Results for ' THREATS'

921 found
Order:
  1. The Threat of Algocracy: Reality, Resistance and Accommodation.John Danaher - 2016 - Philosophy and Technology 29 (3):245-268.
    One of the most noticeable trends in recent years has been the increasing reliance of public decision-making processes on algorithms, i.e. computer-programmed step-by-step instructions for taking a given set of inputs and producing an output. The question raised by this article is whether the rise of such algorithmic governance creates problems for the moral or political legitimacy of our public decision-making processes. Ignoring common concerns with data protection and privacy, it is argued that algorithmic governance does pose a significant threat (...)
    Download  
     
    Export citation  
     
    Bookmark   55 citations  
  2. Is that a Threat?Henry Ian Schiller - 2021 - Erkenntnis 86 (5):1161-1183.
    I introduce game-theoretic models for threats to the discussion of threats in speech act theory. I first distinguish three categories of verbal threats: conditional threats, categorical threats, and covert threats. I establish that all categories of threats can be characterized in terms of an underlying conditional structure. I argue that the aim—or illocutionary point—of a threat is to change the conditions under which an agent makes decisions in a game. Threats are moves (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  3. Emerging viral threats and the simultaneity of the non-simultaneous: zooming out in times of Corona.Hub Zwart - 2020 - Medicine, Health Care and Philosophy 23 (4):589-602.
    This paper addresses global bioethical challenges entailed in emerging viral diseases, focussing on their socio-cultural dimension and seeing them as symptomatic of the current era of globalisation. Emerging viral threats exemplify the extent to which humans evolved into a global species, with a pervasive and irreversible impact on the planetary ecosystem. To effectively address these disruptive threats, an attitude of preparedness seems called for, not only on the viroscientific, but also on bioethical, regulatory and governance levels. This paper (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. The Threat of COVID-19 and Job Insecurity Impact on Depression and Anxiety: An Empirical Study in the USA.Obrenovic Bojan, Jianguo Du, Danijela Godinić, Mohammed Majdy M. Baslom & Diana Tsoy - 2021 - Frontiers in Psychology 12:648572.
    In this study, we conceptualized a framework capturing recurring troublesome elements of mental states such as depression and general anxiety, assessing them by applying standard clinical inventory. The study explores the extent to which danger control and fear control under the Extended Parallel Processing Model (EPPM) threat impact job insecurity, with uncertainty phenomenon causing afflicting effect on the experiential nature of depression heightened by anxiety. With the aim to explore the job insecurity relationship with anxiety and depression, and measure the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Threats, Coercion, and Willingness to Damn: Three More Objections against the Unpopulated Hell View.Alex R. Gillham - 2020 - Forum Philosophicum: International Journal for Philosophy 25 (2):235-254.
    In this paper, I develop and evaluate three new objections to the Unpopulated Hell View (UHV). First, I consider whether UHV is false because it presupposes that God makes threats, which a perfect being would not do. Second, I evaluate the argument that UHV is false because it entails that God coerces us and therefore limits our freedom to an objectionable degree. Third, I consider whether UHV is false because it implies that God is willing to damn some individuals (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. The Threat from Manipulation Arguments.Benjamin Matheson - 2018 - American Philosophical Quarterly 55 (1):37-50.
    Most seem to presume that what is threatening about manipulation arguments is the ‘no difference’ premise – that is, the claim that there are no responsibility-relevant differences between a manipulated agent and her merely causally determined counterpart. This presumption underlies three recent replies to manipulation arguments from Kearns (2012), King (2013), and Schlosser (2015). But these replies fail to appreciate the true threat from manipulation arguments – namely, the manipulation cases that are allegedly counterexamples to the leading compatibilist conditions on (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  7. IMPLICIT BIAS, STEREOTYPE THREAT, AND POLITICAL CORRECTNESS IN PHILOSOPHY.Sean Allen-Hermanson - 2017 - Philosophies 2 (2).
    This paper offers an unorthodox appraisal of empirical research bearing on the question of the low representation of women in philosophy. It contends that fashionable views in the profession concerning implicit bias and stereotype threat are weakly supported, that philosophers often fail to report the empirical work responsibly, and that the standards for evidence are set very low—so long as you take a certain viewpoint.
    Download  
     
