Results for 'cyber-identity'

962 found
Order:
  1. The Necessity of Memory for Self-identity: Locke, Hume, Freud and the Cyber-self.Shane J. Ralston - 2000 - Cyberphilosophy Journal 1 (1).
    John Locke is often understood as the inaugurator of the modern discussion of personal human identity—a discussion that inevitably falls back on his own theory with its critical reliance on memory. David Hume and Sigmund Freud would later make arguments for what constituted personal identity, both relying, like Locke, on memory, but parting from Locke's company in respect the role that memory played. The purpose of this paper will be to sketch the groundwork for Locke's own theory of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. A socio-psychological approach towards terrorism: How and why do individuals support, join, stay in, and leave terrorist organizations?Alireza Salehi-Nejad - 2019 - In International Conference on Peace and Conflict Resolution. Tehran: University of Tehran.
    The phenomena of terrorism and other politically motivated violence have been assessed across different disciplines from political science and economics to theology and psychology. Whereas the definitions of the concepts of “terrorism” and “terrorist” are disputed and they rather reflect the perspectives of the defining entity, there is a common consensus that terrorism can be classified in terms of its type (such as state-sponsored, dissent, religious, pathological, narco-, cyber-, and bioterrorism), the scale (i.e. domestic vs. international), motives, and objectives. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Philosophy and Digitization: Dangers and Possibilities in the New Digital Worlds.Esther Oluffa Pedersen & Maria Brincker - 2021 - SATS 22 (1):1-9.
    Our world is under going an enormous digital transformation. Nearly no area of our social, informational, political, economic, cultural, and biological spheres are left unchanged. What can philosophy contribute as we try to under- stand and think through these changes? How does digitization challenge past ideas of who we are and where we are headed? Where does it leave our ethical aspirations and cherished ideals of democracy, equality, privacy, trust, freedom, and social embeddedness? Who gets to decide, control, and harness (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Addiction, Identity, Morality.Brian D. Earp, Joshua August Skorburg, Jim A. C. Everett & Julian Savulescu - 2019 - AJOB Empirical Bioethics 10 (2):136-153.
    Background: Recent literature on addiction and judgments about the characteristics of agents has focused on the implications of adopting a ‘brain disease’ versus ‘moral weakness’ model of addiction. Typically, such judgments have to do with what capacities an agent has (e.g., the ability to abstain from substance use). Much less work, however, has been conducted on the relationship between addiction and judgments about an agent’s identity, including whether or to what extent an individual is seen as the same person (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  9. Personal-identity Non-cognitivism.Kristie Miller - 2024 - Analytic Philosophy.
    In this paper I outline and defend a new approach to personal-identity—personal-identity non-cognitivism—and argue that it has several advantages over its cognitivist rivals. On this view utterances of personal-identity sentences express a non-cognitive attitude towards relevant person-stages. The resulting view offers a pleasingly nuanced picture of what we are doing when we utter such sentences.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  10. Identity-relative paternalism is internally incoherent.Eli Garrett Schantz - 2023 - Journal of Medical Ethics 49 (6):404-405.
    Identity-Relative Paternalism, as defended by Wilkinson, holds that paternalistic intervention is justified to prevent an individual from doing to their future selves (where there are weakened prudential unity relations between the current and future self) what it would be justified to prevent them from doing to others.1 Wilkinson, drawing on the work of Parfit and others, defends the notion of Identity-Relative Paternalism from a series of objections. I argue here, however, that Wilkinson overlooks a significant problem for (...)-Relative Paternalism—namely, that it yields unactionable and self-contradictory results when applied to choices where both options present potential harms to future selves. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  11. Identity.Erica Shumener - 2020 - In Michael J. Raven (ed.), The Routledge Handbook of Metaphysical Grounding. New York: Routledge. pp. 413-424.
    I explore proposals for stating identity criteria in terms of ground. I also address considerations for and against taking identity and distinctness facts to be ungrounded.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  12. Identity criteria: an epistemic path to conceptual grounding.Massimiliano Carrara & Ciro De Florio - 2020 - Synthese 197 (7):3151-3169.
    Are identity criteria grounding principles? A prima facie answer to this question is positive. Specifically, two-level identity criteria can be taken as principles related to issues of identity among objects of a given kind compared with objects of a more basic kind. Moreover, they are grounding metaphysical principles of some objects with regard to others. In the first part of the paper we criticise this prima facie natural reading of identity criteria. This result does not mean (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  13. Personal Identity.David Shoemaker & Kevin P. Tobia - 2022 - In Manuel Vargas & John Doris (eds.), The Oxford Handbook of Moral Psychology. Oxford, U.K.: Oxford University Press.
    Our aim in this entry is to articulate the state of the art in the moral psychology of personal identity. We begin by discussing the major philosophical theories of personal identity, including their shortcomings. We then turn to recent psychological work on personal identity and the self, investigations that often illuminate our person-related normative concerns. We conclude by discussing the implications of this psychological work for some contemporary philosophical theories and suggesting fruitful areas for future work on (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  14.  66
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Personal identity and the Phineas Gage effect.Kevin P. Tobia - 2015 - Analysis 75 (3):396-405.
    Phineas Gage’s story is typically offered as a paradigm example supporting the view that part of what matters for personal identity is a certain magnitude of similarity between earlier and later individuals. Yet, reconsidering a slight variant of Phineas Gage’s story indicates that it is not just magnitude of similarity, but also the direction of change that affects personal identity judgments; in some cases, changes for the worse are more seen as identity-severing than changes for the better (...)
    Download  
     
