Results for 'cognitive privacy'

961 found
Order:
  1. On the need for a right to cognitive privacy.Kyle Slominski - 2018 - Oxford Philosophical Society Annual Review 40:43-45.
    This paper argues that legal privacy should be afforded to the content of the mind, comparing cognitive privacy to other protected forms of privacy and briefly addressing the potential pitfalls of compulsory neuroimaging.
    Download  
     
    Export citation  
     
    Bookmark  
  2. Mental Privacy, Cognitive Liberty, and Hog-tying.Parker Crutchfield - forthcoming - Journal of Bioethical Inquiry:1-16.
    As the science and technology of the brain and mind develop, so do the ways in which brains and minds may be surveilled and manipulated. Some cognitive libertarians worry that these developments undermine cognitive liberty, or “freedom of thought.” I argue that protecting an individual’s cognitive liberty undermines others’ ability to use their own cognitive liberty. Given that the threatening devices and processes are not relevantly different from ordinary and frequent intrusions upon one’s brain and mind, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Privacy in Public and the contextual conditions of agency.Maria Brincker - 2017 - In Timan Tjerk, Koops Bert-Jaap & Newell Bryce (eds.), (forthcoming) in Privacy in Public Space: Conceptual and Regulatory Challenges. Edward Elgar.
    Current technology and surveillance practices make behaviors traceable to persons in unprecedented ways. This causes a loss of anonymity and of many privacy measures relied on in the past. These de facto privacy losses are by many seen as problematic for individual psychology, intimate relations and democratic practices such as free speech and free assembly. I share most of these concerns but propose that an even more fundamental problem might be that our very ability to act as autonomous (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. The ethics of the extended mind: Mental privacy, manipulation and agency.Robert William Clowes, Paul R. Smart & Richard Heersmink - 2024 - In Jan-Hendrik Heinrichs, Birgit Beck & Orsolya Friedrich (eds.), Neuro-ProsthEthics: Ethical Implications of Applied Situated Cognition. Berlin, Germany: J. B. Metzler. pp. 13–35.
    According to proponents of the extended mind, bio-external resources, such as a notebook or a smartphone, are candidate parts of the cognitive and mental machinery that realises cognitive states and processes. The present chapter discusses three areas of ethical concern associated with the extended mind, namely mental privacy, mental manipulation, and agency. We also examine the ethics of the extended mind from the standpoint of three general normative frameworks, namely, consequentialism, deontology, and virtue ethics.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Physicalism and the Privacy of Conscious Experience.Miklós Márton & János Tőzsér - 2016 - Journal of Cognition and Neuroethics 4 (1):73-88.
    The aim of the paper is to show that the privacy of conscious experience is inconsistent with any kind of physicalism. That is, if you are a physicalist, then you have to deny that more than one subject cannot undergo the very same conscious experience. In the first part of the paper we define the concepts of privacy and physicalism. In the second part we delineate two thought experiments in which two subjects undergo the same kind of conscious (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Mindmelding: Consciousness, Neuroscience, and the Mind's Privacy.William Hirstein - 2012 - New York: Oxford University Press.
    [This download contains the table of contents and Chapter 1]. I argue here that the claim that conscious states are private, in the sense that only one person can ever experience them directly, is false. There actually is a way to connect the brains of two people that would allow one to have direct experience of the other's conscious, e.g., perceptual states. This would allow, for instance, one person to see that the other had deviant color perception (which was masked (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  7. Reclaiming Control: Extended Mindreading and the Tracking of Digital Footprints.Uwe Peters - 2022 - Social Epistemology 36 (3):267-282.