    Export citation  
     
    Bookmark  
  8. Mental Action and the Threat of Automaticity.Wayne Wu - 2013 - In Andy Clark, Julian Kiverstein & Tillmann Vierkant (eds.), Decomposing the Will. , US: Oxford University Press USA. pp. 244-61.
    This paper considers the connection between automaticity, control and agency. Indeed, recent philosophical and psychological works play up the incompatibility of automaticity and agency. Specifically, there is a threat of automaticity, for automaticity eliminates agency. Such conclusions stem from a tension between two thoughts: that automaticity pervades agency and yet automaticity rules out control. I provide an analysis of the notions of automaticity and control that maintains a simple connection: automaticity entails the absence of control. An appropriate analysis, however, shows (...)
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  9. Standard Threats: How to Violate Basic Human Rights.Anthony R. Reeves - 2015 - Social Theory and Practice 41 (3):403-434.
    The paper addresses the nature of duties grounded in human rights. Rather than being protections against harm, per se, I contend that human rights largely shield against risk impositions to protected interests. “Risk imposition” is a normative idea requiring explication, but understanding dutiful action in its terms enables human rights to provide prospective policy guidance, hold institutions accountable, operate in non-ideal circumstances, embody impartiality among persons, and define the moral status of agencies in international relations. Slightly differently, I indicate a (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10. The Fallaciousness of Threats: Character and Ad Baculum .F. Macagno & D. Walton - 2007 - Argumentation 28 (3):203-228.
    Robert Kimball, in “What’s Wrong with Argumentum Ad Baculum?” (Argumentation, 2006) argues that dialogue-based models of rational argumentation do not satisfactorily account for what is objectionable about more malicious uses of threats encountered in some ad baculum arguments. We review the dialogue-based approach to argumentum ad baculum, and show how it can offer more than Kimball thinks for analyzing such threat arguments and ad baculum fallacies.
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  11. Doing and allowing, threats and sequences.Fiona Woollard - 2008 - Pacific Philosophical Quarterly 89 (2):261–277.
    The distinction between doing and allowing appears to have moral significance, but the very nature of the distinction is as yet unclear. Philippa Foot's ‘pre-existing threats’ account of the doing/allowing distinction is highly influential. According to the best version of Foot's account an agent brings about an outcome if and only if his behaviour is part of the sequence leading to that outcome. When understood in this way, Foot's account escapes objections by Warren Quinn and Jonathan Bennett. However, more (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  12. Killing Minimally Responsible Threats.Saba Bazargan - 2014 - Ethics 125 (1):114-136.
    Minimal responsibility threateners are epistemically justified but mistaken in thinking that imposing a nonnegligible risk on others is permissible. On standard accounts, an MRT forfeits her right not to be defensively killed. I propose an alternative account: an MRT is liable only to the degree of harm equivalent to what she risks causing multiplied by her degree of responsibility. Harm imposed on the MRT above that amount is justified as a lesser evil, relative to allowing the MRT to kill her (...)
    Download  
     
