Switch to: Citations

Add references

You must login to add references.
  1. (1 other version)Taking Rights Seriously.Ronald Dworkin - 1979 - Mind 88 (350):305-309.
    Download  
     
    Export citation  
     
    Bookmark   504 citations  
  • The reasons of trust.Pamela Hieronymi - 2008 - Australasian Journal of Philosophy 86 (2):213 – 236.
    I argue to a conclusion I find at once surprising and intuitive: although many considerations show trust useful, valuable, important, or required, these are not the reasons for which one trusts a particular person to do a particular thing. The reasons for which one trusts a particular person on a particular occasion concern, not the value, importance, or necessity of trust itself, but rather the trustworthiness of the person in question in the matter at hand. In fact, I will suggest (...)
    Download  
     
    Export citation  
     
    Bookmark   96 citations  
  • The categorical apology.Nick Smith - 2005 - Journal of Social Philosophy 36 (4):473–496.
    Much of our private and public ethical discourse occurs in the giving, receiving, or demanding of an apology, yet we suffer deep confusion regarding what an apology actually is. Most of us have never made explicit precisely what we expect from a full apology and therefore apologizing has become a vague and clumsy ritual. Full apologies can be morally and emotionally powerful, but, as with most valuable things, frauds masquerade as the genuine article. These semblances of apologies often deceive and (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Deciding to trust, coming to believe.Richard Holton - 1994 - Australasian Journal of Philosophy 72 (1):63 – 76.
    Can we decide to trust? Sometimes, yes. And when we do, we need not believe that our trust will be vindicated. This paper is motivated by the need to incorporate these facts into an account of trust. Trust involves reliance; and in addition it requires the taking of a reactive attitude to that reliance. I explain how the states involved here differ from belief. And I explore the limits of our ability to trust. I then turn to the idea of (...)
    Download  
     
    Export citation  
     
    Bookmark   267 citations  
  • (1 other version)Internalism exposed.Alvin I. Goldman - 1999 - Journal of Philosophy 96 (6):271-293.
    In recent decades, epistemology has witnessed the development and growth of externalist theories of knowledge and justification. Critics of externalism have focused a bright spotlight on this approach and judged it unsuitable for realizing the true and original goals of epistemology. Their own favored approach, internalism, is defended as a preferable approach to the traditional concept of epistemic justification. I shall turn the spotlight toward internalism and its most prominent rationale, revealing fundamental problems at the core of internalism and challenging (...)
    Download  
     
    Export citation  
     
    Bookmark   166 citations  
  • (3 other versions)Freedom and Resentment.Peter Strawson - 1962 - Proceedings of the British Academy 48:187-211.
    The doyen of living English philosophers, by these reflections, took hold of and changed the outlook of a good many other philosophers, if not quite enough. He did so, essentially, by assuming that talk of freedom and responsibility is talk not of facts or truths, in a certain sense, but of our attitudes. His more explicit concern was to look again at the question of whether determinism and freedom are consistent with one another -- by shifting attention to certain personal (...)
    Download  
     
    Export citation  
     
    Bookmark   1312 citations  
  • (1 other version)Taking Rights Seriously.Ronald Dworkin - 1979 - Ethics 90 (1):121-130.
    Download  
     
    Export citation  
     
    Bookmark   466 citations  
  • How the machine ‘thinks’: Understanding opacity in machine learning algorithms.Jenna Burrell - 2016 - Big Data and Society 3 (1):205395171562251.
    This article considers the issue of opacity as a problem for socially consequential mechanisms of classification and ranking, such as spam filters, credit card fraud detection, search engines, news trends, market segmentation and advertising, insurance or loan qualification, and credit scoring. These mechanisms of classification all frequently rely on computational algorithms, and in many cases on machine learning algorithms to do this work. In this article, I draw a distinction between three forms of opacity: opacity as intentional corporate or state (...)
    Download  
     
    Export citation  
     
    Bookmark   194 citations  
  • Serendipity as an emerging design principle of the infosphere: challenges and opportunities.Urbano Reviglio - 2019 - Ethics and Information Technology 21 (2):151-166.
    Underestimated for a long time, serendipity is an increasingly recognized design principle of the infosphere. Being influenced by environmental and human factors, the experience of serendipity encompasses fundamental phases of production, distribution and consumption of information. On the one hand, design information architectures for serendipity increases the diversity of information encountered as well as users’ control over information processes. On the other hand, serendipity is a capability. It helps individuals to internalize and adopt strategies that increase the chances of experiencing (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Terrorism, shared rules and trust.Matthew Noah Smith - 2007 - Journal of Political Philosophy 16 (2):201–219.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Breaking the Privacy Paradox: The Value of Privacy and Associated Duty of Firms.Kirsten Martin - 2020 - Business Ethics Quarterly 30 (1):65-96.
    ABSTRACT:The oft-cited privacy paradox is the perceived disconnect between individuals’ stated privacy expectations, as captured in surveys, and consumer market behavior in going online: individuals purport to value privacy yet still disclose information to firms. The goal of this paper is to empirically examine the conceptualization of privacy postdisclosure assumed in the privacy paradox. Contrary to the privacy paradox, the results here suggest consumers retain strong privacy expectations even after disclosing information. Privacy violations are valued akin to security violations in (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Terrorism, Shared Rules and Trust.Matthewnoah Smith - 2008 - Journal of Political Philosophy 16 (2):201-219.
    Download  
     
    Export citation  
     
    Bookmark   1 citation