Lorenzo Sacconi's recent re-statement of his social contract account of business ethics is a major contribution to our understanding of the normative nature of CSR as the expression of a fair multi-party agreement supported by the economic rationality of each participant. However, at one crucial point in his theory, Sacconi introduces the concept of stakeholders' conformist preferences - their disposition to punish the firm if it defects from the agreement, refusing to abide by its own explicit CSR policies and norms. (...) We take issue with him over this concept: we show that the assumption of conformist preferences is a moral premise, and it arguably weakens the normativity of the theory as a whole. As an alternative, we propose an evolutionary game theoretic approach. We draw upon recent applications of evolutionary game theory to moral philosophy , and we use a computer simulation of the trust game. According to this approach, the failure of the logic of reputation, which is the problem conformist preferences were introduced to solve, is overcome through the dynamics of interaction. (shrink)
Lorenzo Sacconi’s recent re-statement of his social contract account of business ethics is a major contribution to our understanding of the normative nature of CSR as the expression of a fair multi-party agreement supported by the economic rationality of each participant. However, at one crucial point in his theory, Sacconi introduces the concept of stakeholders’ conformist preferences – their disposition to punish the firm if it defects from the agreement, refusing to abide by its own explicit CSR policies and norms. (...) We take issue with him over this concept: we show that the assumption of conformist preferences is a moral premise, and it arguably weakens the normativity of the theory as a whole. As an alternative, we propose an evolutionary game theoretic approach. We draw upon recent applications of evolutionary game theory to moral philosophy (Skyrms, Danielson), and we use a computer simulation of the trust game. According to this approach, the failure of the logic of reputation, which is the problem conformist preferences were introduced to solve, is overcome through the dynamics of interaction. (shrink)
Lorenzo Sacconi's The Social Contract of the Firm (Berlin, Springer, 2000) is a major contribution to the normative theory of the firm. It contains a full-fledged contractarian explanation of the role of Corporate Codes of Ethics. Sacconi proposes a game-theoretical model of the normative structure of the firm, including explicit and implicit contracts binding the members of the organisation, and the so-called constitutional contract: the hypothetical agreement that sets the basic co-operative structure in which the organisation consists. While Sacconi's theory (...) is sound and full of suggestions, it is doubtful whether it completely grasps the nature of organisational ethics. In presenting organisations as the product of an agreement among self-interested individuals, the model does not account for the social and systemic embeddedness of business institutions. This paper points to several shortcomings of Sacconi's view, and explores alternative understandings of a contractarian morality as applied to business ethics. (shrink)
RESUMENEste trabajo tiene como objetivo responder a las críticas al liberalismo formuladas en un reciente trabajo de Carlos Kohn. Para mostrar esto expondré, en primer lugar, por qué pienso que Kohn generaliza ilegítimamente una concepción bastante estrecha de liberalismo, relacionada con la economía. En segundo lugar señalaré los límites de esa concepción, y cómo puede definirse otra más comprehensiva, en la que enmarcaré la mayor parte del liberalismo político contemporáneo y, un tanto audazmente, el contractualismo clásico de Hobbes. En tercer (...) lugar, trateré de mostrar que, esta versión comprehensiva es una razonable descripción de la política, que no depende lógicamente de suposiciones dudosas sobre los presupuestos y requisitos de la economía de mercado y que, por ello, escapa indemne a la crítica de KohnPALABRAS CLAVELIBERALISMO-LIBERALISMO POLÍTICO-DEMOCRACIA LIBERAL-CAPITALISMOABSTRACTThe paper aims to revise the critiques to liberalism recently formulated by Carlos Kohn. i will explain, firstly, why I think Kohn wrongly generalizes a quite thin conception of liberalism, related to the economy. Secondly, I will suggest the limitations of that conception. Instead, another, more comprehensive notion can be formulated that can encompass both contemporary political liberalism and, even audaciously, Hobbes' cassical contractualism. Thirdly, I will argue that this comprehensive notion is a reasonable description of politics. it does not depend on doubtfull assumptions over the principles of market economy. hence, it escapes Kohn's critique.KEYWORDSLIBERALISM- POLITICAL LIBERALISM-LIBERAL DEMOCRACY-CAPITALISM. (shrink)
