Results for 'Stephanie M. Jones'

952 found
Order:
  1. Chimpanzee Rights: The Philosophers' Brief.Kristin Andrews, Gary Comstock, G. K. D. Crozier, Sue Donaldson, Andrew Fenton, Tyler John, L. Syd M. Johnson, Robert Jones, Will Kymlicka, Letitia Meynell, Nathan Nobis, David M. Pena-Guzman & Jeff Sebo - 2018 - London: Routledge.
    In December 2013, the Nonhuman Rights Project (NhRP) filed a petition for a common law writ of habeas corpus in the New York State Supreme Court on behalf of Tommy, a chimpanzee living alone in a cage in a shed in rural New York (Barlow, 2017). Under animal welfare laws, Tommy’s owners, the Laverys, were doing nothing illegal by keeping him in those conditions. Nonetheless, the NhRP argued that given the cognitive, social, and emotional capacities of chimpanzees, Tommy’s confinement constituted (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  2.  87
    PINK DOESN’T MEAN WEAK: UNVEILING THE TRIUMPHS AND CHALLENGES OF WOMEN ENTREPRENEURS IN BALAYAN, BATANGAS.Jessrell Elaine B. Cerrado, Jhian Carl Q. Arquileta, John Mark B. Barsaga, Mirko G. Dastas, Frank D. Mendoza, Sean Jacob B. Relacion, Princess Joy M. Banaag, Faith Cedwin Louis E. Belarmino, Stephanie M. Concepcion, Irish Kate C. De Castro, Jerseys Eanne C. Javier, Princess Erica O. Quizzagan, Lyra Gynera L. Villanobo & Jowenie A. Mangarin - 2024 - Get International Research Journal 2 (2):126-148.
    The world of entrepreneurship has historically been linked with taking risks and the potential for significant rewards. However, there persists a notable gender imbalance in the entrepreneurial landscape, wherein women entrepreneurs remain a minority. Women navigating the entrepreneurial path encounter distinct challenges, setting their experiences apart from their male counterparts. In Balayan, Batangas, despite strides towards gender equality, women entrepreneurs continue to face challenges in the entrepreneurial landscape. This qualitative study delves into the experiences of 10 successful female entrepreneurs who (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. The Philosophers' Brief on Chimpanzee Personhood.Kristin Andrews, Gary Comstock, Gillian Crozier, Sue Donaldson, Andrew Fenton, Tyler John, L. Syd M. Johnson, Robert Jones, Will Kymlicka, Letitia Meynell, Nathan Nobis, David Pena-Guzman, James Rocha, Bernard Rollin, Jeff Sebo, Adam Shriver & Rebecca Walker - 2018 - Proposed Brief by Amici Curiae Philosophers in Support of the Petitioner-Appelllant Court of Appeals, State of New York,.
    In this brief, we argue that there is a diversity of ways in which humans (Homo sapiens) are ‘persons’ and there are no non-arbitrary conceptions of ‘personhood’ that can include all humans and exclude all nonhuman animals. To do so we describe and assess the four most prominent conceptions of ‘personhood’ that can be found in the rulings concerning Kiko and Tommy, with particular focus on the most recent decision, Nonhuman Rights Project, Inc v Lavery.
    Download  
     
    Export citation  
     
    Bookmark  
  4. The Philosophers' Brief in Support of Happy's Appeal.Gary Comstock, Sue Donaldson, Andrew Fenton, Tyler M. John, L. Syd M. Johnson, Robert C. Jones, Will Kymlicka, Letitia M. Meynell, Nathan Nobis, David M. Peña-Guzmán, James Rocha, Bernard Rollin, Jeff Sebo & Adam Shriver - 2021 - New York State Appellate Court.
    We submit this brief in support of the Nonhuman Rights Project’s efforts to secure habeas corpus relief for the elephant named Happy. The Supreme Court, Bronx County, declined to grant habeas corpus relief and order Happy’s transfer to an elephant sanctuary, relying, in part, on previous decisions that denied habeas relief for the NhRP’s chimpanzee clients, Kiko and Tommy. Those decisions use incompatible conceptions of ‘person’ which, when properly understood, are either philosophically inadequate or, in fact, compatible with Happy’s personhood.
    Download  
     
