Results for 'Ezra Susser'

394 found
Order:
  1.  51
    Exploring researchers’ experiences of working with a researcher-driven, population-specific community advisory board in a South African schizophrenia genomics study.Megan M. Campbell, Ezra Susser, Jantina de Vries, Adam Baldinger, Goodman Sibeko, Michael M. Mndini, Sibonile G. Mqulwana, Odwa A. Ntola, Raj S. Ramesar & Dan J. Stein - 2015 - BMC Medical Ethics 16 (1):1-9.
    BackgroundCommunity engagement within biomedical research is broadly defined as a collaborative relationship between a research team and a group of individuals targeted for research. A Community Advisory Board is one mechanism of engaging the community. Within genomics research CABs may be particularly relevant due to the potential implications of research findings drawn from individual participants on the larger communities they represent. Within such research, CABs seek to meet instrumental goals such as protecting research participants and their community from research-related risks, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  2.  54
    Predictors of consent to cell line creation and immortalisation in a South African schizophrenia genomics study.Megan M. Campbell, Jantina de Vries, Sibonile G. Mqulwana, Michael M. Mndini, Odwa A. Ntola, Deborah Jonker, Megan Malan, Adele Pretorius, Zukiswa Zingela, Stephanus Van Wyk, Dan J. Stein & Ezra Susser - 2018 - BMC Medical Ethics 19 (1):72.
    Cell line immortalisation is a growing component of African genomics research and biobanking. However, little is known about the factors influencing consent to cell line creation and immortalisation in African research settings. We contribute to addressing this gap by exploring three questions in a sample of Xhosa participants recruited for a South African psychiatric genomics study: First, what proportion of participants consented to cell line storage? Second, what were predictors of this consent? Third, what questions were raised by participants during (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  16
    Brain Data in Context: Are New Rights the Way to Mental and Brain Privacy?Daniel Susser & Laura Y. Cabrera - 2024 - American Journal of Bioethics Neuroscience 15 (2):122-133.
    The potential to collect brain data more directly, with higher resolution, and in greater amounts has heightened worries about mental and brain privacy. In order to manage the risks to individuals posed by these privacy challenges, some have suggested codifying new privacy rights, including a right to “mental privacy.” In this paper, we consider these arguments and conclude that while neurotechnologies do raise significant privacy concerns, such concerns are—at least for now—no different from those raised by other well-understood data collection (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  4. Split intensionality: a new scope theory of de re and de dicto.Ezra Keshet - 2010 - Linguistics and Philosophy 33 (4):251-283.
    The traditional scope theory of intensionality (STI) (see Russell 1905; Montague 1973; Ladusaw 1977; Ogihara 1992, 1996; Stowell 1993) is simple, elegant, and, for the most part, empirically adequate. However, a few quite troubling counterexamples to this theory have lead researchers to propose alternatives, such as positing null situation pronouns (Percus 2000) or actuality operators (Kamp 1971; Cresswell 1990) in the syntax of natural language. These innovative theories do correct the undergeneration of the original scope theory, but at a cost: (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  5.  7
    The uncaused being and the criterion of truth.Ezra Z. Derr - 1911 - Boston: Sherman, French & company.
    This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work. This work is in the public domain (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  5
    Li-ḥeyot be-khavod: reshimot be-etiḳah yiśumit = Human dignity: commentaries in applied ethics.Ovadia Ezra - 2018 - Yerushalayim: Karmel.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  8
    The cinema of things: globalization and the posthuman object.Elizabeth Ezra - 2017 - New York: Bloomsbury Academic.
    Introduction: cinema, globalization and the posthuman object -- Consuming objects -- Exotic objects -- Part objects: war, disavowal, and the logic of substitution -- Objects of desire -- Posthuman objects.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Brain Data in Context: Are New Rights the Way to Mental and Brain Privacy?Daniel Susser & Laura Y. Cabrera - 2023 - American Journal of Bioethics Neuroscience:1-12.
    The potential to collect brain data more directly, with higher resolution, and in greater amounts has heightened worries about mental and brain privacy. In order to manage the risks to individuals posed by these privacy challenges, some have suggested codifying new privacy rights, including a right to “mental privacy.” In this paper, we consider these arguments and conclude that while neurotechnologies do raise significant privacy concerns, such concerns are—at least for now—no different from those raised by other well-understood data collection (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  9. Online Manipulation: Hidden Influences in a Digital World.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Georgetown Law Technology Review 4:1-45.
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of manipulation that (...)
    Direct download  
     