    Export citation  
     
    Bookmark   30 citations  
  13. Dimensions of the Threat to the Self Posed by Deep Brain Stimulation: Personal Identity, Authenticity, and Autonomy.Przemysław Zawadzki - 2020 - Diametros 18 (69):71-98.
    Deep Brain Stimulation (DBS) is an invasive therapeutic method involving the implantation of electrodes and the electrical stimulation of specific areas of the brain to modulate their activity. DBS brings therapeutic benefits, but can also have adverse side effects. Recently, neuroethicists have recognized that DBS poses a threat to the very fabric of human existence, namely, to the selves of patients. This article provides a review of the neuroethical literature examining this issue, and identifies the crucial dimensions related to the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  14.  95
    HARNESSING AI FOR EVOLVING THREATS: FROM DETECTION TO AUTOMATED RESPONSE.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):91-97.
    The landscape of cybersecurity is constantly evolving, with adversaries becoming increasingly sophisticated and persistent. This manuscript explores the utilization of artificial intelligence (AI) to address these evolving threats, focusing on the journey from threat detection to autonomous response. By examining AI-driven detection methodologies, advanced threat analytics, and the implementation of autonomous response systems, this paper provides insights into how organizations can leverage AI to strengthen their cybersecurity posture against modern threats. Key words: Ransomware, Anomaly Detection, Advanced Persistent (...) (APTs), Automated Threat Response and Artificial Intelligence. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Epistemic selectivity, historical threats, and the non-epistemic tenets of scientific realism.Timothy D. Lyons - 2017 - Synthese 194 (9):3203-3219.
    The scientific realism debate has now reached an entirely new level of sophistication. Faced with increasingly focused challenges, epistemic scientific realists have appropriately revised their basic meta-hypothesis that successful scientific theories are approximately true: they have emphasized criteria that render realism far more selective and, so, plausible. As a framework for discussion, I use what I take to be the most influential current variant of selective epistemic realism, deployment realism. Toward the identification of new case studies that challenge this form (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  16. (1 other version)The threat of thinking things into existence.Kathrin Koslicki - 2020 - In Luis R. G. Oliveira & Kevin Corcoran (eds.), Common Sense Metaphysics: Essays in Honor of Lynne Rudder Baker. New York, NY: Routledge. pp. 113-136.
    According to the account of artifacts developed by Lynne Rudder Baker, artifacts have a certain “proper function” essentially. The proper function of an artifact is the purpose or use intended for the artifact by its “author(s)”, viz., the artifact’s designer(s) and/or producer(s). Baker’s account therefore traces the essences of artifacts back indirectly to the intentions of an artifact’s original author (e.g., its inventor, maker, producer or designer). Like other “author-intention-based” accounts (e.g., those defended by Amie Thomasson, Simon Evnine, and others), (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. Sentientism Still Under Threat: Reply to Dung.François Kammerer - 2024 - Journal of Consciousness Studies 31 (3):103-119.
    In 'Ethics Without Sentience: Facing Up to the Probable Insignificance of Phenomenal Consciousness' (Kammerer, 2022), I argued that phenomenal consciousness is probably normatively insignificant, and does not play a significant normative role. In 'Preserving the Normative Significance of Sentience' (Dung, 2024), Leonard Dung challenges my reasoning and defends sentientism about value and moral status against my arguments. Here I respond to Dung's criticism, pointing out three flaws in his reply. My conclusion is that the view that phenomenal consciousness is distinctively (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Climate Change and the Threat of Disaster: The Moral Case for Taking Out Insurance at Our Grandchildren's Expense.Matthew Rendall - 2011 - Political Studies 59 (4):884-99.
    Is drastic action against global warming essential to avoid impoverishing our descendants? Or does it mean robbing the poor to give to the rich? We do not yet know. Yet most of us can agree on the importance of minimising expected deprivation. Because of the vast number of future generations, if there is any significant risk of catastrophe, this implies drastic and expensive carbon abatement unless we discount the future. I argue that we should not discount. Instead, the rich countries (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  19. Moral grandstanding as a threat to free expression.Justin Tosi & Brandon Warmke - 2020 - Social Philosophy and Policy 37 (2):170-189.
    Moral grandstanding, or the use of moral talk for self-promotion, is a threat to free expression. When grandstanding is introduced in a public forum, several ideals of free expression are less likely to be realized. Popular views are less likely to be challenged, people are less free to entertain heterodox ideas, and the cost of changing one’s mind goes up.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  20. The Threat of Space Terrorism in the Context of Irregular Warfare Strategies.Pawel Bernat & Elżbieta Posłuszna - 2019 - In Leyla Aydemir (ed.), Evaluation of Social Changes and Historical Events Based on Health, Economy and Communication in a Globalizing World. pp. 25-37.
    Download  
     