    Export citation  
     
    Bookmark  
  5. A matter of trust: : Higher education institutions as information fiduciaries in an age of educational data mining and learning analytics.Kyle M. L. Jones, Alan Rubel & Ellen LeClere - forthcoming - JASIST: Journal of the Association for Information Science and Technology.
    Higher education institutions are mining and analyzing student data to effect educational, political, and managerial outcomes. Done under the banner of “learning analytics,” this work can—and often does—surface sensitive data and information about, inter alia, a student’s demographics, academic performance, offline and online movements, physical fitness, mental wellbeing, and social network. With these data, institutions and third parties are able to describe student life, predict future behaviors, and intervene to address academic or other barriers to student success (however defined). Learning (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  6. Data Analytics in Higher Education: Key Concerns and Open Questions.Alan Rubel & Kyle M. L. Jones - 2017 - University of St. Thomas Journal of Law and Public Policy 1 (11):25-44.
    “Big Data” and data analytics affect all of us. Data collection, analysis, and use on a large scale is an important and growing part of commerce, governance, communication, law enforcement, security, finance, medicine, and research. And the theme of this symposium, “Individual and Informational Privacy in the Age of Big Data,” is expansive; we could have long and fruitful discussions about practices, laws, and concerns in any of these domains. But a big part of the audience for this symposium is (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for assessment (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  8. Drones and Dirty Hands.Ben Jones & John M. Parrish - 2016 - In Kerstin Fisk & Jennifer M. Ramos (eds.), Preventive Force: Drones, Targeted Killings, and the Transformation of Contemporary Warfare. New York University Press. pp. 283-312.
    The period known as the “War on Terror” has prompted a revival of interest in the idea of moral dilemmas and the problem of “dirty hands” in public life. Some contend that a policy of targeted killing of terrorist actors is (under specified but not uncommon circumstances) an instance of a dirty-handed moral dilemma – morally required yet morally forbidden, the least evil choice available in the circumstances, but one that nevertheless leaves an indelible moral stain on the character of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. The Temptation of Data-enabled Surveillance: Are Universities the Next Cautionary Tale?Alan Rubel & Kyle M. L. Jones - 2020 - Communications of the Acm 4 (63):22-24.
    There is increasing concern about “surveillance capitalism,” whereby for-profit companies generate value from data, while individuals are unable to resist (Zuboff 2019). Non-profits using data-enabled surveillance receive less attention. Higher education institutions (HEIs) have embraced data analytics, but the wide latitude that private, profit-oriented enterprises have to collect data is inappropriate. HEIs have a fiduciary relationship to students, not a narrowly transactional one (see Jones et al, forthcoming). They are responsible for facets of student life beyond education. In addition (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. How do medical device manufacturers' websites frame the value of health innovation? An empirical ethics analysis of five Canadian innovations.Pascale Lehoux, M. Hivon, Bryn Williams-Jones, Fiona A. Miller & David R. Urbach - 2012 - Medicine, Health Care and Philosophy 15 (1):61-77.
    While every health care system stakeholder would seem to be concerned with obtaining the greatest value from a given technology, there is often a disconnect in the perception of value between a technology’s promoters and those responsible for the ultimate decision as to whether or not to pay for it. Adopting an empirical ethics approach, this paper examines how five Canadian medical device manufacturers, via their websites, frame the corporate “value proposition” of their innovation and seek to respond to what (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. AWARENESS AND ACCEPTANCE OF BALAYEÑOS TOWARDS THE USE OF E- MONEY SYSTEMS.Aina Darlene B. Oñate, Patrick Paul R. Pacis, Michael M. Secreto, Renji Jones P. Villaranda, Mary Bernadette S. Sobrevilla & Jowenie A. Mangarin - 2024 - Get International Research Journal 2 (1):1–16.