    Export citation  
     
    Bookmark   28 citations  
  10. Situation economy.Ezra Keshet - 2010 - Natural Language Semantics 18 (4):385-434.
    Researchers often assume that possible worlds and times are represented in the syntax of natural languages. However, it has been noted that such a system can overgenerate. This paper proposes a constraint on systems where worlds and times are represented as situation pronouns. The Intersective Predicate Generalization, based on and extending work by R. Musan, states that two items composed via Predicate Modification, such as a noun and an intersective modifier, must be evaluated in the same world and time. To (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  11. Technology, autonomy, and manipulation.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Internet Policy Review 8 (2).
    Since 2016, when the Facebook/Cambridge Analytica scandal began to emerge, public concern has grown around the threat of “online manipulation”. While these worries are familiar to privacy researchers, this paper aims to make them more salient to policymakers — first, by defining “online manipulation”, thus enabling identification of manipulative practices; and second, by drawing attention to the specific harms online manipulation threatens. We argue that online manipulation is the use of information technology to covertly influence another person’s decision-making, by targeting (...)
    Direct download  
     
    Export citation  
     
    Bookmark   31 citations  
  12. Breaking Through.Ezra Bayda - 2013 - In Melvin McLeod (ed.), The best Buddhist writing 2013. Boston: Shambhala.
     
    Export citation  
     
    Bookmark  
  13. Sefer ha-ʻatsamim.Ibn Ezra & Abraham ben Meïr - 1901 - [London,: Edited by Isaac Abravanel.
     
    Export citation  
     
    Bookmark  
  14.  36
    Cohesive proportionality.Ezra Rubenstein - 2024 - Philosophical Studies 181 (1):179-203.
    Proportionality—the idea that causes are neither too general nor too specific for their effects—seems to recommend implausibly disjunctive causes (McGrath, 1998 ; Shapiro & Sober, 2012 ; Franklin-Hall, 2016 ). I argue that this problem should be avoided by appeal to the notion of cohesion. I propose an account of cohesion in terms of the similarity structure of property-spaces, argue that it is not objectionably mysterious, and that alternative approaches—based on naturalness, interventionism, and contrastivism—are inadequate without appeal to it. In (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  15. Chapter four Ibn Ezra, a maimonidean authority: The evidence of the early Ibn Ezra supercommentaries Tamas visi.Ibn Ezra - 2009 - In James T. Robinson (ed.), The cultures of Maimonideanism: new approaches to the history of Jewish thought. Boston: Brill. pp. 9--89.
     