    Export citation  
     
    Bookmark  
  21. Is Terrorism a Serious Threat to International and National Security? NO: The Myth of Terrorism as an Existential Threat.Jessica Wolfendale - 2012 - In Richard Jackson & Samuel Justin Sinclair (eds.), Contemporary Debates on Terrorism. Routledge. pp. 80-87.
    In contemporary academic, political, and media discourse, terrorism is typically portrayed as an existential threat to lives and states, a threat driven by religious extremists who seek the destruction of Western civilization and who are immune to reason and negotiation. In many countries, including the US, the UK, and Australia, this existential threat narrative of terrorism has been used to justify sweeping counterterrorism legislation, as well as military operations and even the use of tactics such as torture and indefinite detention. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. The Threats of Land Resources Management Due to Increasing Rapid Population Growth in Zanzibar.Muhamad Hamdu Haji - 2019 - International Journal of Academic Multidisciplinary Research (IJAMR) 3 (4):1-7.
    Abstract: This paper talks about the threats of land Resources management due to the problem of rapid increase of population growth in Zanzibar Island. Actual there are many threats that are investigated and proved by this study. The land environmental degradation, cutting down the forest for formation of charcoal as their income sources as well as drilling the minerals includes sand and stone are the ones of the threats of land resources management due to the highly increasing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Meaning under the Threat of Paradox on Two Fronts.Olga Ramirez Calle - 2020 - Analiza I Egzystencja 50:5-17.
    The paper defends the argument that the Resemblance Paradox (RP), or the problem of the ‘under-determination of meaning’, and the Rule-Following Paradox (RFP) are two sides of the same paradox threatening meaning from opposite extremes. After presenting the case, the paradox is reconsidered anew and the supposition that the threat is a pervasive one is challenged.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Cognitive Enhancement and the Threat of Inequality.Walter Veit - 2018 - Journal of Cognitive Enhancement 2 (4):1-7.
    As scientific progress approaches the point where significant human enhancements could become reality, debates arise whether such technologies should be made available. This paper evaluates the widespread concern that human enhancements will inevitably accentuate existing inequality and analyzes whether prohibition is the optimal public policy to avoid this outcome. Beyond these empirical questions, this paper considers whether the inequality objection is a sound argument against the set of enhancements most threatening to equality, i.e., cognitive enhancements. In doing so, I shall (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  25. Knowledge Under Threat.Tomas Bogardus - 2014 - Philosophy and Phenomenological Research 88 (2):289-313.
    Many contemporary epistemologists hold that a subject S’s true belief that p counts as knowledge only if S’s belief that p is also, in some important sense, safe. I describe accounts of this safety condition from John Hawthorne, Duncan Pritchard, and Ernest Sosa. There have been three counterexamples to safety proposed in the recent literature, from Comesaña, Neta and Rohrbaugh, and Kelp. I explain why all three proposals fail: each moves fallaciously from the fact that S was at epistemic risk (...)
    Download  
     
    Export citation  
     
    Bookmark   74 citations  
  26. Neuroscientific threats to free will.Joshua Shepherd - 2016 - In Kevin Timpe, Meghan Griffith & Neil Levy (eds.), Routledge Companion to Free Will. New York: Routledge.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  47
    Advanced Persistent Threats in Cybersecurity – Cyber Warfare.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats. It explores the concept of advanced persistent threats in the context of cyber security and cyber warfare. APTs represent one of the most insidious and challenging forms of cyber threats, characterized by their sophistication, persistence, and targeted nature. The paper examines the origins, characteristics and methods used by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Peers and Performance: How In-Group and Out-Group Comparisons Moderate Stereotype Threat Effects.Keith Markman & Ronald Elizaga - 2008 - Current Psychology 27:290-300.
    The present study examined how exposure to the performance of in-group and out-group members can both exacerbate and minimize the negative effects of stereotype threat. Female participants learned that they would be taking a math test that was either diagnostic or nondiagnostic of their math ability. Prior to taking the test, participants interacted with either an in-group peer (a female college student) or an out-group peer (a male college student) who had just taken the test and learned that the student (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  29. The Fallaciousness of Threats: Character and Ad Baculum.Fabrizio Macagno & Douglas Walton - 2007 - Argumentation 21 (1):63-81.
    Robert Kimball, in “What’s Wrong with ArgumentumAd Baculum?” (Argumentation, 2006) argues that dialogue-based models of rational argumentation do not satisfactorily account for what is objectionable about more malicious uses of threats encountered in some ad baculum arguments. We review the dialogue-based approach to argumentum ad baculum, and show how it can offer more than Kimball thinks for analyzing such threat arguments and ad baculum fallacies.
    Download  
     