    It is well known that on the Internet, computer algorithms track our website browsing, clicks, and search history to infer our preferences, interests, and goals. The nature of this algorithmic tracking remains unclear, however. Does it involve what many cognitive scientists and philosophers call ‘mindreading’, i.e., an epistemic capacity to attribute mental states to people to predict, explain, or influence their actions? Here I argue that it does. This is because humans are in a particular way embedded in the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  8. 50 questions on Active Assisted Living technologies. Global edition.Francisco Florez-Revuelta, Alin Ake-Kob, Pau Climent-Perez, Paulo Coelho, Liane Colonna, Laila Dahabiyeh, Carina Dantas, Esra Dogru-Huzmeli, Hazim Kemal Ekenel, Aleksandar Jevremovic, Nina Hosseini-Kivanani, Aysegul Ilgaz, Mladjan Jovanovic, Andrzej Klimczuk, Maksymilian M. Kuźmicz, Petre Lameski, Ferlanda Luna, Natália Machado, Tamara Mujirishvili, Zada Pajalic, Galidiya Petrova, Nathalie G. S. Puaschitz, Maria Jose Santofimia, Agusti Solanas, Wilhelmina van Staalduinen & Ziya Ata Yazici - 2024 - Alicante: University of Alicante.
    This booklet on Active Assisted Living (AAL) technologies has been created as part of the GoodBrother COST Action, which has run from 2020 to 2024. COST Actions are European research programs that promote collaboration across borders, uniting researchers, professionals, and institutions to address key societal challenges. GoodBrother focused on ethical and privacy concerns surrounding video and audio monitoring in care settings. The aim was to ensure that while AAL technologies help older adults and vulnerable individuals, their privacy and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. State of the Art of Audio- and Video-Based Solutions for AAL.Slavisa Aleksic, Michael Atanasov, Jean Calleja Agius, Kenneth Camilleri, Anto Cartolovni, Pau Climent-Perez, Sara Colantonio, Stefania Cristina, Vladimir Despotovic, Hazim Kemal Ekenel, Ekrem Erakin, Francisco Florez-Revuelta, Danila Germanese, Nicole Grech, Steinunn Gróa Sigurđardóttir, Murat Emirzeoglu, Ivo Iliev, Mladjan Jovanovic, Martin Kampel, William Kearns, Andrzej Klimczuk, Lambros Lambrinos, Jennifer Lumetzberger, Wiktor Mucha, Sophie Noiret, Zada Pajalic, Rodrigo Rodriguez Perez, Galidiya Petrova, Sintija Petrovica, Peter Pocta, Angelica Poli, Mara Pudane, Susanna Spinsante, Albert Ali Salah, Maria Jose Santofimia, Anna Sigríđur Islind, Lacramioara Stoicu-Tivadar, Hilda Tellioglu & Andrej Zgank - 2022 - Alicante: University of Alicante.
    It is a matter of fact that Europe is facing more and more crucial challenges regarding health and social care due to the demographic change and the current economic context. The recent COVID-19 pandemic has stressed this situation even further, thus highlighting the need for taking action. Active and Assisted Living technologies come as a viable approach to help facing these challenges, thanks to the high potential they have in enabling remote care and support. Broadly speaking, AAL can be referred (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Is Pain “All in your Mind”? Examining the General Public’s Views of Pain.Tim V. Salomons, Richard Harrison, Nat Hansen, James Stazicker, Astrid Grith Sorensen, Paula Thomas & Emma Borg - 2022 - Review of Philosophy and Psychology 13 (3):683-698.
    By definition, pain is a sensory and emotional experience that is felt in a particular part of the body. The precise relationship between somatic events at the site where pain is experienced, and central processing giving rise to the mental experience of pain remains the subject of debate, but there is little disagreement in scholarly circles that both aspects of pain are critical to its experience. Recent experimental work, however, suggests a public view that is at odds with this conceptualisation. (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  11. AI as Legal Persons: Past, Patterns, and Prospects.Claudio Novelli, Luciano Floridi & Giovanni Sartor - manuscript
    This chapter examines the evolving debate on AI legal personhood, emphasizing the role of path dependencies in shaping current trajectories and prospects. Two primary path dependencies emerge: prevailing legal theories on personhood (singularist vs. clustered) and the impact of technological advancements. We argue that these factors dynamically interact, with technological optimism fostering broader rights-based debates and periods of skepticism narrowing discussions to limited rights. Additional influences include regulatory cross-linkages (e.g., data privacy, liability, cybersecurity) and historical legal precedents. Current regulatory (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Ethical Issues in Near-Future Socially Supportive Smart Assistants for Older Adults.Alex John London - forthcoming - IEEE Transactions on Technology and Society.