    Export citation  
     
    Bookmark   48 citations  
  16. Does Identity Politics Reinforce Oppression?Katherine Ritchie - 2021 - Philosophers' Imprint 21 (4):1-15.
    Identity politics has been critiqued in various ways. One central problem—the Reinforcement Problem—claims that identity politics reinforces groups rooted in oppression thereby undermining its own liberatory aims. Here I consider two versions of the problem—one psychological and one metaphysical. I defang the first by drawing on work in social psychology. I then argue that careful consideration of the metaphysics of social groups and of the practice of identity politics provides resources to dissolve the second version. Identity (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  17. ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer Technology is one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  19.  44
    SVM Model for Cyber Threat Detection: Known and Innovative Attacks.Prathap Jeyapandi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):201-209.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  44
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Personal Identity, Direction of Change, and Neuroethics.Kevin Patrick Tobia - 2016 - Neuroethics 9 (1):37-43.
    The personal identity relation is of great interest to philosophers, who often consider fictional scenarios to test what features seem to make persons persist through time. But often real examples of neuroscientific interest also provide important tests of personal identity. One such example is the case of Phineas Gage – or at least the story often told about Phineas Gage. Many cite Gage’s story as example of severed personal identity; Phineas underwent such a tremendous change that Gage (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  22. The identity of the categorical and the dispositional.Galen Strawson - 2008 - Analysis 68 (4):271-282.
    Suppose that X and Y can’t possibly exist apart in reality; then—by definition—there’s no real distinction between them, only a conceptual distinction. There’s a conceptual distinction between a rectilinear figure’s triangularity and its trilaterality, for example, but no real distinction. In fundamental metaphysics there is no real distinction between an object’s categorical properties and its dispositional properties. So too there is no real distinction between an object and its properties. And in fundamental metaphysics, for X and Y to be such (...)
    Download  
     
