-oriented log file format that contains the start and the end of the alarms along with the triggered operator actions. The key contribution of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  9
    Data Stream Quality Evaluation for the Generation of Alarms in the Health Domain.Adriana Marotta, Joaquín Fleitas & Saúl Fagúndez - 2015 - Journal of Intelligent Systems 24 (3):361-369.
    The use of sensors has had an enormous increment in the last years, becoming a valuable tool in many different areas. In this kind of scenario, the quality of data becomes an extremely important issue; however, not much attention has been paid to this specific topic, with only a few existing works that focus on it. In this paper, we present a proposal for managing data streams from sensors that are installed in patients’ homes in order to monitor their health. (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  41
    The defense motivation system: A theory of avoidance behavior.Fred A. Masterson & Mary Crawford - 1982 - Behavioral and Brain Sciences 5 (4):661-675.
    A motivational system approach to avoidance behavior is presented. According to this approach, a motivational state increases the probability of relevant response patterns and establishes the appropriate or “ideal” consummatory stimuli as positive reinforcers. In the case of feeding motivation, for example, hungry rats are likely to explore and gnaw, and to learn to persist in activities correlated with the reception of consummatory stimuli produced by ingestion of palatable substances. In the case of defense motivation, fearful rats are likely (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   43 citations  
  10.  78
    Evolution of signaling systems with multiple senders and receivers.Brian Skyrms - manuscript
    To coordinate action, information must be transmitted, processed, and utilized to make decisions. Transmission of information requires the existence of a signaling system in which the signals that are exchanged are coordinated with the appropriate content. Signaling systems in nature range from quorum signaling in bacteria [Schauder and Bassler, Kaiser ], through the dance of the bees [Dyer and Seeley ], birdcalls [Hailman, Ficken, and Ficken, Gyger, Marler and Pickert, Evans, Evans, and Marler, Charrier and Sturdy ], and (...) calls in many species [Seyfarth and Cheney, Green and Maegner,Manser, Seyfarth and Cheney ], up to human language. Information processing includes filtering – that is discarding irrelevant information and passing along what is important – and integration of multiple pieces of information. Integration includes logical inference and voting. Finally, the information must be used to make decisions with consequences for payoffs that drive evolution or learning. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  11. RTD 1 Temperature Transmitter.Alarm Unit - 1991 - Ai 1991 Frontiers in Innovative Computing for the Nuclear Industry Topical Meeting, Jackson Lake, Wy, Sept. 15-18, 1991 1.
  12.  9
    Political and legal transformations in the context of the development of technologies and intelligent systems: transhumanistic perspectives.Irina Baturina - 2023 - Sotsium I Vlast 1 (95):51-60.
    Introduction. Innovationism in various areas of society has changed both the natural and social environment. The change speed in the new infor- mation and communication field is the reason for many questions related to studying the problems of society and the machine, finding out the place of artificial intelligence in social relations. These pro- cesses stimulated the philosophical research, the subject of which was man, modern technologies, scenarios for the development of society, socio- cultural and political-legal forms of its organization. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  9
    Improving the efficiency of intrusion detection in information systems.Bouderah Brahim, Nacer Eddine Yousfi, Bourenane Malika & Lounis Ouarda - 2022 - Journal of Intelligent Systems 31 (1):835-854.
    Policy Interaction Graph Analysis is a Host-based Intrusion Detection tool that uses Linux MAC Mandatory access control policy to build the licit information flow graph and uses a detection policy defined by the administrator to extract illicit behaviour from the graph. The main limitation of this tool is the generation of a huge signature base of illicit behaviours; hence, this leads to the use of huge memory space to store it. Our primary goal in this article is to reduce this (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  31
    A framework for a regional integrated food security early warning system: a case study of the Dongting Lake area in China.Xiaoxing Qi, Laiyuan Zhong & Liming Liu - 2015 - Agriculture and Human Values 32 (2):315-329.
    Understanding the regional food security situation is of great importance to maintaining China’s food security. To provide targeted information to help regional policymakers monitor food security status, based on the differentiated foci during the phased development of food security, this paper was conceived from the perspective of the need for early warnings and proposes a framework for regional integrated food security that incorporates food quantity security, food quality security, and sustainable food security. In this framework, an indicator system is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  7
    Implementation of network information security monitoring system based on adaptive deep detection.Lavish Kansal, Abdullah M. Baqasah, Roobaea Alroobaea & Jing Niu - 2022 - Journal of Intelligent Systems 31 (1):454-465.
    For a better detection in Network information security monitoring system, the author proposes a method based on adaptive depth detection. A deep belief network was designed and implemented, and the intrusion detection system model was combined with a support vector machine. The data set adopts the NSL-KDD network communication data set, and this data set is authoritative in the security field. Redundant cleaning, data type conversion, normalization, and other processing operations are performed on the data set. Using the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  16.  14
    Research Misconduct Investigations in China’s Science Funding System.Li Tang, Linan Wang & Guangyuan Hu - 2023 - Science and Engineering Ethics 29 (6):1-17.
    As stewards of public money, government funding agencies have the obligation and responsibility to uphold the integrity of funded research. Despite an increasing amount of empirical studies examining research-related misconduct, a majority of these studies focus on retracted publications. How agencies spot funding-relevant wrongdoing and what sanctions the offenders face remain largely unexplored. This is particularly true for public funding agencies in emerging science powers. To amend this oversight, we retrieved and analyzed all publicized investigation results from China’s largest basic (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17.  5
    George Khushf.Christianity as an Alternative Healing System - 1997 - Bioethics Yearbook: Volume 5-Theological Developments in Bioethics: 1992-1994 5:123.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  18. Paulina Taboada.The General Systems Theory: An Adequate - 2002 - In Paulina Taboada, Kateryna Fedoryka Cuddeback & Patricia Donohue-White (eds.), Person, Society, and Value: Towards a Personalist Concept of Health. Kluwer Academic.
  19. Population, Des maladies dites «de civilisation», etc. Ne pourront PAS.Tendances Êvolutives des Systèmes Éducatifs - 1975 - Paideia 4:31.
     