    Export citation  
     
    Bookmark  
  30.  74
    AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):76-83.
    Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, presenting substantial dangers to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  84
    Bodies Under Threat: Trauma and Motivated Ignorance.Karyn L. Freedman - 2023 - Apa Studies on Feminism and Philosophy 23 (1):14-22.
    Download  
     
    Export citation  
     
    Bookmark  
  32. Rebellious youth and ineffective advice: A study of Vietnamese adolescents’ capability to deal with digital threats.Quan-Hoang Vuong, Quang-Loc Nguyen, Trung Tran, Hoang Phuoc-Hien Le, Viet-Phuong La, Tam-Tri Le & Minh-Hoang Nguyen - manuscript
    The digital era brings various benefits to adolescents. However, operating on the digital environment without sufficient knowledge and skills will expose them to multiple types of risks, especially in the country with low digital safety education rate like Vietnam. The current study examines factors that can contribute to cultivating adolescents’ digital resilience using the information-processing reasoning of the Mindsponge Theory. A UNESCO dataset of 1061 Vietnamese high school students was analyzed using the Bayesian Mindsponge Framework analytics. It is found that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Defusing Existential and Universal Threats to Compatibilism: A Strawsonian Dilemma for Manipulation Arguments.Andrew J. Latham & Hannah Tierney - 2022 - Journal of Philosophy 119 (3):144-161.
    Many manipulation arguments against compatibilism rely on the claim that manipulation is relevantly similar to determinism. But we argue that manipulation is nothing like determinism in one relevant respect. Determinism is a "universal" phenomenon: its scope includes every feature of the universe. But manipulation arguments feature cases where an agent is the only manipulated individual in her universe. Call manipulation whose scope includes at least one but not all agents "existential manipulation." Our responsibility practices are impacted in different ways by (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  34. An Idle Threat: Epiphenomenalism Exposed.Paul Raymont - 1999 - Dissertation, University of Toronto
    In this doctoral dissertation I consider, and reject, the claim that recent varieties of non-reductive physicalism, particularly Donald Davidson's anomalous monism, are committed to a new kind of epiphenomenalism. Non-reductive physicalists identify each mental event with a physical event, and are thus entitled to the belief that mental events are causes, since the physical events with which they are held to be identical are causes. However, Jaegwon Kim, Ernest Sosa and others have argued that if we follow the non-reductive physicalist (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Democratic Obligations and Technological Threats to Legitimacy: PredPol, Cambridge Analytica, and Internet Research Agency.Alan Rubel, Clinton Castro & Adam Pham - 2021 - In Alan Rubel, Clinton Castro & Adam Pham (eds.), Algorithms and Autonomy: The Ethics of Automated Decision Systems. Cambridge University Press. pp. 163-183.
    ABSTRACT: So far in this book, we have examined algorithmic decision systems from three autonomy-based perspectives: in terms of what we owe autonomous agents (chapters 3 and 4), in terms of the conditions required for people to act autonomously (chapters 5 and 6), and in terms of the responsibilities of agents (chapter 7). -/- In this chapter we turn to the ways in which autonomy underwrites democratic governance. Political authority, which is to say the ability of a government to exercise (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  36. Gene Editing, the Mystic Threat to Human Dignity.Vera Lúcia Raposo - 2019 - Journal of Bioethical Inquiry 16 (2):249-257.
    Many arguments have been made against gene editing. This paper addresses the commonly invoked argument that gene editing violates human dignity and is ultimately a subversion of human nature. There are several drawbacks to this argument. Above all, the concept of what human dignity means is unclear. It is not possible to condemn a practice that violates human dignity if we do not know exactly what is being violated. The argument’s entire reasoning is thus undermined. Analyses of the arguments involved (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  37. Justifying Defense Against Non-Responsible Threats and Justified Aggressors: the Liability vs. the Rights-Infringement Account.Uwe Steinhoff - 2016 - Philosophia 44 (1):247-265.
    Even among those who find lethal defense against non-responsible threats, innocent aggressors, or justified aggressors justified even in one to one cases, there is a debate as to what the best explanation of this permissibility is. The contenders in this debate are the liability account, which holds that the non-responsible or justified human targets of the defensive measures are liable to attack, and the justified infringement account, which claims that the targets retain their right not to be attacked but (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  38. Cyber-Threats: Anticipation & Strategic Management, SciencesPo, 24h, 2023.Jan Stoermann & Jean Langlois-Berthelot - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  39. Minimizing the threat of a positive majority deficit in two-tier voting systems with equipopulous units.Claus Beisbart & Luc Bovens - 2013 - Public Choice 132 (1-2):75-94.