    Abstract:This paper considers novel ethical issues pertaining to near-future artificial intelligence (AI) systems that seek to support, maintain, or enhance the capabilities of older adults as they age and experience cognitive decline. In particular, we focus on smart assistants (SAs) that would seek to provide proactive assistance and mediate social interactions between users and other members of their social or support networks. Such systems would potentially have significant utility for users and their caregivers if they could reduce the (...) load for tasks that help older adults maintain their autonomy and independence. However, proactively supporting even simple tasks, such as providing the user with a summary of a meeting or a conversation, would require a future SA to engage with ethical aspects of human interactions which computational systems currently have difficulty identifying, tracking, and navigating. If SAs fail to perceive ethically relevant aspects of social interactions, the resulting deficit in moral discernment would threaten important aspects of user autonomy and well-being. After describing the dynamic that generates these ethical challenges, we note how simple strategies for prompting user oversight of such systems might also undermine their utility. We conclude by considering how near-future SAs could exacerbate current worries about privacy, commodification of users, trust calibration and injustice. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Wearable Technologies for Healthy Ageing: Prospects, Challenges, and Ethical Considerations.Stefano Canali, Agara Ferretti, Viola Schiaffonati & Alessandro Blasimme - 2024 - Journal of Frailty and Aging 2024:1-8.
    Digital technologies hold promise to modernize healthcare. Such opportunity should be leveraged also to address the needs of rapidly ageing populations. Against this backdrop, this paper examines the use of wearable devices for promoting healthy ageing. Previous work has assessed the prospects of digital technologies for health promotion and disease prevention in older adults. However, to our knowledge, ours is one of the first attempts to specifically address the use of wearables for healthy ageing, and to offer ethical insights for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. AI as IA: The use and abuse of artificial intelligence (AI) for human enhancement through intellectual augmentation (IA).Alexandre Erler & Vincent C. Müller - 2023 - In Fabrice Jotterand & Marcello Ienca (eds.), The Routledge Handbook of the Ethics of Human Enhancement. Routledge. pp. 187-199.
    This paper offers an overview of the prospects and ethics of using AI to achieve human enhancement, and more broadly what we call intellectual augmentation (IA). After explaining the central notions of human enhancement, IA, and AI, we discuss the state of the art in terms of the main technologies for IA, with or without brain-computer interfaces. Given this picture, we discuss potential ethical problems, namely inadequate performance, safety, coercion and manipulation, privacy, cognitive liberty, authenticity, and fairness in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Epistemological Alchemy through the hermeneutics of Bits and Bytes.Shahnawaz Akhtar - manuscript
    This paper delves into the profound advancements of Large Language Models (LLMs), epitomized by GPT-3, in natural language processing and artificial intelligence. It explores the epistemological foundations of LLMs through the lenses of Aristotle and Kant, revealing apparent distinctions from human learning. Transitioning seamlessly, the paper then delves into the ethical landscape, extending beyond knowledge acquisition to scrutinize the implications of LLMs in decision-making and content creation. The ethical scrutiny, employing virtue ethics, deontological ethics, and teleological ethics, delves into LLMs' (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Ethical issues in genomics research on neurodevelopmental disorders: a critical interpretive review.Signe Mezinska, L. Gallagher, M. Verbrugge & E. M. Bunnik - 2021 - Human Genomics 16 (15).
    Background Genomic research on neurodevelopmental disorders (NDDs), particularly involving minors, combines and amplifies existing research ethics issues for biomedical research. We performed a review of the literature on the ethical issues associated with genomic research involving children affected by NDDs as an aid to researchers to better anticipate and address ethical concerns. Results Qualitative thematic analysis of the included articles revealed themes in three main areas: research design and ethics review, inclusion of research participants, and communication of research results. Ethical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  96
    Toward Datafied Human Enhancement: Concept, Functional Classifications and Ethical Issues.Zheng Liu - forthcoming - Filosofija. Sociologija.