    E-money systems have revolutionized global business transactions through digital payment methods. This quantitative correlational study aimed to assess the awareness and acceptance of e-money among individuals in Balayan, Batangas. Employing quota and purposive sampling, 100 participants aged 21 to 70 completed a survey questionnaire. Statistical analysis revealed that consumers were aware of e-money but lacked comprehensive knowledge. They acknowledged the convenience of e-money for online shopping and expense tracking. Age significantly influenced acceptance, while gender did not exhibit a similar effect. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Contextual Effects of Video Tutorials on The Academic Performance of STEM 12 Students.Sherry V. Mecida, Krisna Rika O. Barron, Henry I. I. E. Lemana, Andre Eldridge O. Oberez, Alraiza K. Sampulna, Sheryn Mae M. Huesca, Sabrie K. Bailan, Mike Jones E. Sajorga, Tristan Kyle O. Sarceda, Queenie Rose T. Teniero & Orczy Louis Edniel W. Baculi - 2023 - Universal Journal of Educational Research 2 (2):86-98.
    As schools publicly modernize in response to societal changes, additional teaching and learning methods are developed, observed, and used since learners have different learning styles that make it easier for them to grasp and retain the material. During the COVID-19 pandemic, teachers require different media to keep the classroom involved while presenting the lesson materials online, one of which is video tutorials. The purpose of this study was to analyze the extent of contextual effects of video tutorials used in general (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Resolving the Gettier Problem in the Smith Case: The Donnellan Linguistic Approach.Joseph Martin M. Jose & Mabaquiao Jr - 2018 - Kritike 12 (2):108-125.
    In this paper, we contend that the “Smith case” in Gettier’s attempt to refute the justified true belief (JTB) account of knowledge does not work. This is because the said case fails to satisfy the truth condition, and thus is not a case of JTB at all. We demonstrate this claim using the framework of Donnellan’s distinction between the referential and attributive uses of definite descriptions. Accordingly, the truth value of Smith’s proposition “The man who will get the job has (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Against Cumulative Type Theory.Tim Button & Robert Trueman - 2022 - Review of Symbolic Logic 15 (4):907-49.
    Standard Type Theory, STT, tells us that b^n(a^m) is well-formed iff n=m+1. However, Linnebo and Rayo have advocated the use of Cumulative Type Theory, CTT, has more relaxed type-restrictions: according to CTT, b^β(a^α) is well-formed iff β > α. In this paper, we set ourselves against CTT. We begin our case by arguing against Linnebo and Rayo’s claim that CTT sheds new philosophical light on set theory. We then argue that, while CTT ’s type-restrictions are unjustifiable, the type-restrictions imposed by (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  15. Gametogênese Animal: Espermatogênese e Ovogênese.Emanuel Isaque Cordeiro da Silva - manuscript
    GAMETOGÊNESE -/- Emanuel Isaque Cordeiro da Silva Instituto Agronômico de Pernambuco Departamento de Zootecnia – UFRPE Embrapa Semiárido -/- • _____OBJETIVO -/- Os estudantes bem informados, estão a buscando conhecimento a todo momento. O estudante de Veterinária e Zootecnia, sabe que a Reprodução é uma área de primordial importância para sua carreira. Logo, o conhecimento da mesma torna-se indispensável. No primeiro trabalho da série fisiologia reprodutiva dos animais domésticos, foi abordado de forma clara, didática e objetiva os mecanismos de diferenciação (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Manejo na Avicultura: Postura, Iluminação e Incubação dos Ovos.Emanuel Isaque Cordeiro da Silva - manuscript
    MANEJO NA AVICULTURA: POSTURA, ILUMINAÇÃO E INCUBAÇÃO DOS OVOS -/- MANAGEMENT IN POULTRY: POSTURE, ILUMINATION AND INCUBATION OF THE EGGS -/- 1. INTRODUÇÃO A produção de ovos no Brasil está próxima de 45 bilhões de unidades por ano, mantendo um desenvolvimento constante em todos os seus aspectos: genética, instalações, patologia, alimentação, etc. Ao longo do presente trabalho, pretende-se estabelecer os conceitos que estão ligados à produção de ovos, distribuição de ovoprodutos e refletir as ideias básicas sobre os programas de iluminação (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Apparent mental causation: Sources of the experience of will.Daniel M. Wegner & T. Wheatley - 1999 - American Psychologist 54:480-492.
    Download  
     