    The mean majority deficit in a two-tier voting system is a function of the partition of the population. We derive a new square-root rule: For odd-numbered population sizes and equipopulous units the mean majority deficit is maximal when the member size of the units in the partition is close to the square root of the population size. Furthermore, within the partitions into roughly equipopulous units, partitions with small even numbers of units or small even-sized units yield high mean majority deficits. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Mindsponge-based investigation into the non-linear effects of threat perception and trust on recycled water acceptance in Galicia and Murcia, Spain.Minh-Hoang Nguyen, Thi-Phuong Nguyen, Hong-Son Nguyen, Viet-Phuong La, Tam-Tri Le, Phuong-Loan Nguyen, Minh-Hieu Thi Nguyen & Quan-Hoang Vuong - 2023 - VMOST Journal of Social Sciences and Humanities 65 (1):3-10.
    The water scarcity crisis is becoming more severe across the globe and recycled water has been suggested as a feasible solution to the crisis. However, expanding the use of potable and recycled public water has been hindered by public acceptance. Previous studies suggest threat perception and trust of provided information have positive linear relationships with recycled water acceptance. However, given the complex filtering role of trust in the human mental process, we argue that the effects of threat perception and trust (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Pseudosciences: A new threat to the secular humanist project.Víctor García-Belaunde Velarde & Piero Gayozzo - 2023 - Desde El Sur 15 (2): e0026.
    Historically, secular humanism has been in conflict with religious thought in the academic and social spheres. This article supports the thesis that in modern times pseu-dosciences and pseudoscientific thinking are a threat to the humanist project, comparable to religious fundamen-talism. To prove it, the concept of Secular Humanism and how it is threatened by religious fundamentalism is explai-ned. This is followed by the definition of what pseudos-ciences are and what pseudoscientific thinking is. Subse-quently, the way how pseudosciences threaten the secular (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Kant, Real Possibility, and the Threat of Spinoza.Andrew Chignell - 2012 - Mind 121 (483):635-675.
    In the first part of the paper I reconstruct Kant’s proof of the existence of a ‘most real being’ while also highlighting the theory of modality that motivates Kant’s departure from Leibniz’s version of the proof. I go on to argue that it is precisely this departure that makes the being that falls out of the pre-critical proof look more like Spinoza’s extended natura naturans than an independent, personal creator-God. In the critical period, Kant seems to think that transcendental idealism (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  43. Wireless Network Security: Challenges, Threats and Solutions. A Critical Review.Lusekelo Kibona & Hassana Ganame - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 4 (2):19-26.
    Abstract: Wireless security is the avoidance of unlawful access or impairment to computers using wireless networks. Securing wireless network has been a research in the past two decades without coming up with prior solution to which security method should be employed to prevent unlawful access of data. The aim of this study was to review some literatures on wireless security in the areas of attacks, threats, vulnerabilities and some solutions to deal with those problems. It was found that attackers (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. (1 other version)Artificial intelligence crime: an interdisciplinary analysis of foreseeable threats and solutions.Thomas C. King, Nikita Aggarwal, Mariarosaria Taddeo & Luciano Floridi - 2019 - Science and Engineering Ethics 26 (1):89-120.
    Artificial intelligence research and regulation seek to balance the benefits of innovation against any potential harms and disruption. However, one unintended consequence of the recent surge in AI research is the potential re-orientation of AI technologies to facilitate criminal acts, term in this article AI-Crime. AIC is theoretically feasible thanks to published experiments in automating fraud targeted at social media users, as well as demonstrations of AI-driven manipulation of simulated markets. However, because AIC is still a relatively young and inherently (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  45. (1 other version)The Threat of Solipsism: Wittgenstein and Cavell on Meaning, Skepticism, and Finitude Jonadas Techio, De Gruyter 2021. [REVIEW]Guido Tana - 2023 - History of Philosophy & Logical Analysis 26 (1):160-169.
    Download  
     