    This article presents a robust defense of the concept of “datafied enhancement” as a subset of human enhancement. Firstly, the author notes that the widespread development of ICT and AI technologies has made it possible to collect and analyze human biometric data, thus integrating data into the concept of embodiment. Secondly, the author explores the cultural and intellectual history of datafied enhancement, highlighting the significant role data has played in human evolution. Thirdly, the author examines the functional classifications of datafied (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Ethics and Artificial Intelligence.Mark Ryan - 2021 - In Deborah C. Poff & Alex C. Michalos (eds.), Encyclopedia of Business and Professional Ethics. Springer Verlag. pp. 1-5.
    A subdiscipline has emerged around AI ethics, which is comprised of a wide array of individuals: computer scientists, ethicists, cognitive scientists, roboticists, legal professionals, economists, sociologists, gender, and race theorists. This has led to a very interesting branch of research, addressing issues surrounding the development and use of AI. This chapter will give a very brief snapshot of some of the most pertinent ethical concerns. Many of the issues in the Big Data Ethics chapter in this collection are often (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Dimensions of integration in embedded and extended cognitive systems.Richard Heersmink - 2015 - Phenomenology and the Cognitive Sciences 14 (3):577-598.
    The complementary properties and functions of cognitive artifacts and other external resources are integrated into the human cognitive system to varying degrees. The goal of this paper is to develop some of the tools to conceptualize this complementary integration between agents and artifacts. It does so by proposing a multidimensional framework, including the dimensions of information flow, reliability, durability, trust, procedural transparency, informational transparency, individualization, and transformation. The proposed dimensions are all matters of degree and jointly they constitute (...)
    Download  
     
    Export citation  
     
    Bookmark   73 citations  
  20. Realism and instrumentalism in Bayesian cognitive science.Danielle Williams & Zoe Drayson - 2023 - In Tony Cheng, Ryoji Sato & Jakob Hohwy (eds.), Expected Experiences: The Predictive Mind in an Uncertain World. Routledge.
    There are two distinct approaches to Bayesian modelling in cognitive science. Black-box approaches use Bayesian theory to model the relationship between the inputs and outputs of a cognitive system without reference to the mediating causal processes; while mechanistic approaches make claims about the neural mechanisms which generate the outputs from the inputs. This paper concerns the relationship between these two approaches. We argue that the dominant trend in the philosophical literature, which characterizes the relationship between black-box and mechanistic (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  21. Digital privacy and the law: the challenge of regulatory capture.Bartek Chomanski & Lode Lauwaert - 2024 - AI and Society.
    Digital privacy scholars tend to bemoan ordinary people’s limited knowledge of and lukewarm interest in what happens to their digital data. This general lack of interest and knowledge is often taken as a consideration in favor of legislation aiming to force internet companies into adopting more responsible data practices. While we remain silent on whether any new laws are called for, in this paper we wish to underline a neglected consequence of people’s ignorance of and apathy for digital (...): their potential to encourage capture by industry interests. In particular, we argue that such laws may be at increased risk of capture because they are unlikely to be democratically responsive. We make this claim on a twofold basis: first, well-known theoretical mechanisms explaining how the absence of responsiveness leads to capture, identified in prior political science and political philosophy literature, yield the prediction that digital privacy legislation is likely to be unresponsive and thus captured; second, empirical data concerning the European Union’s digital privacy laws, with a special focus on the General Data Protection Regulation, appears to confirm these predictions: the bloc’s (world’s?) flagship privacy protection law seems more responsive to corporate than citizen interests. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  23. Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Causation, Norms, and Cognitive Bias.Levin Güver & Markus Kneer - manuscript
    Extant research has shown that ordinary causal judgments are sensitive to normative factors. For instance, agents who violate a norm are standardly deemed more causal than norm-conforming agents in identical situations. In this paper, we explore two competing explanations for the Norm Effect: the Responsibility View and the Bias View. According to the former, the Norm Effect arises because ordinary causal judgment is intimately intertwined with moral responsibility. According to the alternative view, the Norm Effect is the result of a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. In defense of picturing; Sellars’s philosophy of mind and cognitive neuroscience.Carl B. Sachs - 2019 - Phenomenology and the Cognitive Sciences 18 (4):669-689.