    Export citation  
     
    Bookmark   251 citations  
  18. Misgendering and its Moral Contestability.Kapusta Stephanie - 2016 - Hypatia 31 (3):512-519.
    In this article, I consider the harms inflicted upon transgender persons through “misgendering,” that is, such deployments of gender terms that diminish transgender persons’ selfrespect, limit the discursive resources at their disposal to define their own gender, and cause them microaggressive psychological harms. Such deployments are morally contestable, that is, they can be challenged on ethical or political grounds. Two characterizations of “woman” proposed in the feminist literature are critiqued from this perspective. When we consider what would happen to transgender (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  19. When data drive health: an archaeology of medical records technology.Colin Koopman, Paul D. G. Showler, Patrick Jones, Mary McLevey & Valerie Simon - 2022 - Biosocieties 17 (4):782-804.
    Medicine is often thought of as a science of the body, but it is also a science of data. In some contexts, it can even be asserted that data drive health. This article focuses on a key piece of data technology central to contemporary practices of medicine: the medical record. By situating the medical record in the perspective of its history, we inquire into how the kinds of data that are kept at sites of clinical encounter often depend on informational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. IoT-Integrated Smart Home Technologies with Augmented Reality for Improved User Experience.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The paper also discusses the technical architecture, including the network protocols, data management strategies, and user interface design considerations necessary to implement such a system. Additionally, it addresses the challenges related to data security, privacy, and system interoperability. Finally, the paper outlines potential future enhancements, such as the incorporation of AI-driven predictive analytics and advanced AR features, to further elevate the smart home experience.
    Download  
     
    Export citation  
     
    Bookmark  
  22. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  81
    Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by modern (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  80
    Transforming Consumer Behavior Analysis with Cutting-Edge Machine Learning.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    The research outlines a workflow that incorporates data collection, preprocessing, model training, and optimization. Real-world datasets from retail and e-commerce sectors are utilized to validate the proposed methodology, showcasing substantial improvements in model performance. The results indicate that optimized models not only provide better predictions of consumer behaviour but also enhance customer segmentation and targeting strategies. The study concludes with recommendations for future research, including the exploration of hybrid optimization techniques and the application of these methods in real-time analytics.
    Download  
     