    Export citation  
     
    Bookmark  
  20. Mitchell Berman, University of Pennsylvania.Of law & Other Artificial Normative Systems - 2019 - In Toh Kevin, Plunkett David & Shapiro Scott (eds.), Dimensions of Normativity: New Essays on Metaethics and Jurisprudence. New York: Oxford University Press.
     
    Export citation  
     
    Bookmark  
  21.  7
    Systeme im Denken der Gegenwart.Hans-Dieter Klein & Internationale Gesellschaft "System der Philosophie" (eds.) - 1993 - Bonn: Bouvier.
    Direct download  
     
    Export citation  
     
    Bookmark  
  22. par Claudine Haroche et Ana Montoia Lorsque nous avons été une fois placés à un rang, nous ne devons rien faire, ni souffrir qui fasse voir que nous nous tenons inférieurs à ce rang même.Pour Une Anthropologie Politique, Et Systèmes Politiques, Chez Norbert Elias & Etleduc de Saint-Simon - 1995 - Cahiers Internationaux de Sociologie 99 (99-100):247-263.
    No categories
     
    Export citation  
     
    Bookmark  
  23. M. bibliographie sélective.Soziale Syslemen, Legitimation Durch Verfahren, Soziologische Aufklârung, Aufsâlze Zur Theorie Sozialer Systeme & Illuminismo Sociologico - 1990 - Cahiers Internationaux de Sociologie 89:397.
  24. Translation studies: Planning for research libraries.Ont-Elles Une Longueur Les Langues, Et du Français, du Français Et Les Systemes Phonetiques, D'expression de La du Chinoisles Procedes, Politesse Dans le Finnois Courant, le Rythme-Rythmisation Ou la Dialectique, Temps En Musique des Deux, Piege du Sens L'ecriture & Comptes Rendus - 1991 - Contrastes: Revue de l'Association Pour le Developpement des Études Contrastives 20:7.
    No categories
     