The appearance of the following pages might suggest an "intellectual biography". My purpose is not, though, to offer such a simple thing . Indeed, I would like to follow the evolution of Gauthier's thought not only to show how a thinker evolved from a particular view about a particular problem toward a quite original and suggestive formulation, but also to deepen our comprehension of moral contractarianism and its implications, by means of its contextualization. For this reason, I will focus not (...) on Gauthier's philosophical production as a whole , but on the papers and works that mark the line toward moral contractarianism as it is found in Morals by Agreement . The trajectory we are about to go over is not, therefore, only a personal adventure , but the adventure of ideas. This will not be an easy journey. Our focus on the historical development of concepts will prevent us from giving a fully systematic account of every one of them. The unfamiliar reader may be disappointed as we use somewhat strange terms without completely explaining their meaning. We beg acquiescence with our method, hoping that, on the whole, the essential ideas will be understandable without a detailed discussion. (shrink)
The linguafranca, or Mediterranean pidgin, was spoken by sailors and merchants that sailed the Mediterranean Sea during centuries. This pidgin borrowed terms from languages such as: Castilian and Catalan, French and Provencal (Occitanian language), Italian, Genovese, and Venetian. Moreover, words of Arabic and Neogreek origins were added to al1 this common mass. So, this lingua is a great interesting resource to deal with the study of the Spanish naval histoy in the Mediterranean Sea from 12" to 13" century, when its (...) usage started to vanish. From 16" century on, it started to be spoken in America. This common language, between Romance language nations, only uses the infinitive verb for al1 tenses and modes of verb's conjugation. Nowadays, there are terms that still remain in sailors' language such as wind names: leveche, jaloque, maestral or mistral, tramontana; meteorological phenomena names: bórea or boria; and nomenclature for typical crafts: paramola, escálamo, car, batallol, laud or llaüt, latino. (shrink)
Este trabajo tiene como objetivo responder a las críticas al liberalismo formuladas en un reciente trabajo de Carlos Kohn. Para mostrar esto expondré, en primer lugar, por qué pienso que Kohn generaliza ilegítimamente una concepción bastante estrecha de liberalismo, relacionada con la economía. En segundo lugar, por qué pienso que Kohn generaliza ilegítimamente una concepción bastante estrecha de liberalismo, relacionada con la economía. En segundo lugar señalaré los límites de esa concepción, y cómo puede definirse otra más comprehensiva, en la (...) que enmarcaré la mayor parte del liberalismo político contemporáneo y, un tanto audazmente, el contractualismo clásico de Hobbes. En tercer lugar, trataré de mostrar que esta versión comprehensiva es una razonable descripción de la política, que no depende lógicamente de suposiciones dudosas sobre los presupuestos y requisitos de la economía de mercado y que, por ello, escapa indemne a la crítica de Kohn. (shrink)
In their important paper “Autonomous Agents”, Floridi and Sanders use “levels of abstraction” to argue that computers are or may soon be moral agents. In this paper we use the same levels of abstraction to illuminate differences between human moral agents and computers. In their paper, Floridi and Sanders contributed definitions of autonomy, moral accountability and responsibility, but they have not explored deeply some essential questions that need to be answered by computer scientists who design artificial agents. One such question (...) is, “Can an artificial agent that changes its own programming become so autonomous that the original designer is no longer responsible for the behavior of the artificial agent?” To explore this question, we distinguish between LoA1 (the user view) and LoA2 (the designer view) by exploring the concepts of unmodifiable, modifiable and fully modifiable tables that control artificial agents. We demonstrate that an agent with an unmodifiable table, when viewed at LoA2, distinguishes an artificial agent from a human one. This distinction supports our first counter-claim to Floridi and Sanders, namely, that such an agent is not a moral agent, and the designer bears full responsibility for its behavior. We also demonstrate that even if there is an artificial agent with a fully modifiable table capable of learning* and intentionality* that meets the conditions set by Floridi and Sanders for ascribing moral agency to an artificial agent, the designer retains strong moral responsibility. (shrink)