    Export citation  
     
    Bookmark  
  25. We the People: Is the Polity the State?Stephanie Collins & Holly Lawford-Smith - 2021 - Journal of the American Philosophical Association 7 (1):78-97.
    When a liberal-democratic state signs a treaty or wages a war, does its whole polity do those things? In this article, we approach this question via the recent social ontological literature on collective agency. We provide arguments that it does and that it does not. The arguments are presented via three considerations: the polity's control over what the state does; the polity's unity; and the influence of individual polity members. We suggest that the answer to our question differs for different (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  26. First-person disavowals of digital phenotyping and epistemic injustice in psychiatry.Stephanie K. Slack & Linda Barclay - 2023 - Medicine, Health Care and Philosophy 26 (4):605-614.
    Digital phenotyping will potentially enable earlier detection and prediction of mental illness by monitoring human interaction with and through digital devices. Notwithstanding its promises, it is certain that a person’s digital phenotype will at times be at odds with their first-person testimony of their psychological states. In this paper, we argue that there are features of digital phenotyping in the context of psychiatry which have the potential to exacerbate the tendency to dismiss patients’ testimony and treatment preferences, which can be (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  27.  45
    Doxastic Wronging, Disrespectful Belief, & The Moral Over-Demandingness Objection.Stephanie Sheintul - forthcoming - Journal of Value Inquiry:1-11.
    Some scholars working on the ethics of belief argue that we can wrong each other in virtue of what we believe. This thesis is known as doxastic wronging. Proponents of doxastic wronging have different views about when our beliefs wrong. A prominent view is that our beliefs wrong when they falsely diminish. I call this the false diminishment account of doxastic wronging. In this paper, I argue against this account on the grounds that it is morally overdemanding. Nevertheless, I agree (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  41
    Wireless IoT Sensors for Environmental Pollution Monitoring in Urban Areas.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-441.
    The data collected by these sensors are transmitted to a centralized system where optimization algorithms, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Simulated Annealing (SA), are applied to optimize sensor placement, data transmission, and processing efficiency. This ensures accurate, real-time pollution monitoring and data analysis, providing actionable insights for policymakers, environmental agencies, and the general public. The system's performance is evaluated through simulations and real-world experiments, demonstrating its capability to deliver reliable and timely pollution data. Future work (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. The Originary Wherein: Heidegger and Nishida on the Sacred and the Religious.John W. M. Krummel - 2010 - Research in Phenomenology 40 (3):378-407.
    In this paper, I explore a possible convergence between two great twentieth century thinkers, Nishida Kitarō of Japan and Martin Heidegger of Germany. The focus is on the quasi-religious language they employ in discussing the grounding of human existence in terms of an encompassing Wherein for our being. Heidegger speaks of “the sacred” and “the passing of the last god” that mark an empty clearing wherein all metaphysical absolutes or gods have withdrawn but are simultaneously indicative of an opening wherein (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  30.  39
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Women in the History of Analytic Philosophy.Jeanne Peijnenburg & Sander Verhaegh (eds.) - 2022 - Cham: Springer.
    This book contains a selection of papers from the workshop *Women in the History of Analytic Philosophy* held in October 2019 in Tilburg, the Netherlands. It is the first volume devoted to the role of women in early analytic philosophy. It discusses the ideas of ten female philosophers and covers a period of over a hundred years, beginning with the contribution to the Significs Movement by Victoria, Lady Welby in the second half of the nineteenth century, and ending with Ruth (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Carving out a Sonorous Space for Erotic Tenderness: A Deleuzo-Guattarian Reading of Björk’s Becoming-Tender as Queer.Stephanie Koziej - 2023 - Deleuze and Guattari Studies 17 (3):424-448.
    This article argues that through her songs and music videos Pagan Poetry, Cocoon and Hidden Place, versatile artist Björk is able to carve out a space for erotic tenderness. This erotic tenderness will be unearthed as a queer or minor sexuality, in the sense that it goes against a phallic and genital majoritarian account of sexuality. Tender sexuality might not be obviously queer, yet a detour through the early work of Freud will show how our hegemonic account of sexuality is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Group Duties: Their Existence and Their Implications for Individuals.Stephanie Collins - 2019 - Oxford University Press.
