Results for 'Securities Exchange Act 1934'

984 found
Order:
  1. The home-made bombing at the marathon races in Boston, Massachusetts.Sally Ramage - 2015 - Current Criminal Law 7 (3):02-64.
    This paper covers the home-made bombing used at the 2013 Boston Marathon annual races even though we knew before the trial began that the verdict will have to be 'guilty' because the people of Boston demanded that verdict and received the first lap of the verdict on 8 April 2015. Neither beautiful technical rulings nor breaches of prosecution disclosure rules nor metadata queries nor tampered evidence would have held sway at this trial.
    Download  
     
    Export citation  
     
    Bookmark  
  2. Free will as involving determination and inconceivable without it.R. E. Hobart - 1934 - Mind 43 (169):1-27.
    The thesis of this article is that there has never been any ground for the controversy between the doctrine of free will and determinism, that it is based upon a misapprehension, that the two assertions are entirely consistent, that one of them strictly implies the other, that they have been opposed only because of our natural want of the analytical imagination. In so saying I do not tamper with the meaning of either phrase. That would be unpardonable. I mean free (...)
    Download  
     
    Export citation  
     
    Bookmark   141 citations  
  3. STOPPING CORPORATE WRONGS.Peter Bowden - 2010 - Australian Journal Professional and Applied Ethics 12 (1&2):55-69.
    The corporate meltdowns of this and the previous decade in the US - WorldCom, Enron, Tyco, and in Australia - FAI, HIH and AWB being among the many examples - have resulted in the governments of those two countries introducing legislation and policy guidelines aimed at minimising future corporate misbehaviour. -/- The US has introduced the Sarbanes Oxley Act, with requirements on corporate accountants and auditors, as well as its whistleblowing provisions. It has revised the Federal Sentencing Guidelines for Organizations. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. A (Moral) Prisoner's Dilemma: Character Ethics and Plea Bargaining.Andrew Ingram - 2013 - Ohio State Journal of Criminal Law 11 (1):161-177.
    Plea bargains are the stock-in-trade of the modern American prosecutor’s office. The basic scenario, wherein a defendant agrees to plea guilty in exchange for a reduced sentence, is familiar to viewers of police procedurals. In an equally famous variation on the theme, the prosecutor requests something more than an admission of guilt: leniency will only be forthcoming if the defendant is willing to cooperate with the prosecutor in securing the conviction of another suspect. In some of these cases, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. The Ethics of International Sanctions: The Case of Yugoslavia.Jovan Babić & Aleksandar Jokic - 2000 - Fletcher Forum of World Affairs (no. 2):107-119.
    Sanctions such as those applied by the United Nations against Yugoslavia, or rather the actions of implementing and maintaining them, at the very least implicitly purport to have moral justification. While the rhetoric used to justify sanctions is clearly moralistic, even sanctions themselves, as worded, often include phrases indicating moral implication. On May 30, 1992, United Nation Security Council Resolution 757 imposed a universal, binding blockage on all trade and all scientific, cultural and sports exchanges with Serbia and Montenegro. In (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as morally important—for example, when (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  8. The Metaphysics of Economic Exchanges.Massin Olivier & Tieffenbach Emma - 2017 - Journal of Social Ontology 3 (2):167-205.
    What are economic exchanges? The received view has it that exchanges are mutual transfers of goods motivated by inverse valuations thereof. As a corollary, the standard approach treats exchanges of services as a subspecies of exchanges of goods. We raise two objections against this standard approach. First, it is incomplete, as it fails to take into account, among other things, the offers and acceptances that lie at the core of even the simplest cases of exchanges. Second, it ultimately fails to (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  9. Monitoring Peace and Security Mandates for Human Rights.Deepa Kansra - 2022 - Artha: The Sri Ram Economics Journal 1 (1):188-192.