    Export citation  
     
    Bookmark  
  46. Terrorism, Security, and the Threat of Counterterrorism.Jessica Wolfendale - 2007 - Studies in Conflict and Terrorism 30 (1):75-93.
    Download  
     
    Export citation  
     
    Bookmark  
  47. (1 other version)Science, biases, and the threat of global pessimism.K. Brad Wray - 2001 - Proceedings of the Philosophy of Science Association 2001 (3):S467-.
    Philip Kitcher rejects the global pessimists' view that the conclusions reached in inquiry are determined by the interests of some segment of the population, arguing that only some inquiries, for example, inquiries into race and gender, are adversely affected by interests. I argue that the biases Kitcher believes affect such inquiries are operative in all domains, but the prevalence of such biases does not support global pessimism. I argue further that in order to address the global pessimists' concerns, the scientific (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  48. Depression’s Threat to Self-Governance.August Gorman - 2020 - Social Theory and Practice 46 (2):277-297.
    Much of the literature on impairment to self-governance focuses on cases in which a person either lacks the ability to protect herself from errant urges or cases in which a person lacks the capacity to initiate self-reflective agential processes. This has led to frameworks for thinking about self-governance designed with only the possibility of these sorts of impairments in mind. I challenge this orthodoxy using the case of melancholic depression to show that there is a third way that self-governance can (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  49. Testimonial Knowledge and Context-Sensitivity: a New Diagnosis of the Threat.Alex Davies - 2019 - Acta Analytica 34 (1):53-69.
    Epistemologists typically assume that the acquisition of knowledge from testimony is not threatened at the stage at which audiences interpret what proposition a speaker has asserted. Attention is instead typically paid to the epistemic status of a belief formed on the basis of testimony that it is assumed has the same content as the speaker’s assertion. Andrew Peet has pioneered an account of how linguistic context sensitivity can threaten the assumption. His account locates the threat in contexts in which an (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  50. The Solution to the Real Blackmail Paradox: The Common Link Between Blackmail and Other Criminal Threats.Ken Levy - 2007 - Connecticut Law Review 39:1051-1096.
    Disclosure of true but reputation-damaging information is generally legal. But threats to disclose true but reputation-damaging information unless payment is made are generally criminal. Many scholars think that this situation is paradoxical because it seems to involve illegality mysteriously arising out of legality, a criminal act mysteriously arising out of an independently legal threat to disclose conjoined with an independently legal demand for money. -/- But this formulation is not quite right. The real paradox raised by the different legal (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 921