    Export citation  
     
    Bookmark  
  25.  11
    Promoting Socially Responsible Business, Ethical Trade and Acceptable Labour Standards.David Lewis, Great Britain & Social Development Systems for Coordinated Poverty Eradication - 2000
    Direct download  
     
    Export citation  
     
    Bookmark  
  26. Artistic Exceptionalism and the Risks of Activist Art.Christopher Earley - 2023 - Journal of Aesthetics and Art Criticism 81 (2):141-152.
    Activist artists often face a difficult question: is striving to change the world undermined when pursued through difficult and experimental artistic means? Looking closely at Adrian Piper's 'Four Intruders plus Alarm Systems' (1980), I will consider why this is an important concern for activist art, and assess three different responses in relation to Piper’s work. What I call the conciliatory stance recommends that when activist artists encounter misunderstanding, they should downplay their experimental artistry in favor of fitting their work (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  35
    Subconscious detection of threat as reflected by an enhanced response bias.Sabine Windmann & Thomas Krüger - 1998 - Consciousness and Cognition 7 (4):603-633.
    Neurobiological and cognitive models of unconscious information processing suggest that subconscious threat detection can lead to cognitive misinterpretations and false alarms, while conscious processing is assumed to be perceptually and conceptually accurate and unambiguous. Furthermore, clinical theories suggest that pathological anxiety results from a crude preattentive warning system predominating over more sophisticated and controlled modes of processing. We investigated the hypothesis that subconscious detection of threat in a cognitive task is reflected by enhanced ''false signal'' detection rather than by (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  28.  40
    Clinical Anecdotes: A Painful Lack of Wounds.Christopher Bailey - 2009 - Philosophy, Psychiatry, and Psychology 16 (3):223-224.
    In lieu of an abstract, here is a brief excerpt of the content:Clinical Anecdotes: A Painful Lack of WoundsChristopher Bailey (bio)Keywordsdepression, post-traumatic stress disorder (PTSD), evolution, fight-or-flight, veteran (treatment of)Colin came to me complaining of depression, which started after he got back from Iraq in 2005. Although he had served in the National Guard, he volunteered absolutely nothing about his time in Iraq as we spoke, instead focusing on other factors, like problems at his job and a family history of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  29. The evolution of what?Aaron Sloman - 1998
    There is now a huge amount of interest in consciousness among scientists as well as philosophers, yet there is so much confusion and ambiguity in the claims and counter-claims that it is hard to tell whether any progress is being made. This ``position paper'' suggests that we can make progress by temporarily putting to one side questions about what consciousness is or which animals or machines have it or how it evolved. Instead we should focus on questions about the sorts (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  30.  10
    Crunch Time: The Urgency to Take the Temporal Dimension of Sustainability Seriously.Coline Ruwet - 2023 - Environmental Values 32 (1):25-43.
    This paper argues that, to tackle the issue of sustainability, we should pay more attention to the temporality of socioecological processes. Only thus can we better understand current subjective and institutional constraints, as well as envision new potential pathways for transformative change. Two main arguments are developed: (1) there is a uniqueness in the temporality of Earth system processes associated with planetary boundaries that deeply transforms our time horizon and the pace of change, and (2) this situation creates a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  35
    Spontaneous coordination and evolutionary learning processes in an agent-based model.Pierre Barbaroux & Gilles Enée - 2005 - Mind and Society 4 (2):179-195.
    This paper is concerned with adaptive learning and coordination processes. Implementing agent-based modeling techniques (Learning Classifier Systems, LCS), we focus on the twofold impact of cognitive and environmental complexity on learning and coordination. Within this framework, we introduce the notion of Adaptive Learning Agent with Rule-based Memory (ALARM), which is a particular class of Artificial Adaptive Agent (AAA, Holland and Miller 1991). We show that equilibrium is approached to a high degree, but never perfectly reached. We also demonstrate that (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  32.  12