    The jurisprudence under international human rights treaties has had a considerable impact across countries. Known for addressing complex agendas, the work of expert bodies under the treaties has been credited and relied upon for filling the gaps in the realization of several objectives, including the peace and security agenda. -/- In 1982, the Human Rights Committee (ICCPR), in a General Comment observed that “states have the supreme duty to prevent wars, acts of genocide and other acts of mass violence ... (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Speech acts and medical records: The ontological nexus.Lowell Vizenor & Barry Smith - 2004 - In Jana Zvárová (ed.), Proceedings of the International Joint Meeting EuroMISE 2004.
    Despite the recent advances in information and communication technology that have increased our ability to store and circulate information, the task of ensuring that the right sorts of information gets to the right sorts of people remains. We argue that the many efforts underway to develop efficient means for sharing information across healthcare systems and organizations would benefit from a careful analysis of human action in healthcare organizations. This in turn requires that the management of information and knowledge within healthcare (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. The Construction of Social Reality: An Exchange.Barry Smith & John Searle - 2003 - American Journal of Economics and Sociology 62 (2):285-309.
    Part 1 of this exchange consists in a critique by Smith of Searle’s The Construction of Social Reality focusing on Searle’s use of the formula ‘X counts as Y in context C’. Smith argues that this formula works well for social objects such as dollar bills and presidents where the corresponding X terms (pieces of paper, human beings) are easy to identify. In cases such as debts and prices and money in a bank's computers, however, the formula fails, because (...)
    Download  
     
    Export citation  
     
    Bookmark   52 citations  
  12. The European PNR Directive as an Instance of Pre-emptive, Risk-based Algorithmic Security and Its Implications for the Regulatory Framework.Elisa Orrù - 2022 - Information Polity 27 (Special Issue “Questioning Moder):131-146.
    The Passenger Name Record (PNR) Directive has introduced a pre-emptive, risk-based approach in the landscape of European databases and information exchange for security purposes. The article contributes to ongoing debates on algorithmic security and data-driven decision-making by fleshing out the specific way in which the EU PNR-based approach to security substantiates core characteristics of algorithmic regulation. The EU PNR framework appropriates data produced in the commercial sector for generating security-related behavioural predictions and does so in a way that gives (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Autonomous Weapons Systems, the Frame Problem and Computer Security.Michał Klincewicz - 2015 - Journal of Military Ethics 14 (2):162-176.
    Unlike human soldiers, autonomous weapons systems are unaffected by psychological factors that would cause them to act outside the chain of command. This is a compelling moral justification for their development and eventual deployment in war. To achieve this level of sophistication, the software that runs AWS will have to first solve two problems: the frame problem and the representation problem. Solutions to these problems will inevitably involve complex software. Complex software will create security risks and will make AWS critically (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  14. Sociolinguistic variation, slurs, and speech acts.Ethan Nowak - forthcoming - Journal of Philosophy.
    In this paper, I argue that the ‘social meanings’ associated with sociolinguistic variation put pressure on the standard philosophical conception of language, according to which the foremost thing we do with words is exchange information. Drawing on parallels with the explanatory challenge posed by slurs and pejoratives, I argue that the best way to understand social meanings is to think of them in speech act theoretic terms. I develop a distinctive form of pluralism about the performances realized by means (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  15. The Role of Information Technology in Enhancing National Security in Nigeria (2001 -2020).E. Offiong Ekwutosi, Eke Nta Effiong & Etim Bassey Inyang - 2021 - Pinisi Journal of Art, Humanity and Social Studies 1 (1):44-53.
    The security problems of Nigeria have continued to stare at her very ominously and intermittently harass her, both within and outside her shores. These have lingered on and have created a clog on the wheel of the country's progress, indeed dramatically stagnating, and to say the least, truncating the mainstay of the country's survival. Several interpretations, theories, analyses, syntheses, and jingoistic conceptualization have been propagated, all producing the same result. From scientific to technological approach, religious to ritualist approach, political to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Matters of Trust as Matters of Attachment Security.Andrew Kirton - 2020 - International Journal of Philosophical Studies 28 (5):583-602.