    Export citation  
     
    Bookmark   79 citations  
  23. Gender Identity and Exclusion: A Reply to Jenkins.Matthew Salett Andler - 2017 - Ethics 127 (4):883-895.
    A theory of gender ought to be compatible with trans-inclusive definitions of gender identity terms, such as ‘woman’ and ‘man’. Appealing to this principle of trans-inclusion, Katharine Jenkins argues that we ought to endorse a dual social position and identity theory of gender. Here, I argue that Jenkins’s dual theory of gender fails to be trans-inclusive for the following reasons: it cannot generate a definition of ‘woman’ that extends to include all trans women, and it understands transgender gender (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  24. The Identity of Necessary Indiscernibles.Zach Thornton - forthcoming - Philosophers' Imprint.
    I propose a novel metaphysical explanation of identity and distinctness facts called the Modal Proposal. According to the Modal Proposal, for each identity fact – that is, each fact of the form a=b – that fact is metaphysically explained by the fact that it is necessary that the entities involved are indiscernible, and for each distinctness fact –that is, each fact of the form a≠b – that fact is metaphysically explained by the fact that it is possible for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Moral Identity Predicts the Development of Presence of Meaning during Emerging Adulthood.Hyemin Han, Indrawati Liauw & Ashley Floyd Kuntz - forthcoming - Emerging Adulthood.
    We examined change over time in the relationship between moral identity and presence of meaning during early adulthood. Moral identity refers to a sense of morality and moral values that are central to one’s identity. Presence of meaning refers to the belief that one’s existence has meaning, purpose, and value. Participants responded to questions on moral identity and presence of meaning in their senior year of high school and two years after. Mixed effects model analyses were (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  26. Corporatised Identities ≠ Digital Identities: Algorithmic Filtering on Social Media and the Commercialisation of Presentations of Self.Charlie Harry Smith - 2020 - In Christopher Burr & Luciano Floridi (eds.), Ethics of digital well-being: a multidisciplinary approach. Springer.
    Goffman’s (1959) dramaturgical identity theory requires modification when theorising about presentations of self on social media. This chapter contributes to these efforts, refining a conception of digital identities by differentiating them from ‘corporatised identities’. Armed with this new distinction, I ultimately argue that social media platforms’ production of corporatised identities undermines their users’ autonomy and digital well-being. This follows from the disentanglement of several commonly conflated concepts. Firstly, I distinguish two kinds of presentation of self that I collectively refer (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  27. Identity display: another motive for metalinguistic disagreement.Alexander Davies - 2021 - Inquiry: An Interdisciplinary Journal of Philosophy 64 (8):861-882.
    ABSTRACT It has become standard to conceive of metalinguistic disagreement as motivated by a form of negotiation, aimed at reaching consensus because of the practical consequences of using a word with one content rather than another. This paper presents an alternative motive for expressing and pursuing metalinguistic disagreement. In using words with given criteria, we betray our location amongst social categories or groups. Because of this, metalinguistic disagreement can be used as a stage upon which to perform a social (...). The ways in which metalinguistic disagreements motivated in this way diverge in character from metalinguistic negotiations are described, as are several consequences of the existence of metalinguistic disagreements motivated in this way. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  28. Advanced Persistent Threats in Cybersecurity – Cyber Warfare.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats. It explores the concept of advanced persistent threats in the context of cyber security and cyber warfare. APTs represent one of the most insidious and challenging forms of cyber threats, characterized by their sophistication, persistence, and targeted nature. The paper examines the origins, characteristics and methods used by APT (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Gender Identity and Gender.Rach Cosker-Rowland - forthcoming - Analysis.
    Our gender identity is our sense of ourselves as a woman, a man, as genderqueer, or as another gender. Our gender is the property we have of being a woman, being a man, being non-binary, or being another gender. What is the relationship between our gender identity and our gender? Recently, much work has been done on ameliorative accounts of the gender concepts that we should accept and on the metaphysics of gender properties. From this work 4 views (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  30. Identities, Distinctnesses, Truthmakers, and Indiscernibility Principles.Denis Robinson - 2000 - Logique Et Analyse 43 (169-170):145-183.
    After sketching some aspects of truthmaker doctrines and "truthmaker projects", and canvassing some prima facie objections to the latter, I turn to an issue which might seem to involve confusion about the nature of character of truthmakers if such there be, viz for statements of identity and (specially) distinctness. The real issue here is versions of the Identity of Indiscernibles. I discuss ways of discriminating versions, which are almost certainly true but trivial, which almost certainly substantive but false, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  31. Immortality, Identity, and Desirability.Roman Altshuler - 2015 - In Michael Cholbi (ed.), Immortality and the Philosophy of Death. New York: Rowman & Littlefield International. pp. 191-203.
    Williams’s famous argument against immortality rests on the idea that immortality cannot be desirable, at least for human beings, and his contention has spawned a cottage industry of responses. As I will intend to show, the arguments over his view rest on both a difference of temperament and a difference in the sense of desire being used. The former concerns a difference in whether one takes a forward-looking or a backward-looking perspective on personal identity; the latter a distinction between (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  32. Regulate artificial intelligence to avert cyber arms race.Mariarosaria Taddeo & Luciano Floridi - 2018 - Nature 556 (7701):296-298.
    This paper argues that there is an urgent need for an international doctrine for cyberspace skirmishes before they escalate into conventional warfare.
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  33. Group identity and the willful subversion of rationality: A reply to De Cruz and Levy.Neil Van Leeuwen - 2024 - Mind and Language 39 (4):590-596.
    De Cruz and Levy, in their commentaries on Religion as make‐believe, present distinct questions that can be addressed by clarifying one core idea. De Cruz asks whether one can rationally assess the mental state of religious credence that I theorize. Levy asks why we should not explain the data on religious “belief” merely by positing factual beliefs with religious contents, which happen to be rationally acquired through testimony. To both, I say that having religious credences is p‐irrational: a purposeful departure (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Personal identity and persisting as many.Sara Weaver & John Turri - 2018 - In Tania Lombrozo, Joshua Knobe & Shaun Nichols (eds.), Oxford Studies in Experimental Philosophy, Volume 2. Oxford University Press. pp. 213-242.
    Many philosophers hypothesize that our concept of personal identity is partly constituted by the one-person-one-place rule, which states that a person can only be in one place at a time. This hypothesis has been assumed by the most influential contemporary work on personal identity. In this paper, we report a series of studies testing whether the hypothesis is true. In these studies, people consistently judged that the same person existed in two different places at the same time. This (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  35.  55
    Adaptive SVM Techniques for Optimized Detection of Known and Novel Cyber Intrusions.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-405.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead.
    Download  
     