As software developers design artificial agents , they often have to wrestle with complex issues, issues that have philosophical and ethical importance. This paper addresses two key questions at the intersection of philosophy and technology: What is deception? And when is it permissible for the developer of a computer artifact to be deceptive in the artifact’s development? While exploring these questions from the perspective of a software developer, we examine the relationship of deception and trust. Are developers using deception to (...) gain our trust? Is trust generated through technological “enchantment” warranted? Next, we investigate more complex questions of how deception that involves AAs differs from deception that only involves humans. Finally, we analyze the role and responsibility of developers in trust situations that involve both humans and AAs. (shrink)
In this paper, I start with the opposition between the Husserlian project of a phenomenology of the experience of time, started in 1905, and the mathematical and physical theory of time as it comes out of Einstein’s special theory of relativity in the same year. Although the contrast between the two approaches is apparent, my aim is to show that the original program of Husserl’s time theory is the constitution of an objective time and a time of the world, starting (...) from the intuitive giveness of time, i.e., from time as it appears. To show this, I stress the structural similarity between Husserl’s original question of time and the problem of a phenomenology of space constitution as it was first developed in the his manuscripts from the nineteenth century, in which we find the threefold question of the origin of our representation of space, of the geometrization of intuitive space, and of the constitution of transcendent world space. Finally, I reconsider some of Husserl’s main theses about the phenomenological constitution of objective time in light of the main results of special relativity time-theory, introducing several corrections to central assumptions that underlie Husserl’s theory of time. (shrink)
Nationalisms are polymorphous and often internally contradictory, unleashing emancipatory as well as repressive ideas and forces. This article explores the ideologies and mobilization strategies of two organizations over a 10-year period in the occupied Palestinian territories: a leftist-nationalist party in which women became unusually powerful and its affiliated and remarkably successful nationalist-feminist women's organization. Two factors allowed women to become powerful and facilitated a fruitful coexistence between nationalism and feminism: a commitment to a variant of modernist ideology that was marked (...) by grassroots as opposed to military mobilization and a concern with proving the cultural worth of Palestinian society to the West, a project that was symbolized by women's status in important ways. By comparing international and indigenous feminist discourses, the study also demonstrates how narratives about gender status in the Third World are implicated in, and inextricable from, international economic and political inequalities. (shrink)
France’s 35-hour workweek is one of the boldest progressive reforms in recent years. Drawing on existing survey and economic data, supplemented by interviews with French informants, this article examines the 35-hour week’s evolution and impacts. Although commonly dismissed as economically uncompetitive, the policy package succeeded in avoiding significant labor-cost increases for business. Most 35-hour employees cite quality-of-life improvements despite the fact that wage moderation, greater variability in schedules, and intensification of work negatively impacted some—mostly lower-paid and less-skilled—workers. Taking into account (...) employment gains, the initiative can be considered a qualified success in meeting its main aims. (shrink)
In this paper, we examine some ethical implications of a controversial court decision in the United States involving Verizon (an Internet Service Provider or ISP) and the Recording Industry Association of America (RIAA). In particular, we analyze the impacts this decision has for personal privacy and intellectual property. We begin with a brief description of the controversies and rulings in this case. This is followed by a look at some of the challenges that peer-to-peer (P2P) systems, used to share digital (...) information, pose for our legal and moral systems. We then examine the concept of privacy to better understand how the privacy of Internet users participating in P2P file-sharing practices is threatened under certain interpretations of the Digital Millennium Copyright Act (DMCA) in the United States. In particular, we examine the implications of this act for a new form of “panoptic surveillance” that can be carried out by organizations such as the RIAA. We next consider the tension between privacy and property-right interests that emerges in the Verizon case, and we examine a model proposed by Jessica Litman for distributing information over the Internet in a way that respects both privacy and property rights. We conclude by arguing that in the Verizon case, we should presume in favor of privacy as the default position, and we defend the view that a presumption should be made in favor of sharing (rather than hoarding) digital information. We also conclude that in the Verizon case, a presumption in favor of property would have undesirable effects and would further legitimize the commodification of digital information – a recent trend that is reinforced by certain interpretations of the DMCA on the part of lawmakers and by aggressive tactics used by the RIAA. (shrink)