    Carte blanche: the erosion of medical consent.Harriet A. Washington - 2021 - New York, NY: Columbia Global Reports.
    Carte Blanche is the alarming tale of how the right of Americans to say "no" to risky medical research is eroding at a time when we are racing to produce a vaccine and treatments for Covid-19. This medical right that we have long taken for granted was first sacrificed on the altar of military expediency in 1990 when the Department of Defense asked for and received from the FDA a waiver that permitted it to force an experimental anthrax vaccine on (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  33. Communication before communicative intentions.Josh Armstrong - 2021 - Noûs 57 (1):26-50.
    This paper explores the significance of intelligent social behavior among non-human animals for philosophical theories of communication. Using the alarm call system of vervet monkeys as a case study, I argue that interpersonal communication (or what I call “minded communication”) can and does take place in the absence of the production and recognition of communicative intentions. More generally, I argue that evolutionary theory provides good reasons for maintaining that minded communication is both temporally and explanatorily prior to the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  34.  23
    The “black box” at work.Ifeoma Ajunwa - 2020 - Big Data and Society 7 (2).
    An oversized reliance on big data-driven algorithmic decision-making systems, coupled with a lack of critical inquiry regarding such systems, combine to create the paradoxical “black box” at work. The “black box” simultaneously demands a higher level of transparency from the worker in regard to data collection, while shrouding the decision-making in secrecy, making employer decisions even more opaque to the worker. To access employment, the worker is commanded to divulge highly personal information, and when hired, must submit further still to (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  35.  49
    Choice is not the issue. The misrepresentation of healthcare in bioethical discourse.Kari Milch Agledahl, Reidun Førde & Åge Wifstad - 2011 - Journal of Medical Ethics 37 (4):212-215.
    Next SectionThe principle of respect for autonomy has shaped much of the bioethics' discourse over the last 50 years, and is now most commonly used in the meaning of respecting autonomous choice. This is probably related to the influential concept of informed consent, which originated in research ethics and was soon also applied to the field of clinical medicine. But while available choices in medical research are well defined, this is rarely the case in healthcare. Consideration of ordinary medical practice (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  36.  68
    Better Scared than Sorry: The Pragmatic Account of Emotional Representation.Kris Goffin - 2023 - Erkenntnis 88 (6):2633-2650.
    Some emotional representations seem to be unreliable. For instance, we are often afraid when there is no danger present. If emotions such as fear are so unreliable, what function do they have in our representational system? This is a problem for representationalist theories of emotion. I will argue that seemingly unreliable emotional representations are reliable after all. While many mental states strike an optimal balance between minimizing inaccurate representations and maximizing accurate representations, some emotional representations only aim at maximizing (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  25
    Climate tipping points and expert judgment.Vincent Lam & Mason Majszak - 2022 - WIREs Climate Change 13 (6).
    Expert judgment can be seen throughout climate science and even more prominently when discussing climate tipping points. To provide an accurate characterization of expert judgment we begin by evaluating the existing literature on expertise as it relates to climate science as a whole, before then focusing the literature review on the role of expert judgment in the unique context of climate tipping points. From this we turn our attention to the structured expert elicitation protocols specifically developed for producing expert judgments (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  38.  35
    Dissociative effects of alcohol on recollective experience.H. Valerie Curran & Michael Hildebrandt - 1999 - Consciousness and Cognition 8 (4):497-509.
    This article reports a study comparing the effects of a single dose of alcohol with a matched placebo drink on recognition memory with and without conscious recollection. A double-blind, cross-over design was used with healthy volunteers who were all social drinkers. Processing depth at study was manipulated using generate versus read instructions. Conscious recollection at test was assessed using the remember-know-guess paradigm (Gardiner, 1988; Tulving, 1985). Alcohol significantly reduced conscious recollection (remember responses) but had no effect on recognition in the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39.  24