    Moral duties are regularly attributed to groups. Does this make conceptual sense or is this merely political rhetoric? And what are the implications for these individuals within groups? Collins outlines a Tripartite Model of group duties that can target political demands at the right entities, in the right way and for the right reasons.
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  34. Sociomorphing and an Actor-Network Approach to Social Robotics.Piercosma Bisconti & Luca M. Possati - 2023 - In Raul Hakli, Pekka Makela & Johanna Seibt (eds.), Social Robots in Social Institutions, Robophilosophy 2022. IOS Press. pp. 508-517.
    Most of human-robot interaction (HRI) research relies on an implicit assumption that seems to drive experimental work in interaction studies: the more anthropomorphism we can reach in robots, the more effective the robot will be in 'being social.' The notion of 'sociomorphing' was developed in order to challenge the assumption of ubiquitous anthropomorphizing. This paper aims to explore the notion of sociomorphing by analysing the possibilities offered by actor-network theory (ANT). We claim that ANT is a valid framework to re-think (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. What Leonardo DiCaprio has to say about nature-human nexus: The roles of biodiversity loss perception toward skin/fur product consumption.Quan-Hoang Vuong, Thomas Jones & Minh-Hoang Nguyen - manuscript
    Products made from animal fur and skin have been a major part of human civilization. However, in modern society, the unsustainable consumption of these products – often considered luxury goods – has many negative environmental impacts. This study explores how people’s perceptions of biodiversity affect their attitudes and behaviors toward consumption. To investigate the information process deeper, we add the moderation of beliefs about biodiversity loss. Following the Bayesian Mindsponge Framework (BMF) analytics, we use mindsponge-based reasoning to construct conceptual models (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. The Epistemic Risk in Representation.Stephanie Harvard & Eric Winsberg - 2022 - Kennedy Institute of Ethics Journal 32 (1):1-31.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  37. Group Responsibility and Historicism.Stephanie Collins & Niels de Haan - 2024 - Philosophical Quarterly 74 (3):754-776.
    In this paper, we focus on the moral responsibility of organized groups in light of historicism. Historicism is the view that any morally responsible agent must satisfy certain historical conditions, such as not having been manipulated. We set out four examples involving morally responsible organized groups that pose problems for existing accounts of historicism. We then pose a trilemma: one can reject group responsibility, reject historicism, or revise historicism. We pursue the third option. We formulate a Manipulation Condition and a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  67
    Sharing LiSQuP's leap: Lessons and experiences within an online advancement program in the Philippines.Jose Norman Bernardo Bajar, Henry Buemio & Reynald M. Cacho - 2023 - Open Praxis 16 (2):208-224.
    This paper examines the experiences of a group of values education teachers who are studying in a customized scholarship and online graduate program under the Linking Standards and Quality Practice (LiSQuP) project in the Philippines. It aimed to explore the attitudes, benefits, and challenges encountered by the values education teachers by participating in the LiSQuP program. Embedded single case study research design was used, and qualitative content analysis was utilized for analyzing and interpreting the data. Recorded focus group interview, online (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  82
    States’ culpability through time.Stephanie Collins - 2024 - Philosophical Studies 181 (5):1345-1368.
    Some contemporary states are morally culpable for historically distant wrongs. But which states for which wrongs? The answer is not obvious, due to secessions, unions, and the formation of new states in the time since the wrongs occurred. This paper develops a framework for answering the question. The argument begins by outlining a picture of states’ agency on which states’ culpability is distinct from the culpability of states’ members. It then outlines, and rejects, a plausible-seeming answer to our question: that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  31
    Collectives' Duties and Collectivization Duties.Stephanie Collins - 2013 - Australasian Journal of Philosophy 91 (2):231–248.
    Plausibly, only moral agents can bear action-demanding duties. Not all groups are moral agents. This places constraints on which groups can bear action-demanding duties. Moreover, if such duties imply ability then moral agents – of both the individual and group varieties – can only bear duties over actions they are able to perform. I tease out the implications of this for duties over group actions, and argue that groups in many instances cannot bear these duties. This is because only groups (...)
    Download  
     