    Export citation  
     
    Bookmark  
  36. Identity and Aboutness.Benjamin Brast-McKie - 2021 - Journal of Philosophical Logic 50 (6):1471-1503.
    This paper develops a theory of propositional identity which distinguishes necessarily equivalent propositions that differ in subject-matter. Rather than forming a Boolean lattice as in extensional and intensional semantic theories, the space of propositions forms a non-interlaced bilattice. After motivating a departure from tradition by way of a number of plausible principles for subject-matter, I will provide a Finean state semantics for a novel theory of propositions, presenting arguments against the convexity and nonvacuity constraints which Fine (2016, 2017a,b) introduces. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  37.  78
    Civic Identity Consisting of Moral and Political Identity among Young Adults.Hyemin Han & Kelsie J. Dawson - forthcoming - Personality and Individual Differences.
    In the present study, we tested whether civic identity consisting of moral and political identity via the bifactor model of civic identity with the Stanford Civic Purpose dataset. Previous research in youth development proposed that civic identity consists of two closely related identity constructs, i.e., moral and political identity. Given the bifactor model in factor analysis assumes the presence of both the general and specific factors, we hypothesized that the bifactor model would better fit (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Cyber-Threats: Anticipation & Strategic Management, SciencesPo, 24h, 2023.Jan Stoermann & Jean Langlois-Berthelot - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  39. Identity Categories as Potential Coalitions.Anna Carastathis - 2013 - Signs 38 (4):941-965.
    Kimberlé Williams Crenshaw ends her landmark essay “Mapping the Margins: Intersectionality, Identity Politics, and Violence against Women of Color” with a normative claim about coalitions. She suggests that we should reconceptualize identity groups as “in fact coalitions,” or at least as “potential coalitions waiting to be formed.” In this essay, I explore this largely overlooked claim by combining philosophical analysis with archival research I conducted at the Gay, Lesbian, Bisexual and Transgender Historical Society Archive in San Francisco about (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  40. On Identity Statements: In Defense of a Sui Generis View.Tristan Haze - 2016 - Disputatio 8 (43):269-293.
    This paper is about the meaning and function of identity statements involving proper names. There are two prominent views on this topic, according to which identity statements ascribe a relation: the object-view, on which identity statements ascribe a relation borne by all objects to themselves, and the name-view, on which an identity statement 'a is b' says that the names 'a' and 'b' codesignate. The object- and name-views may seem to exhaust the field. I make a (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  41. Theoretical identities may not be necessary.Alik Pelman - 2014 - Analysis 74 (3):412-422.
    Following insights from the New Theory of Reference, it has become widely accepted that theoretical identities like ‘water = H2O' are necessary. However, some have challenged this claim. I propose yet another challenge in the form of a sceptical argument. The argument is based on the contention that the necessity of theoretical identities is dependent upon criteria of identity. Thus, a theoretical identity is necessary given one criterion of identity but contingent given another. Since we do not (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  42. Identity Physicalism vs Ground Physicalism about Consciousness.Adam Pautz - forthcoming - In G. Rabin (ed.), Grounding and Consciousness. Oxford University Press.
    Unlike identity physicalism, ground physicalism does not achieve the physicalist dream. It faces the T-shirt problem for ground physicalism (Pautz 2014; Schaffer this volume; Rubenstein ms). In the case of insentient nature, it may be able to get by with small handful of very general ground laws to explain the emergence of nonfundamental objects and properties – for example, a few “principle of plenitude”. But I argue that for the case consciousness it will require a separate huge raft of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  43.  38
    Identity.Michael S. Merry - 2008 - In D. Crook & G. McCulloch (eds.), The Routledge International Encyclopedia of Education. Routledge.