    I argue that Sellars’s distinction between signifying and picturing should be taken seriously by philosophers of mind, language, and cognition. I begin with interpretations of key Sellarsian texts in order to show that picturing is best understood as a theory of non-linguistic cognitive representations through which animals navigate their environments. This is distinct from the kind of discursive cognition that Sellars called ‘signifying’ and which is best understood in terms of socio-linguistic inferences. I argue that picturing is required because (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  26. A Description Logic Framework for Commonsense Conceptual Combination Integrating Typicality, Probabilities and Cognitive Heuristics.Antonio Lieto & Gian Luca Pozzato - 2019 - Journal of Experimental and Theoretical Artificial Intelligence:1-39.
    We propose a nonmonotonic Description Logic of typicality able to account for the phenomenon of the combination of prototypical concepts. The proposed logic relies on the logic of typicality ALC + TR, whose semantics is based on the notion of rational closure, as well as on the distributed semantics of probabilistic Description Logics, and is equipped with a cognitive heuristic used by humans for concept composition. We first extend the logic of typicality ALC + TR by typicality inclusions of (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  27. Recognizing the Diversity of Cognitive Enhancements.Walter Veit, Brian D. Earp, Nadira Faber, Nick Bostrom, Justin Caouette, Adriano Mannino, Lucius Caviola, Anders Sandberg & Julian Savulescu - 2020 - American Journal of Bioethics Neuroscience 11 (4):250-253.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  28. Pragmatism and the pragmatic turn in cognitive science.Richard Menary - 2016 - In Karl Friston, Andreas Andreas & Danika Kragic (eds.), Pragmatism and the Pragmatic Turn in Cognitive Science. M.I.T. Press. pp. 219-236.
    This chapter examines the pragmatist approach to cognition and experience and provides some of the conceptual background to the “pragmatic turn” currently underway in cognitive science. Classical pragmatists wrote extensively on cognition from a naturalistic perspective, and many of their views are compatible with contemporary pragmatist approaches such as enactivist, extended, and embodied-Bayesian approaches to cognition. Three principles of a pragmatic approach to cognition frame the discussion: First, thinking is structured by the interaction of an organism with its environment. (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  29. Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  30. (1 other version)Privacy, Democracy and Freedom of Expression.Annabelle Lever - 2015 - In Beate Roessler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. Cambridge University Press. pp. 67-69.
    Must privacy and freedom of expression conflict? To witness recent debates in Britain, you might think so. Anything other than self-regulation by the press is met by howls of anguish from journalists across the political spectrum, to the effect that efforts to protect people’s privacy will threaten press freedom, promote self-censorship and prevent the press from fulfilling its vital function of informing the public and keeping a watchful eye on the activities and antics of the powerful.[Brown, 2009, 13 (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31. Privacy, Autonomy, and Personalised targeting: Rethinking How Personal Data is Used.Karina Vold & Jessica Whittlestone - 2020 - In Carissa Veliz (ed.), Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and services to specific (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  32. privacy and democracy: what the secret ballot reveals.Annabelle Lever - 2015 - Law, Culture and the Humanities 11 (2).
    : Does the rejection of pure proceduralism show that we should adopt Brettschneider’s value theory of democracy? The answer, this paper suggests, is ‘no’. There are a potentially infinite number of incompatible ways to understand democracy, of which the value theory is, at best, only one. The paper illustrates and substantiates its claims by looking at what the secret ballot shows us about the importance of privacy and democracy. Drawing on the reasons to reject Mill’s arguments for open voting, (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  33. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  34. Privacy and Punishment.Mark Tunick - 2013 - Social Theory and Practice 39 (4):643-668.