    I argue for an account of the vulnerability of trust, as a product of our need for secure social attachments to individuals and to a group. This account seeks to explain why it is true that, when we trust or distrust someone, we are susceptible to being betrayed by them, rather than merely disappointed or frustrated in our goals. What we are concerned about in matters of trust is, at the basic level, whether we matter, in a non-instrumental way, to (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  17. Reasons for action: making a difference to the security of outcomes.Mattias Gunnemyr & Caroline Torpe Touborg - 2022 - Philosophical Studies 180 (1):333-362.
    In this paper, we present a new account of teleological reasons, i.e. reasons to perform a particular action because of the outcomes it promotes. Our account gives the desired verdict in a number of difficult cases, including cases of overdetermination and non-threshold cases like Parfit’s famous _Drops of water._ The key to our account is to look more closely at the metaphysics of causation. According to Touborg (_The dual nature of causation_, 2018), it is a necessary condition for causation that (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  18. When Ecology Needs Economics and Economics Needs Ecology: Interdisciplinary Exchange during the Anthropocene.S. Andrew Inkpen & C. Tyler DesRoches - 2020 - Ethics, Policy and Environment 23 (2):203-221.
    Evidence that humans play a dominant role in most ecosystems forces scientists to confront systems that contain factors transgressing traditional disciplinary boundaries. However, it is an open question whether this state of affairs should encourage interdisciplinary exchange or integration. With two case studies, we show that exchange between ecologists and economists is preferable, for epistemological and policy-oriented reasons, to their acting independently. We call this “exchange gain.” Our case studies show that theoretical exchanges can be less disruptive (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19. The Reality of Digital Transformation in the Palestinian Ministry of Interior and National Security.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Management Science Research (IJAMSR) 6 (11):148-165.
    This study aimed to identify the reality of digital transformation in the Palestinian Ministry of Interior and National Security from the point of view of workers in computer and information technology units. ) employees, and the study tool (the questionnaire) was distributed, and the comprehensive survey method was used, where (61) questionnaires were retrieved with a percentage of (87.1%), and they were unloaded and analyzed using the statistical packages SPSS. The study reached several results, including: The availability of dimensions of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital transformation and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Moral Worth and Consciousness: In Defense of a Value-Secured Reliability Theory.John W. Robison - 2020 - Ergo: An Open Access Journal of Philosophy.
    What minimal role—if any—must consciousness of morally significant information play in an account of moral worth? According to one popular view, a right action is morally worthy only if the agent is conscious (in some sense) of the facts that make it right. I argue against this consciousness condition and close cousins of it. As I show, consciousness of such facts requires much more sophistication than writers typically suggest—this condition would bar from moral worth most ordinary, intuitively morally worthy agents. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Michael E. Bratman: Shared Agency: A Planning Theory of Acting Together: New York, Oxford University Press USA, 2014, ISBN: 978-0-190-933999-0, 240 pages, £ 19.99.Andras Szigeti - 2015 - Ethical Theory and Moral Practice 18 (5):1101-1104.
    If you have ever had to move house, you will know this: the worst part is the sofa. You cannot do it alone. Nor will it be enough for me to just lift one end waiting for you to lift the other. We will have to work together to get the job done. If spaces are tight, we will even have to find a practical solution to a tantalizing mathematical puzzle: the moving sofa problem.Joint actions like that are part and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. Improving the market for livestock production households to alleviate food insecurity in the Philippines.Minh-Phuong Thi Duong, Ni Putu Wulan Purnama Sari, Adrino Mazenda, Tam-Tri Le, Minh-Hoang Nguyen & Quan-Hoang Vuong - manuscript
    Food security is one of the major concerns in the Philippines. Although livestock and poultry production accounts for a significant proportion of the country’s agricultural output, smallholder households are still vulnerable to food insecurity. The current study aims to examine how livestock production and selling difficulties affect smallholder households’ food-insecure conditions. For this objective, Bayesian Mindsponge Framework (BMF) analytics was employed on a dataset of the Food and Agriculture Organization’s Data in Emergencies Monitoring (DIEM) system. We found that production and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. The Ontology of Documents.Barry Smith - 2011 - In Okada Mitsuhiro (ed.), Proceedings of the Conference on Ontology and Analytical Metaphysics, February 24-25, 2011. Keio University Press. pp. 1-6.