Purpose This paper aims to explore the ethical and social impact of augmented visual field devices, identifying issues that AVFDs share with existing devices and suggesting new ethical and social issues that arise with the adoption of AVFDs. Design/methodology/approach This essay incorporates both a philosophical and an ethical analysis approach. It is based on Plato’s Allegory of the Cave, philosophical notions of transparency and presence and human values including psychological well-being, physical well-being, privacy, deception, informed consent, ownership and property and (...) trust. Findings The paper concludes that the interactions among developers, users and non-users via AVFDs have implications for autonomy. It also identifies issues of ownership that arise because of the blending of physical and virtual space and important ways that these devices impact, identity and trust. Practical implications Developers ought to take time to design and implement an easy-to-use informed consent system with these devices. There is a strong need for consent protocols among developers, users and non-users of AVFDs. Social implications There is a social benefit to users sharing what is visible on their devices with those who are in close physical proximity, but this introduces tension between notions of personal privacy and the establishment and maintenance of social norms. Originality/value There is new analysis of how AVFDs impact individual identity and the attendant ties to notions of ownership of the space between an object and someone’s eyes and control over perception. (shrink)
In this paper, I examine some important features of Brentano’s and Rosenthal’s theories of consciousness and self-consciousness. In particular, I discuss the distinction between mental states and conscious states, and the related question of determining whether all mental states can become conscious states. I interpret Brentano’s theory as a one-level theory of mind which is in keeping with the Cartesian conflation between mental states and consciousness. I argue that the problems arising from Brentano’s position are to a certain extent surpassed (...) by a higher-order theory, so that Rosenthal’s position is more accurate. Nevertheless, I disagree with both in the construal of the consciousness of a mental state as self-consciousness. I develop then the fundamentals for a theory based on the primacy of the organism and its vital world, and of conscious experience as the higher form of mental life, which has, however, its roots in the complex net of mental states which are not conscious states. (shrink)
This book focuses on the central party apparatus of the Democratic Front for the Liberation of Palestine, the Democratic Front branches established in the Occupied Palestinian Territories and Jordan in the 1970s, and the most influential and innovative of the DF women's organizations: the Palestinian Federation of Women's Action Committees in the occupied territories. Until now, no study of a Palestinian political organization has so thoroughly engaged with internal gender histories. In addition, no other work attempts to systematically compare branches (...) in different regional locations to explain those differences. Students of gender and Middle East studies, especially those with a specialty in Palestinian studies, will find this work to be of critical importance. This book will also be of great interest to those working on political protest movements and factional ties. (shrink)
This paper focuses on representations by and deployments of the four Palestinian women who during the first four months of 2002 killed themselves in organized attacks against Israeli military personnel or civilians in the Occupied Palestinian Territories or Israel. The paper addresses the manner in which these militant women produced and situated themselves as gendered-political subjects, and argues that their self-representations and acts were deployed by individuals and groups in the region to reflect and articulate other gendered–political subjectivities that at (...) times undermined or rearticulated patriarchal religio-nationalist understandings of gender and women in relation to corporeality, authenticity, and community. The data analysed include photographs, narrative representations in television and newspaper media, the messages the women left behind, and secondary sources. (shrink)