    Philosophers have focused on why privacy is of value to innocent people with nothing to hide. I argue that for people who do have something to hide, such as a past crime, or bad behavior in a public place, informational privacy can be important for avoiding undeserved or disproportionate non-legal punishment. Against the objection that one cannot expect privacy in public facts, I argue that I might have a legitimate privacy interest in public facts that are (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  35. Temporal phenomenology: phenomenological illusion versus cognitive error.Kristie Miller, Alex Holcombe & Andrew J. Latham - 2020 - Synthese 197 (2):751-771.
    Temporal non-dynamists hold that there is no temporal passage, but concede that many of us judge that it seems as though time passes. Phenomenal Illusionists suppose that things do seem this way, even though things are not this way. They attempt to explain how it is that we are subject to a pervasive phenomenal illusion. More recently, Cognitive Error Theorists have argued that our experiences do not seem that way; rather, we are subject to an error that leads us (...)
    Download  
     
    Export citation  
     
    Bookmark   30 citations  
  36. The Self in the Age of Cognitive Science: Decoupling the Self from the Personal Level.Robert D. Rupert - 2018 - Philosophic Exchange 2018.
    Philosophers of mind commonly draw a distinction between the personal level – the distinctive realm of conscious experience and reasoned deliberation – and the subpersonal level, the domain of mindless mechanism and brute cause and effect. Moreover, they tend to view cognitive science through the lens of this distinction. Facts about the personal level are given a priori, by introspection, or by common sense; the job of cognitive science is merely to investigate the mechanistic basis of these facts. (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  37. Two Views on the Cognitive Brain.David L. Barack & John Krakauer - 2021 - Nature Reviews Neuroscience 22 (6).
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  38. Does privacy undermine community.Mark Tunick - 2001 - Journal of Value Inquiry 35 (4):517-534.
    Does privacy--the condition of being invisible to public scrutiny--in so emphasizing individual rights, undermine community? One objection to privacy is that it is a license to engage in antisocial activity that undermines social norms. Another objection is that privacy encourages isolation and anonymity, also undermining community. Drawing on the political theory of Hegel, I argue that privacy can promote community. Some invasions of privacy can undermine a sort of autonomy essential for maintaining a community. I (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  39. Neural representations unobserved—or: a dilemma for the cognitive neuroscience revolution.Marco Facchin - 2023 - Synthese 203 (1):1-42.
    Neural structural representations are cerebral map- or model-like structures that structurally resemble what they represent. These representations are absolutely central to the “cognitive neuroscience revolution”, as they are the only type of representation compatible with the revolutionaries’ mechanistic commitments. Crucially, however, these very same commitments entail that structural representations can be observed in the swirl of neuronal activity. Here, I argue that no structural representations have been observed being present in our neuronal activity, no matter the spatiotemporal scale of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. The new Tweety puzzle: arguments against monistic Bayesian approaches in epistemology and cognitive science.Matthias Unterhuber & Gerhard Schurz - 2013 - Synthese 190 (8):1407-1435.
    In this paper we discuss the new Tweety puzzle. The original Tweety puzzle was addressed by approaches in non-monotonic logic, which aim to adequately represent the Tweety case, namely that Tweety is a penguin and, thus, an exceptional bird, which cannot fly, although in general birds can fly. The new Tweety puzzle is intended as a challenge for probabilistic theories of epistemic states. In the first part of the paper we argue against monistic Bayesians, who assume that epistemic states can (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  41. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing users (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  42. Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for assessment (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  43. Phenomenal Conservatism and Cognitive Penetration: The Bad Basis Counterexamples.Matthew McGrath - 2013 - In Chris Tucker (ed.), Seemings and Justification: New Essays on Dogmatism and Phenomenal Conservatism. New York: Oxford University Press USA. pp. 225–247.