    Identity in the philosophical literature has until recently be confined mostly to ruminations on the self: as soul in Plato; rationality connected to, but not coterminous with, the body in Descartes; uninterrupted consciousness in Locke; a stream of experiences which a thing has in relation to itself in Hume; an emotive life in Rousseau; as noumenal self about which we can know little in Kant; as will in Schopenhauer; as an elusive but nonspecific something in Wittgenstein; and as the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Feminism without "gender identity".Anca Gheaus - 2023 - Politics, Philosophy and Economics 22 (1):1470594X2211307.
    Talk of gender identity is at the core of heated current philosophical and political debates. Yet, it is unclear what it means to have one. I examine several ways of understanding this concept in light of core aims of trans writers and activists. Most importantly, the concept should make good trans people’s understanding of their own gender identities and help understand why misgendering is a serious harm and why it is permissible to require information about people’s gender identities in (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  45. Digital Socialism and Cyber-Communism in the Fourth Industrial Revolution.Piero Gayozzo - 2023 - Interfases 18:169-184.
    Socialism is a political ideology that proposes that the state should control the means of production to manage a planned economy. The possibility of realizing this thesis has been debated throughout the 20th century. The Fourth Industrial Revolution (4IR) includes technologies such as artificial intelligence or big data that could reopen the debate through the formulation of new digital models of planned economy. This qualitative research presents some theoretical models proposed in academia to update socialism in the 4IR. It describes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. The Identity Theory of Powers Revised.Joaquim Giannotti - 2021 - Erkenntnis 86 (3):603-621.
    Dispositionality and qualitativity are key notions to describe the world that we inhabit. Dispositionality is a matter of what a thing is disposed to do in certain circumstances. Qualitativity is a matter of how a thing is like. According to the Identity Theory of powers, every fundamental property is at once dispositional and qualitative, or a powerful quality. Canonically, the Identity Theory holds a contentious identity claim between a property’s dispositionality and its qualitativity. In the literature, this (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  47. Identity’ as a mereological term.Jeroen Smid - 2017 - Synthese 194 (7):2367-2385.
    The mereological predicate ‘is part of’ can be used to define the predicate ‘is identical with’. I argue that this entails that mereological theories can be ideologically simpler than nihilistic theories that do not use the notion of parthood—contrary to what has been argued by Ted Sider. Moreover, if one accepts an extensional mereology, there are good philosophical reasons apart from ideological simplicity to give a mereological definition of identity.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  48. The Identity of the Self over Time is Normative.David L. Thompson - manuscript
    The temporal unity of the self cannot be accounted for by the continuity of causal, factual, or contiguous relations between independently definable mental events, as proposed by Locke and Parfit. The identity of the self over time is normative: it depends on the institutional context of social rules external to the self that determine the relationship between past commitments and current responsibilities. (2005).
    Download  
     
    Export citation  
     
    Bookmark  
  49. The Identity-Enactment Account of associative duties.Saba Bazargan-Forward - 2019 - Philosophical Studies 176 (9):2351-2370.
    Associative duties are agent-centered duties to give defeasible moral priority to our special ties. Our strongest associative duties are to close friends and family. According to reductionists, our associative duties are just special duties—i.e., duties arising from what I have done to others, or what others have done to me. These include duties to abide by promises and contracts, compensate our benefactors in ways expressing gratitude, and aid those whom we have made especially vulnerable to our conduct. I argue, though, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. An Identity Crisis in Philosophy.Samuel Kahn - forthcoming - Argumenta.
    The following seems to be a truism in modern day philosophy: No agent can have had other parents (IDENTITY). IDENTITY shows up in discussions of moral luck, parenting, gene editing, and population ethics. In this paper, I challenge IDENTITY. I do so by showing that the most plausible arguments that can be made in favor of IDENTITY do not withstand critical scrutiny. The paper is divided into four sections. In the first, I document the prevalence of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 962