    As is well known, speech acts such as acts of promising can have ontological consequences. For example an act of promising can give rise to a mutually correlated claim and obligation. Increasingly, speech acts in the narrow sense are being augmented by the use of documents of multiple different sorts. In this paper we analyze the results of this augmenta-tion from the ontological point of view, considering especially the domains of law and com-merce. We show how document acts are not (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  25. Pragmatism, Idealism, and the Modal Menace: Rorty, Brandom, and Truths about Photons.Paul Redding - 2014 - The European Legacy 19 (2):174-186.
    In a short exchange published in 2000, Richard Rorty and Robert Brandom differed over the status of “facts” in a world containing no speakers and, hence, no speech acts. While Brandom wanted to retain the meaningfulness of talk of “facts” or “truths” about things—in this case truths about photons —in a world in which there could be no claimings about such things, Rorty denied the existence of any such “worldly items” as “facts.” In this essay the difference between Rorty (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  26. The Self and its Brain: An Argument for Interactionism.John C. Eccles & Karl Popper - 1977 - Routledge.
    The relation between body and mind is one of the oldest riddles that has puzzled mankind. That material and mental events may interact is accepted even by the law: our mental capacity to concentrate on the task can be seriously reduced by drugs. Physical and chemical processes may act upon the mind; and when we are writing a difficult letter, our mind acts upon our body and, through a chain of physical events, upon the mind of the recipient of the (...)
    Download  
     
    Export citation  
     
    Bookmark   469 citations  
  27. Transition to parenthood and intergenerational relationships: the ethical value of family memory.Monica Amadini - 2015 - Ethics and Education 10 (1):36-48.
    Inside the family, all individuals define their identity in relation to previous generations, the present ones, and the future ones. This intergenerational exchange plays important educational roles: it fosters a sense of belonging and identification, promotes dialogue, and guarantees the passing down of ethical orientations. In addition to feelings of security and reliance on others, family memory creates a matrix that gives people a placement in the world, a sort of existential code through which to be located in existence. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Umweltmanagement und Rationalität. Der Schatten von VW: Betrieblicher Umweltschutz auf dem Prüfstand.Kay Herrmann - 2017 - WiSt 4 (2017):47-49.
    Economic pressures, mounting environmental, security and health requirements, are all critical factors that shape economic action. With regard to environmental protection, an economic entity acting as homo oeconomicus finds himself in a situation resembling a prisoner’s dilemma. Signposts for a possible resolution of this dilemma include an environmental management system, a system of environmental law based on the principles of environmental ethics, and a new conception of human nature.
    Download  
     
    Export citation  
     
    Bookmark  
  29.  88
    Governing the Agent-to-Agent Economy of Trust via Progressive Decentralization.Tomer Jordi Chaffer - manuscript
    Current approaches to AI governance often fall short in anticipating a future where AI agents manage critical tasks, such as financial operations, administrative functions, and beyond. As AI agents may eventually delegate tasks among themselves to optimize efficiency, understanding the foundational principles of human value exchange could offer insights into how AI-driven economies might operate. Just as trust and value exchange are central to human interactions in open marketplaces, they may also be critical for enabling secure and efficient (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Anxiety, normative uncertainty, and social regulation.Charlie Kurth - 2016 - Biology and Philosophy 31 (1):1-21.