    Export citation  
     
    Bookmark   37 citations  
  41. Commercial Surrogacy and the Redefinition of Motherhood.Bryn Williams-Jones - 2002 - Journal of Philosophy, Science and Law 2:1-16.
    Since the 1970s, there has been rapid and wide ranging development in the field of new reproductive technologies (NRT). With donor insemination (DI) and in vitro fertilization (IVF), previously infertile couples have been given new hope and the chance to have children. A more recent addition to these new methods of reproduction has been the combination of DI and IVF with surrogate mother arrangements.[1] This technique has subtly changed the realm of reproduction, for with the addition of a third party (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  42.  52
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup 99) dataset (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Transcendent or immanent? Significance and history of li in confucianism.John W. M. Krummel - 2010 - Journal of Chinese Philosophy 37 (3):417-437.
    This paper investigates the meaning of the neo-Confucian concept of 'li'. From early on, it has the sense of a pattern designating how things are and ought to be. But it takes on the appearance of something transcendent to the world only at a certain point in history, when it becomes juxtaposed to 'qi'. Zhu Xi has been criticized for this 'li-qi' dichotomization and the transcendentalization of 'li'. The paper re-examines this putative dualism and transcendentalism, looking into both Zhu's discussions (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. Applying the Imminence Requirement to Police.Ben Jones - 2023 - Criminal Justice Ethics 42 (1):52-63.
    In many jurisdictions in the United States and elsewhere, the law governing deadly force by police and civilians contains a notable asymmetry. Often civilians but not police are bound by the imminence requirement—that is, a necessary condition for justifying deadly force is reasonable belief that oneself or another innocent person faces imminent threat of grave harm. In U.S. law enforcement, however, there has been some shift toward the imminence requirement, most evident in the use-of-force policy adopted by the Department of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  45. The Core of Care Ethics.Stephanie Collins - 2015 - New York: Palgrave-Macmillan.
    The ethics of care has flourished in recent decades yet we remain without a succinct statement of its core theoretical commitment. This book uses the methods of analytic philosophy to argue for a simple care ethical slogan: dependency relationships generate responsibilities. It uses this slogan to unify, specify and justify the wide range of views found within the care ethical literature.
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  46. Launch of the Canadian Journal of Bioethics/Lancement de la Revue canadienne de bioéthique.Bryn Williams-Jones, Charles Dupras, Vincent Couture & Renaud Boulanger - 2018 - Canadian Journal of Bioethics/Revue canadienne de bioéthique 1 (1):1-3.
    After six years (2012-2017) of publishing innovative bioethics scholarship, BioéthiqueOnline becomes the Canadian Journal of Bioethics/Revue canadienne de bioéthique. As executive editors of BioéthiqueOnline, we frequently heard from members of the Canadian bioethics community of the need to develop a platform with the right branding to showcase the value and the richness of our collective reflections, both locally and internationally. Following discussions with colleagues across the country, we came to the conclusion that BioéthiqueOnline had developed a unique expertise publishing bioethics (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Another argument against the thesis that there is a language of thought.John-Michael M. Kuczynski - 2004 - Communication and Cognition: An Interdisciplinary Quarterly Journal 37 (2):83-103.
    One cannot have the concept of a red object without having the concept of an extended object. But the word "red" doesn't contain the word "extended." In general, our concepts are interconnected in ways in which the corresponding words are not interconnected. This is not an accidental fact about the English language or about any other language: it is inherent in what a language is that the cognitive abilities corresponding to a person's abilities to use words cannot possibly be reflected (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Interconnected Blameworthiness.Stephanie Collins & Niels de Haan - 2021 - The Monist 104 (2):195-209.
    This paper investigates agents’ blameworthiness when they are part of a group that does harm. We analyse three factors that affect the scope of an agent’s blameworthiness in these cases: shared intentionality, interpersonal influence, and common knowledge. Each factor involves circumstantial luck. The more each factor is present, the greater is the scope of each agent’s vicarious blameworthiness for the other agents’ contributions to the harm. We then consider an agent’s degree of blameworthiness, as distinct from her scope of blameworthiness. (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  49. Genetic Testing for Sale: Implications of Commercial Brca Testing in Canada.Bryn Williams-Jones - 2002 - Dissertation, The University of British Columbia (Canada)
    Ongoing research in the fields of genetics and biotechnology hold the promise of improved diagnosis and treatment of genetic diseases, and potentially the development of individually tailored pharmaceuticals and gene therapies. Difficulty, however, arises in determining how these services are to be evaluated and integrated equitably into public health care systems such as Canada's. The current context is one of increasing fiscal restraint on the part of governments, limited financial resources being dedicated to health care, and rising costs for new (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. Hobbes’s Lesser Evil Argument for Political Authority.Ben Jones & Manshu Tian - 2022 - Hobbes Studies 35 (2):115–134.
    This article identifies an argument in Hobbes’s writings often overlooked but relevant to current philosophical debates. Political philosophers tend to categorize his thought as representing consent or rescue theories of political authority. Though these interpretations have textual support and are understandable, they leave out one of his most compelling arguments – what we call the lesser evil argument for political authority, expressed most explicitly in Chapter 20 of Leviathan. Hobbes frankly admits the state’s evils but appeals to the significant disparity (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 952