    Export citation  
     
    Bookmark  
  16. Predictive Policing and the Ethics of Preemption.Daniel Susser - 2021 - In Ben Jones & Eduardo Mendieta (eds.), The Ethics of Policing: New Perspectives on Law Enforcement. New York: NYU Press.
    The American justice system, from police departments to the courts, is increasingly turning to information technology for help identifying potential offenders, determining where, geographically, to allocate enforcement resources, assessing flight risk and the potential for recidivism amongst arrestees, and making other judgments about when, where, and how to manage crime. In particular, there is a focus on machine learning and other data analytics tools, which promise to accurately predict where crime will occur and who will perpetrate it. Activists and academics (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  17.  18
    Proportionality in Causation, Part II: Applications and Challenges.Ezra Rubenstein - 2024 - Philosophy Compass 19 (1):e12960.
    In ‘Proportionality in Causation, Part I: Theories’, I presented various ways of understanding the idea that causes which are ‘proportional’ to their effects are in some sense preferable. In this companion article, I discuss the principal applications of the resulting theories of proportionality, and the challenges they face.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  18.  91
    Grounding identity in existence.Ezra Rubenstein - 2024 - Philosophy and Phenomenological Research 108 (1):21-41.
    What grounds the facts about what is identical to/distinct from what? A natural answer is: the facts about what exists. Despite its prima facie appeal, this view has received surprisingly little attention in the literature. Moreover, those who have discussed it have been inclined to reject it because of the following important challenge: why should the existence of some individuals ground their identity in some cases and their distinctness in others? (Burgess 2012, Shumener 2020b). This paper offers a sustained defense (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  19. Pisul--alumot tahalikhim.Ezra Orion - 1995 - [Israel]: Modan be-shituf Midreshet Śedeh Boḳer.
  20. Invisible Influence: Artificial Intelligence and the Ethics of Adaptive Choice Architectures.Daniel Susser - 2019 - Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society 1.
    For several years, scholars have (for good reason) been largely preoccupied with worries about the use of artificial intelligence and machine learning (AI/ML) tools to make decisions about us. Only recently has significant attention turned to a potentially more alarming problem: the use of AI/ML to influence our decision-making. The contexts in which we make decisions—what behavioral economists call our choice architectures—are increasingly technologically-laden. Which is to say: algorithms increasingly determine, in a wide variety of contexts, both the sets of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  21.  18
    Proportionality in Causation, Part I: Theories.Ezra Rubenstein - 2024 - Philosophy Compass 19 (1):e12957.
    A much-discussed idea in the causation literature is that it is preferable to invoke causes which are proportional to—neither too general nor too specific for—the effect. This article presents various ways of understanding this idea. In what sense are such causal claims ‘preferable’? And what is it for one event to be ‘proportional’ to another? In a companion article, ‘Proportionality in Causation, Part II: Applications and Challenges’, I discuss the principal applications of the resulting theories of proportionality, and the challenges (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  5
    Yesod mora ve-sod Torah: mahadurah madaʻit mevoʼeret.Ibn Ezra & Abraham ben Meïr - 2018 - Ramat Gan: Hotsaʼat Universiṭat Bar-Ilan. Edited by Yosef Kohen & Uriel Simon.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  6
    Habits and holiness: ethics, theology, and biopsychology.Ezra Sullivan - 2021 - Washington, D.C.: The Catholic University of America Press. Edited by Wojciech Giertych.
    This comprehensive exploration of Thomas Aquinas's theology of habit takes habits in general as a prism for understanding human action and its influences and provides a unique synthesis of Thomistic virtue theory, modern science of habits, and best practices for eliminating bad habits and living good habits.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  15
    Letter to Mrs. Wilbur, June 26, 1997.Ezra F. Vogel - 1999 - Chinese Studies in History 33 (1):85-85.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is not the only (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  26. Notice After Notice-and-Consent: Why Privacy Disclosures Are Valuable Even If Consent Frameworks Aren’t.Daniel Susser - 2019 - Journal of Information Policy 9:37-62.
    The dominant legal and regulatory approach to protecting information privacy is a form of mandated disclosure commonly known as “notice-and-consent.” Many have criticized this approach, arguing that privacy decisions are too complicated, and privacy disclosures too convoluted, for individuals to make meaningful consent decisions about privacy choices—decisions that often require us to waive important rights. While I agree with these criticisms, I argue that they only meaningfully call into question the “consent” part of notice-and-consent, and that they say little about (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  27.  10
    Congee for the Soul.Ezra Gabbay, Joseph J. Fins, John Banja & Taylor Evans - 2021 - Hastings Center Report 51 (1):10-12.
    Provision of adequate nutrition to elderly patients who develop dysphagia after a stroke can be quite challenging, often leading to the placement of a percutaneous entero‐gastrostomy (PEG) tube for nutritional support. This hypothetical case describes the additional challenge of cross‐cultural belief that leads a daughter to provide oral feeding to her mother, an act that the medical team believes is dangerous and the daughter sees as salubrious. In this case, what is the proper balance between patient safety and deference to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  43
    Religion that strengthens democracy: An analysis of religious political strategies in Israel.Ezra Kopelowitz & Matthew Diamond - 1998 - Theory and Society 27 (5):671-708.
  29. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  90
    Grounded Shadows, Groundless Ghosts.Ezra Rubenstein - 2022 - British Journal for the Philosophy of Science 73 (3):723-750.
    According to a radical account of quantum metaphysics that I label ‘high-dimensionalism’, ordinary objects are the ‘shadows’ of high-dimensional fundamental ontology. Critics—especially Maudlin —allege that high-dimensionalism cannot provide a satisfactory explanation of the manifest image. In this paper, I examine the two main ideas behind these criticisms: that high-dimensionalist connections between fundamental and non-fundamental are 1) inscrutable, and 2) arbitrary. In response to the first, I argue that there is no metaphysically significant contrast regarding the scrutability of low- and high-dimensionalist (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  29
    Vaccine Passports and Political Legitimacy: A Public Reason Framework for Policymakers.Anne Barnhill, Matteo Bonotti & Daniel Susser - 2023 - Ethical Theory and Moral Practice 26 (5):667-687.
    As the COVID-19 pandemic continues to evolve, taking its toll on people’s lives around the world, vaccine passports remain a contentious topic of debate in most liberal democracies. While a small literature on vaccine passports has sprung up over the past few years that considers their ethical pros and cons, in this paper we focus on the question of when vaccine passports are politically legitimate. Specifically, we put forward a ‘public reason ethics framework’ for resolving ethical disputes and use the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32. Religious ethics, HIV and AIDS and masculinities in Southern Africa.Ezra Chitando - 2008 - In Ronald Nicolson (ed.), Persons in community: African ethics in a global culture. Scottsville, South Africa: University of KwaZulu-Natal Press.
     