    Emotion plays an important role in securing social stability. But while emotions like fear, anger, and guilt have received much attention in this context, little work has been done to understand the role that anxiety plays. That’s unfortunate. I argue that a particular form of anxiety—what I call ‘practical anxiety’—plays an important, but as of yet unrecognized, role in norm-based social regulation. More specifically, it provides a valuable form of metacognition, one that contributes to social stability by helping individuals negotiate (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  31. Actual Control - Demodalising Free Will.David Heering - 2020 - Dissertation, University of Leeds
    Plausibly, agents act freely iff their actions are responses to reasons. But what sort of relationship between reason and action is required for the action to count as a response? The overwhelmingly dominant answer to this question is modalist. It holds that responses are actions that share a modally robust or secure relationship with the relevant reasons. This thesis offers a new alternative answer. It argues that responses are actions that can be explained by reasons in the right way. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Beyond Paper.David Koepsell & Barry Smith - 2014 - The Monist 97 (2):222–235.
    The authors outline the way in which documents as social objects have evolved from their earliest forms to the electronic documents of the present day. They note that while certain features have remained consistent, processes regarding document authentication are seriously complicated by the easy reproducibility of digital entities. The authors argue that electronic documents also raise significant questions concerning the theory of ‘documentality’ advanced by Maurizio Ferraris, especially given the fact that interactive documents seem to blur the distinctions between the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  33. (White) Tyranny and the Democratic Value of Distrust.Meena Krishnamurthy - 2015 - The Monist 98 (4):391-406.
    This paper makes an argument for the democratic value of distrust. It begins by analyzing distrust, since distrust is not merely the negation of trust. The account that it develops is based primarily on Martin Luther King Jr.’s work in Why We Can’t Wait. On this view, distrust is the confident belief that another individual or group of individuals or an institution will not act justly or as justice requires. It is a narrow normative account of distrust, since it concerns (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  34. The You-I event: on the genesis of self-awareness.Stephen Langfur - 2013 - Phenomenology and the Cognitive Sciences 12 (4):769-790.
    I present empirical evidence suggesting that an infant first becomes aware of herself as the focal center of a caregiver's attending. Yet that does not account for her awareness of herself as agent. To address this question, I bring in research on neonatal imitation, as well as studies demonstrating the existence of a neural system in which parts of the same brain areas are activated when observing another's action and when executing a similar one. Applying these findings, I consider gestural (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  35.  70
    An inferentialist account of lying.Kamil Lemanek - 2025 - Synthese 205 (2):1-13.
    The inferentialism due to Robert Brandom presents a compelling normative-deontic picture of language and discursive practices, and as such it is well positioned to address phenomena like lying. This short work outlines a simple account of how lying can be conceptualized within that framework. To that end, the basic Brandomian position is extended to include a novel type of status – namely, pseudo-commitments, which are unique in their being non-binding. The traditional definition of lying is then given a status-oriented form, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Transparency is Surveillance.C. Thi Nguyen - 2021 - Philosophy and Phenomenological Research 105 (2):331-361.
    In her BBC Reith Lectures on Trust, Onora O’Neill offers a short, but biting, criticism of transparency. People think that trust and transparency go together but in reality, says O'Neill, they are deeply opposed. Transparency forces people to conceal their actual reasons for action and invent different ones for public consumption. Transparency forces deception. I work out the details of her argument and worsen her conclusion. I focus on public transparency – that is, transparency to the public over expert domains. (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  37. Communication, Cooperation and Conflict.Steffen Borge - 2012 - ProtoSociology 29:223-241.
    According to Steven Pinker and his associates the cooperative model of human communication fails, because evolutionary biology teaches us that most social relationships, including talk-exchange, involve combinations of cooperation and conflict. In particular, the phenomenon of the strategic speaker who uses indirect speech in order to be able to deny what he meant by a speech act (deniability of conversational implicatures) challenges the model. In reply I point out that interlocutors can aim at understanding each other (cooperation), while being (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Blame as participant anger: Extending moral claimant competence to young children and nonhuman animals.Dorna Behdadi - 2024 - Philosophical Psychology:1-24.