This essay expands upon an earlier work in which we analyzed the implications of the Verizon v RIAA case for P2P Networks vis-à-vis concerns affecting personal privacy and intellectual property. In the present essay we revisit some of the concerns surrounding this case by analyzing the intellectual property and privacy issues that emerged in the MGM Studios v. Grokster case. These two cases illustrate some of the key tensions that exist between privacy and property interests in cyberspace. In our analysis, (...) we contrast Digital Rights Management and Interoperability and we examine some newer distribution models of sharing over P2P networks. We also analyze some privacy implications in the two cases in light of the theory of privacy as contextual integrity. (shrink)
There are at least two approaches that assist students in understanding complexity and differing interpretations about human diversity and race. Because differing perspectives emerge from data perceived at different levels, different scales provide a tool for understanding relationships among perspectives and understanding the differential importance of specific factors. Constructivist listening, which assists students in examining their own experiences, feelings and understanding, provides a tool for digesting complex new material and learning emotional literacy. It can be applied to dialogue about race (...) and to classroom situations. These approaches can help students master the conceptual and interpersonal skills needed for successful scientific practice. (shrink)
In this age of information technology, it is morally imperative that equal access to information via computer systems be afforded to people with disabilities. This paper addresses the problems that computer technology poses for students with disabilities and discusses what is needed to ensure equity of access. particularly in a university environment.
The present study examines a range of moral issues associated with recent cyberstalking cases. Particular attention is centered on the Amy Boyer/ Liam Youens case of cyberstalking, which raises a host of considerations that we believe have a significant impact for ethical behavior on the Internet. Among the questions we consider are those having to do with personal privacy and the use of certain kinds of Internet search facilities to stalk individuals in cyberspace. Also considered are questions having to do (...) with legal liability and moral responsibility that Internet Service Providers have for stalking crimes that occur in their "space" on the Internet. Finally, we examine issues of moral responsibility for individual online users to determine which obligations, if any, they might have to inform persons who are targeted by cyberstalkers, when it is in their power to do so. (shrink)
In this paper, I discuss the possible relations between Fritz London’s account of the status of the observer in quantum physics and transcendental phenomenology. Firstly, I discuss Steven French’s interpretation of London’s thesis as a phenomenological account of the status of the observer, along with the objections Otávio Bueno has brought forward. Secondly, refusing in part both French’s and Bueno’s theses for several reasons, I propose another way of reading London’s thesis in the framework of transcendental phenomenology. Namely, I put (...) London’s account of the observer against the backdrop of Husserl’s analyses of the objectifying acts and objectual constitution. Finally, I end this article with some criticisms of what seems to me the ontological indigency of the Copenhagen interpretation of quantum physics, to whose “spirit” London also belongs. (shrink)
In this paper I address some philosophical questions regarding the impact quantum mechanics has in the classical conceptions about reality and knowledge. I stress that onto-gnosiological realism still is an option to the issues regarding the relationship between knowledge and reality. Rejecting some radical aspects of Copenhagen interpretation of quantum formalism, I emphasize the advantages of de Broglie’s realistic and causal model. To finish with, I discuss the limits of the Cartesian concept of matter and the split between matter and (...) mind. (shrink)
The chapter has two parts. In the first part, I introduce a more fine-grained analysis of evaluative sentences. I distinguish between evaluations proper and directions for action with several degrees of constraint: commands, pieces of advice, suggestions, and so on. I call the latter “ductive-statements.” Thus, I affirm that the realm of morals has two branches: one relative to evaluations, which are is-sentences ranging from the several degrees between good and bad to the indifferent ; the other relative to sentences (...) having a “ductive” force that impose, with different degrees of coercion, a course of action. In the second part of the chapter, I address Searle’s famous argument concerning the derivation of ought-sentences from is-sentences. Relying on my previous distinctions, I argue that Searle’s derivation is flawed in two main points, which I present and discuss at length. (shrink)