    Export citation  
     
    Bookmark   1 citation  
  33. Paradigm lost : the rise, fall and eventual recovery of paradigms in archaeology.Ezra B. W. Zubrow - 2015 - In Kristian Kristiansen, Ladislav Šmejda, Jan Turek & Evžen Neustupný (eds.), Paradigm found: archaeological theory present, past and future: essays in honour of Evžen Neustupný. Oxford: Oxbow Books.
     
    Export citation  
     
    Bookmark  
  34. Sefer Ḥosen yeshuʻot: ʻal Pirḳe Avot: ḥibur nifla..ʻEzra ben Yeḳutiʼel Zusman - 1811 - Bruḳlin: Aḥim Goldenberg.
     
    Export citation  
     
    Bookmark  
  35. Measuring Automated Influence: Between Empirical Evidence and Ethical Values.Daniel Susser & Vincent Grimaldi - forthcoming - Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society.
    Automated influence, delivered by digital targeting technologies such as targeted advertising, digital nudges, and recommender systems, has attracted significant interest from both empirical researchers, on one hand, and critical scholars and policymakers on the other. In this paper, we argue for closer integration of these efforts. Critical scholars and policymakers, who focus primarily on the social, ethical, and political effects of these technologies, need empirical evidence to substantiate and motivate their concerns. However, existing empirical research investigating the effectiveness of these (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  11
    On science literacy.Ezra Shahn - 1988 - Educational Philosophy and Theory 20 (2):42–52.
  37.  32
    Alan H. Goldman, Reasons from Within Oxford University Press, 2009, ISBN 978-0-19-957690-6: £42 GBP.Ezra Macdonald - 2011 - Ethical Theory and Moral Practice 14 (5):597-599.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  38.  8
    Perceptual organization of materials as a factor influencing ease of learning and degree of retention.Ezra V. Saul & Charles E. Osgood - 1950 - Journal of Experimental Psychology 40 (3):372.
  39. From Procedural Rights to Political Economy: New Horizons for Regulating Online Privacy.Daniel Susser - 2023 - In Sabine Trepte & Philipp K. Masur (eds.), The Routledge Handbook of Privacy and Social Media. Routledge. pp. 281-290.
    The 2010s were a golden age of information privacy research, but its policy accomplishments tell a mixed story. Despite significant progress on the development of privacy theory and compelling demonstrations of the need for privacy in practice, real achievements in privacy law and policy have been, at best, uneven. In this chapter, I outline three broad shifts in the way scholars (and, to some degree, advocates and policy makers) are approaching privacy and social media. First, a change in emphasis from (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  40.  46
    Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to govern data-driven systems. In (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  41.  6
    Effect of Medicare home health care payment on informal care.Ezra Golberstein, David C. Grabowski, Kenneth M. Langa & Michael E. Chernew - 2009 - Inquiry: The Journal of Health Care Organization, Provision, and Financing 46 (1):58-71.
  42.  11
    The Passionate, Personal Plays of Barrie Stavis.Ezra Goldstein - 1990 - Cardozo Studies in Law and Literature 2 (2):279-288.
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  43. Blacks and the language of their biotechnological future.Ezra E. H. Griffith - 2013 - In Michael J. Hyde & James A. Herrick (eds.), After the genome: a language for our biotechnological future. Waco, Texas: Baylor University Press.
     