    Following the social conception of moral agency, this paper claims that many beings commonly exempted from moral responsibility, like young children, adults with late-stage dementia, and nonhuman animals, may nevertheless qualify as participants in moral responsibility practices. Blame and other moral responsibility responses are understood according to the communicative emotion account of the reactive attitudes. To blame someone means having an emotion episode that acts as a vehicle for conveying a particular moral content. Therefore, moral agency is argued to be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  97
    Technosocial disruption, enactivism, & social media: On the overlooked risks of teenage cancel culture.Janna Bertchen Van Grunsven & Lavinia Marin - 2024 - Technology in Society 78.
    In a world undergoing rapid, large-scale technological change, the phenomenon of technosocial disruption is receiving increasing scholarly and societal attention. While the phenomenon is most actively delineated in philosophy of technology, it is also receiving growing attention within a different area of philosophy, namely the so-called “4E Cognition” approach to philosophy of mind. Despite this shared interest in technosocial disruption, there is relatively little exchange between the theorizing going on in these two different areas of philosophy. One of our (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Political Legitimacy, Authoritarianism, and Climate Change.Ross Mittiga - forthcoming - American Political Science Review.
    Is authoritarian power ever legitimate? The contemporary political theory literature—which largely conceptualizes legitimacy in terms of democracy or basic rights—would seem to suggest not. I argue, however, that there exists another, overlooked aspect of legitimacy concerning a government’s ability to ensure safety and security. While, under normal conditions, maintaining democracy and rights is typically compatible with guaranteeing safety, in emergency situations, conflicts between these two aspects of legitimacy can and often do arise. A salient example of this is the COVID-19 (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  41. Trustworthy use of artificial intelligence: Priorities from a philosophical, ethical, legal, and technological viewpoint as a basis for certification of artificial intelligence.Jan Voosholz, Maximilian Poretschkin, Frauke Rostalski, Armin B. Cremers, Alex Englander, Markus Gabriel, Hecker Dirk, Michael Mock, Julia Rosenzweig, Joachim Sicking, Julia Volmer, Angelika Voss & Stefan Wrobel - 2019 - Fraunhofer Institute for Intelligent Analysis and Information Systems Iais.
    This publication forms a basis for the interdisciplinary development of a certification system for artificial intelligence. In view of the rapid development of artificial intelligence with disruptive and lasting consequences for the economy, society, and everyday life, it highlights the resulting challenges that can be tackled only through interdisciplinary dialogue between IT, law, philosophy, and ethics. As a result of this interdisciplinary exchange, it also defines six AI-specific audit areas for trustworthy use of artificial intelligence. They comprise fairness, transparency, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Beyond moral fundamentalism.Steven Fesmire - 2024 - New York, NY: Oxford University Press.
    Moral fundamentalism is the habit of acting as though one has access to the exclusively right way to diagnose problems, along with the single approvable practical solution to any particular problem. This approach causes us to oversimplify situations, neglect broader context, take refuge in dogmatic absolutes, ignore possibilities for finding common ground, assume privileged access to the right way to proceed, and shut off honest inquiry. In this way, moral fundamentalism-exacerbated by social media silos-also makes the worst of native impulses (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  43. Organ Markets and Disrespectful Demands.Simon Rippon - 2017 - International Journal of Applied Philosophy 31 (2):119-136.
    There is a libertarian argument for live donor organ markets, according to which live donor organ markets would be permitted if we simply refrained from imposing any substantive and controversial moral assumptions on people who reasonably disagree about morality and justice. I argue that, to the contrary, this endorsement of live donor organ markets depends upon the libertarians’ adoption of a substantive and deeply controversial conception of strong, extensive property rights. This is shown by the fact that these rights would (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  44. Testimonial entitlement, norms of assertion and privacy.Philip J. Nickel - 2013 - Episteme 10 (2):207-217.