    Automatic Analysis of EEGs Using Big Data and Hybrid Deep Learning Architectures.Meysam Golmohammadi, Amir Hossein Harati Nejad Torbati, Silvia Lopez de Diego, Iyad Obeid & Joseph Picone - 2019 - Frontiers in Human Neuroscience 13:390744.
    Brain monitoring combined with automatic analysis of EEGs provides a clinical decision support tool that can reduce time to diagnosis and assist clinicians in real-time monitoring applications (e.g., neurological intensive care units). Clinicians have indicated that a sensitivity of 95% with specificity below 5% was the minimum requirement for clinical acceptance. In this study, a high-performance automated EEG analysis system based on principles of machine learning and big data is proposed. This hybrid architecture integrates hidden Markov models (HMMs) for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40. Investigating Cognitive Load in Energy Network Control Rooms: Recommendations for Future Designs.Umair Afzal, Arnaud Prouzeau, Lee Lawrence, Tim Dwyer, Saikiranrao Bichinepally, Ariel Liebman & Sarah Goodwin - 2022 - Frontiers in Psychology 13.
    This study analyzed and explored the cognitive load of Australian energy market operators managing one of the longest inter-connected electrical networks in the world. Each operator uses a workstation with seven screens in an active control room environment, with a large coordination screen to show information and enable collaboration between different control centers. Cognitive load was assessed during both training scenarios and regular control room operations via the integration of subjective and physiological measures. Eye-tracking glasses were also used to analyze (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  24
    Disrupting the School-to-Prison Pipeline.Sofía Bahena, North Cooc, Rachel Currie-Rubin, Paul Kuttner & Monica Ng (eds.) - 2012 - Harvard Educational Review.
    A trenchant and wide-ranging look at this alarming national trend, _Disrupting the School-to-Prison Pipeline_ is unsparing in its account of the problem while pointing in the direction of meaningful and much-needed reforms. The “school-to-prison pipeline” has received much attention in the education world over the past few years. A fast-growing and disturbing development, it describes a range of circumstances whereby “children are funneled out of public schools and into the juvenile and criminal justice systems.” Scholars, educators, parents, students, and organizers (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  42.  71
    Blind-sided by privacy? Digital contact tracing, the Apple/Google API and big tech’s newfound role as global health policy makers.Tamar Sharon - 2020 - Ethics and Information Technology 23 (S1):45-57.
    Since the outbreak of COVID-19, governments have turned their attention to digital contact tracing. In many countries, public debate has focused on the risks this technology poses to privacy, with advocates and experts sounding alarm bells about surveillance and mission creep reminiscent of the post 9/11 era. Yet, when Apple and Google launched their contact tracing API in April 2020, some of the world’s leading privacy experts applauded this initiative for its privacy-preserving technical specifications. In an interesting twist, the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  43.  20
    Good Proctor or “Big Brother”? Ethics of Online Exam Supervision Technologies.Simon Coghlan, Tim Miller & Jeannie Paterson - 2021 - Philosophy and Technology 34 (4):1581-1606.
    Online exam supervision technologies have recently generated significant controversy and concern. Their use is now booming due to growing demand for online courses and for off-campus assessment options amid COVID-19 lockdowns. Online proctoring technologies purport to effectively oversee students sitting online exams by using artificial intelligence systems supplemented by human invigilators. Such technologies have alarmed some students who see them as a “Big Brother-like” threat to liberty and privacy, and as potentially unfair and discriminatory. However, some universities and educators defend (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  44.  23
    Beyond All Reason: The Radical Assault on Truth in American Law.Daniel A. Farber & Suzanna Sherry - 1997 - New York: Oxford University Press USA. Edited by Suzanna Sherry.