    Export citation  
     
    Bookmark  
  44.  15
    Confucius: The Great Digest and Unwobbling Pivot.Ezra Pound - 1954 - Philosophy East and West 3 (4):371-373.
  45.  10
    10. Guido's Relations.Ezra Pound - 2012 - In John Biguenet & Rainer Schulte (eds.), Theories of Translation: An Anthology of Essays From Dryden to Derrida. University of Chicago Press. pp. 83-92.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  10
    Time-frequency signatures evoked by single-pulse deep brain stimulation to the subcallosal cingulate.Ezra E. Smith, Ki Sueng Choi, Ashan Veerakumar, Mosadoluwa Obatusin, Bryan Howell, Andrew H. Smith, Vineet Tiruvadi, Andrea L. Crowell, Patricio Riva-Posse, Sankaraleengam Alagapan, Christopher J. Rozell, Helen S. Mayberg & Allison C. Waters - 2022 - Frontiers in Human Neuroscience 16.
    Precision targeting of specific white matter bundles that traverse the subcallosal cingulate has been linked to efficacy of deep brain stimulation for treatment resistant depression. Methods to confirm optimal target engagement in this heterogenous region are now critical to establish an objective treatment protocol. As yet unexamined are the time-frequency features of the SCC evoked potential, including spectral power and phase-clustering. We examined these spectral features—evoked power and phase clustering—in a sample of TRD patients with implanted SCC stimulators. Electroencephalogram was (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  26
    A Life of Rabban Yohanan Ben Zakkai Ca. 1-80 C. E.Ezra Spicehandler & Jacob Neusner - 1963 - Journal of the American Oriental Society 83 (3):363.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  12
    Iranian Jewry during the Afghan Invasion: The Kitāb-i Sar Guzasht-i Kāshān of Bābāī b. Farhād; Text, Edition and CommentaryIranian Jewry during the Afghan Invasion: The Kitab-i Sar Guzasht-i Kashan of Babai b. Farhad; Text, Edition and Commentary.Ezra Spicehandler & Vera Basch Moreen - 1992 - Journal of the American Oriental Society 112 (2):311.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  49.  39
    Hope, hopelessness, and violence.Ezra Stotland - forthcoming - Humanitas.
    Suggests that the form of violence, its direction and purpose, and the conditions that start and end it, are determined mainly by the degree of hope or hopelessness giving rise to it. Violence is defined as an action whose intent is to harm another person. "Emotional violence" is an effort to reduce anxiety, which if successful arouses hope. "Instrumental violence" is directed at a specific goal in a more dispassionate manner. Societies should find moral equivalents to these 2 forms of (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  11
    The Philosophers’ Paul: A Radically Subversive Thinker.Ezra Delahaye - 2017 - In Antonio Cimino, George Henry van Kooten & Gert Jan van der Heiden (eds.), Saint Paul and Philosophy: The Consonance of Ancient and Modern Thought. De Gruyter. pp. 81-94.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 394