    According to assurance views of testimonial justification, in virtue of the act of testifying a speaker provides an assurance of the truth of what she asserts to the addressee. This assurance provides a special justificatory force and a distinctive normative status to the addressee. It is thought to explain certain asymmetries between addressees and other unintended hearers (bystanders and eavesdroppers), such as the phenomenon that the addressee has a right to blame the speaker for conveying a falsehood but unintended hearers (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  45. Ontology of common sense geographic phenomena: Foundations for interoperable multilingual geospatial databases.David M. Mark, Barry Smith & Berit Brogaard - 2000 - In Mark David M., Smith Barry & Berit Brogaard-Pedersen (eds.), 3rd AGILE Conference on Geographic Information Science. pp. 32-34.
    Information may be defined as the conceptual or communicable part of the content of mental acts. The content of mental acts includes sensory data as well as concepts, particular as well as general information. An information system is an external (non-mental) system designed to store such content. Information systems afford indirect transmission of content between people, some of whom may put information into the system and others who are among those who use the system. In order for communication to happen, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Business and Bleeding Hearts.Tadhg Ó Laoghaire - 2024 - Global Justice: Theory Practice Rhetoric 14 (1):124-150.
    When it comes to fulfilling our basic duties to distant others, we in the affluent world face a motivation gap; we consistently fall short of bearing even moderate costs for the sake of helping others secure basic minimums to which they are entitled. One response to the motivation gap is to cultivate in affluent populations a greater concern for distant others; cultivating such concern is the goal of ‘sentimental cosmopolitanism’. Two approaches to sentimental cosmopolitanism currently dominate the literature, a compassion-based (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Rules, Rights, and Hedges.John Schwenkler & Marshall Bierson - forthcoming - Ergo: An Open Access Journal of Philosophy.
    One is sometimes, but only sometimes, justified in pursuing a suboptimal course of action due to a concern that, in attempting the ideal course, one might fail to follow through and so make the situation even worse. This paper explains why such hedging is sometimes justified and sometimes not. -/- The explanation we offer relies on Elizabeth Anscombe’s distinction between reasons and logoi. Reasons are normative considerations that identify something good or bad that an act will secure or avoid, while (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. The Relatively Infinite Value of the Environment.Paul Bartha & C. Tyler DesRoches - 2017 - Australasian Journal of Philosophy 95 (2):328-353.
    Some environmental ethicists and economists argue that attributing infinite value to the environment is a good way to represent an absolute obligation to protect it. Others argue against modelling the value of the environment in this way: the assignment of infinite value leads to immense technical and philosophical difficulties that undermine the environmentalist project. First, there is a problem of discrimination: saving a large region of habitat is better than saving a small region; yet if both outcomes have infinite value, (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  49. Uneasiness and Scarcity: An Analytic Approach Towards Ludwig von Mises’s Praxeology.Michael Oliva Córdoba - 2017 - Axiomathes 27 (5):521-529.
    Adam Smith said that ‘the propensity to truck, barter and exchange one thing for another is common to all men, and to be found in no other race of animals.’ Smith addressed the mark of the man economical, and there is no denying that this is the peculiar way he acts: clearly, to truck, barter and exchange is to act in a certain way. Austrian economics adopts this way of looking at the realm of economics. It prides itself (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. Historical Citation and Revolutionary Epistemology.Alison Ross - 2015 - Journal of the Philosophy of History 9 (2):258-283.
    This article defends the thesis that there are multiple points of exchange between the categories of “word” and “image” in Walter Benjamin’s Arcades Project. Benjamin describes the truth of the articulate wish of the past as “graphically perceptible” and the image as “readable.” In this respect the vocabulary of “word” and “image” that Benjamin’s early work had opposed are not just deployed in concert, but specific features of the vocabulary of “word” and “image” become exchangeable. The distinctive features of (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 984