    Download  
     
    Export citation  
     
    Bookmark   50 citations  
  44. Brain Privacy and the Case of Cannibal Cop.Mark Tunick - 2017 - Res Publica 23 (2):179-196.
    In light of technology that may reveal the content of a person’s innermost thoughts, I address the question of whether there is a right to ‘brain privacy’—a right not to have one’s inner thoughts revealed to others–even if exposing these thoughts might be beneficial to society. I draw on a conception of privacy as the ability to control who has access to information about oneself and to an account that connects one’s interest in privacy to one’s interests (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  45. Knowledge and the value of cognitive ability.J. Adam Carter, Benjamin Jarvis & Katherine Rubin - 2013 - Synthese 190 (17):3715-3729.
    We challenge a line of thinking at the fore of recent work on epistemic value: the line (suggested by Kvanvig in The value of knowledge and the pursuit of understanding, 2003 and others) that if the value of knowledge is “swamped” by the value of mere true belief, then we have good reason to doubt its theoretical importance in epistemology. We offer a value-driven argument for the theoretical importance of knowledge—one that stands even if the value of knowledge is “swamped” (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  46. Mental files and belief: A cognitive theory of how children represent belief and its intensionality.Josef Perner, Michael Huemer & Brian Leahy - 2015 - Cognition 145 (C):77-88.
    We provide a cognitive analysis of how children represent belief using mental files. We explain why children who pass the false belief test are not aware of the intensionality of belief. Fifty-one 3½- to 7-year old children were familiarized with a dual object, e.g., a ball that rattles and is described as a rattle. They observed how a puppet agent witnessed the ball being put into box 1. In the agent’s absence the ball was taken from box 1, the (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  47. Integrating Artificial Intelligence into Scholarly Communications for Enhanced Human Cognitive Abilities: The War for Philosophy?Murtala Ismail Adakawa Adakawa - 2024 - Revista Internacional de Filosofía Teórica y Práctica 4 (1):123-159.
    Este artículo explora la integración de la IA en la comunicación académica para mejorar las capacidades cognitivas humanas. La concepción de la comunicación hombre-máquina (CMM), que considera las tecnologías basadas en la IA no como objetos interactivos, sino como sujetos comunicativos, plantea cuestiones más filosóficas en la comunicación académica. Es un hecho conocido que existe una mayor interacción entre los humanos y las máquinas, especialmente consolidada por la pandemia COVID-19, que intensificó el desarrollo del Sistema de Aprendizaje Adaptativo Individual, por (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Group privacy: a defence and an interpretation.Luciano Floridi - 2016 - In Bart van der Sloot, Luciano Floridi & Linnet Taylor (eds.), Group privacy. Springer Verlag.
    In this chapter I identify three problems affecting the plausibility of group privacy and argue in favour of their resolution. The first problem concerns the nature of the groups in question. I shall argue that groups are neither discovered nor invented, but designed by the level of abstraction (LoA) at which a specific analysis of a social system is developed. Their design is therefore justified insofar as the purpose, guiding the choice of the LoA, is justified. This should remove (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  49. Epistemic Landscapes, Optimal Search, and the Division of Cognitive Labor.Jason McKenzie Alexander, Johannes Himmelreich & Christopher Thompson - 2015 - Philosophy of Science 82 (3):424-453,.
    This article examines two questions about scientists’ search for knowledge. First, which search strategies generate discoveries effectively? Second, is it advantageous to diversify search strategies? We argue pace Weisberg and Muldoon, “Epistemic Landscapes and the Division of Cognitive Labor”, that, on the first question, a search strategy that deliberately seeks novel research approaches need not be optimal. On the second question, we argue they have not shown epistemic reasons exist for the division of cognitive labor, identifying the errors (...)
    Download  
     
    Export citation  
     
    Bookmark   47 citations  
  50. Propositions and Cognitive Relations.Nicholas K. Jones - 2019 - Proceedings of the Aristotelian Society 119 (2):157-178.
    There are two broad approaches to theorizing about ontological categories. Quineans use first-order quantifiers to generalize over entities of each category, whereas type theorists use quantification on variables of different semantic types to generalize over different categories. Does anything of import turn on the difference between these approaches? If so, are there good reasons to go type-theoretic? I argue for positive answers to both questions concerning the category of propositions. I also discuss two prominent arguments for a Quinean conception of (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
1 — 50 / 961