    Would you want to be operated on by a surgeon trained at a medical school that did not evaluate its students? Would you want to fly in a plane designed by people convinced that the laws of physics are socially constructed? Would you want to be tried by a legal system indifferent to the distinction between fact and fiction? These questions may seem absurd, but these are theories being seriously advanced by radical multiculturalists that force us to ask them. (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  45.  27
    Moral Modification and the Social Environment.Jillian Craigie - 2014 - Philosophy, Psychiatry, and Psychology 21 (2):127-129.
    In light of the recent focus in bioethics on questions of deliberate moral enhancement through the use of psychoactive drugs, Levy et al. (2014) argue that the more pressing issue may be the incidental effect that prescription drugs could already be having on moral agency. Although concerns have focused on the possibility of altering moral psychology through direct effects on brain function, the authors point out that this may already be a reality, albeit an unintentional one. They conclude from their (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  15
    Ethical Issues in Cerebral Organoid Research.Gardar Arnason, Anja Pichl & Robert Ranisch - 2023 - Cambridge Quarterly of Healthcare Ethics 32 (4):515-517.
    About ten years ago, reports of lab-grown “mini brains” or “brains in a dish” appeared in the media, falling somewhere between the curious and the alarming. The trigger of these reports was a new method to grow three-dimensional neural tissue from human stem cells that recapitulates, to some degree, the early development of brain tissue. Despite their relatively small size and other limitations, such model systems capture in part the structure and functions of regions of the human brain and can (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  10
    Intention, Authority, and Meaning.Gerald L. Bruns - 1980 - Critical Inquiry 7 (2):297-309.
    [Herbert F.] Tucker has shown us in a very practical way that the concept of meaning is the problem of problems, not only in hermeneutics but in literary theory and, indeed, literary study generally. It may well be that in literary study there can be no talk of meaning that is not ambiguous, that does not require us to speak in figures or by means of metaphorical improvisations. It would not necessarily follow that our talk of meaning is merely provisional (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  48.  9
    O liberalismo como base para um sistema político, social e econômico na pós-história de Hegel e Fukuyama: um contraponto à luz de Hans Jonas.Everaldo Cescon & Fábio André Frizzo - 2021 - Griot : Revista de Filosofia 21 (1):221-236.
    The purpose of this article is to reinforce the alert that the German philosopher Hans Jonas makes in his work Principle responsibility for the imminent possibility of a tragic end of history for humanity if the unpredictable effects arising from the form of action of the liberal political-economic system and the inconsequential advance of the technology that follows are considered. In this intention, we chose as a strategy, to weaken and oppose the Hegelian idea, opposed to Jonah's view, that (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  49.  17
    A crisis that changed the banking scenario in India: exploring the role of ethics in business.Sushma Nayak & Jyoti Chandiramani - 2022 - Asian Journal of Business Ethics 11 (1):7-32.
    Digital business has marked an era of transformation, but also an unprecedented growth of cyber threats. While digital explosion witnessed by the banking sector since the COVID-19 pandemic has been significant, the level and frequency of cybercrimes have gone up as well. Cybercrime officials attribute it to remote working—people using home computers or laptops with vulnerable online security than office systems; malicious actors relentlessly developing their tactics to find new ways to break into enterprise networks and grasping defence evasion; persons (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  17
    Shifty Speech and Independent Thought: Epistemic Normativity in Context.Dorit Ganson - 2023 - Philosophical Review 132 (3):504-507.
    Crafted within a knowledge-first epistemological framework, Mona Simion’s engaging and wide-ranging work ensures that both the Knowledge Norm of Assertion (KNA) and Classical Invariantism (CI) can be part of a viable and productive research program.Dissatisfied with current strategies on offer in the literature, she successfully counters objections to the pair sourced in “shiftiness intuitions”—intuitions that seem to indicate that mere changes in practical context can impact the propriety of assertions and knowledge attributions. For example, in Keith DeRose’s famous pair of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 991