Results for 'liability to attack'

953 found
Order:
  1. Proportionality in the Liability to Compensate.Todd Karhu - 2022 - Law and Philosophy 41 (5):583-600.
    There is widely thought to be a proportionality constraint on harming others in self-defense, such that an act of defensive force can be impermissible because the harm it would inflict on an attacker is too great relative to the harm to the victim it would prevent. But little attention has been given to whether a corresponding constraint exists in the ethics of compensation, and, if so, what the nature of that constraint is. This article explores the issue of proportionality as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Rights, Liability, and the Moral Equality of Combatants.Uwe Steinhoff - 2012 - The Journal of Ethics 16 (4):339-366.
    According to the dominant position in the just war tradition from Augustine to Anscombe and beyond, there is no "moral equality of combatants." That is, on the traditional view the combatants participating in a justified war may kill their enemy combatants participating in an unjustified war - but not vice versa (barring certain qualifications). I shall argue here, however, that in the large number of wars (and in practically all modern wars) where the combatants on the justified side violate the (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  3. The Liability of Justified Attackers.Uwe Steinhoff - 2016 - Ethical Theory and Moral Practice 19 (4):1016-1030.
    McMahan argues that justification defeats liability to defensive attack (which would undermine the thesis of the "moral equality of combatants"). In response, I argue, first, that McMahan’s attempt to burden the contrary claim with counter-intuitive implications fails; second, that McMahan’s own position implies that the innocent civilians do not have a right of self-defense against justified attackers, which neither coheres with his description of the case (the justified bombers infringe the rights of the civilians) nor with his views (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  4. Justifying Defense Against Non-Responsible Threats and Justified Aggressors: the Liability vs. the Rights-Infringement Account.Uwe Steinhoff - 2016 - Philosophia 44 (1):247-265.
    Even among those who find lethal defense against non-responsible threats, innocent aggressors, or justified aggressors justified even in one to one cases, there is a debate as to what the best explanation of this permissibility is. The contenders in this debate are the liability account, which holds that the non-responsible or justified human targets of the defensive measures are liable to attack, and the justified infringement account, which claims that the targets retain their right not to be attacked (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  5. To Be Killed or Not to Be Killed? On McMahan’s Failure to Draw a Line between Combatants and Civilians.Uwe Steinhoff - manuscript
    In a recent paper, McMahan argues that his ‘Responsibility Account’, according to which ‘the criterion of liability to attack in war is moral responsibility for an objectively unjustified threat of harm’, can meet the challenge of explaining why most combatants on the unjustified side of a war are liable to attack while most civilians (even on the unjustified side) are not. It should be added, however, that in the light of his rejection of the ‘moral equality of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. McMahan, Symmetrical Defense and the Moral Equality of Combatants.Uwe Steinhoff - manuscript
    McMahan’s own example of a symmetrical defense case, namely his tactical bomber example, opens the door wide open for soldiers to defend their fellow-citizens (on grounds of their special obligations towards them) even if as part of this defense they target non-liable soldiers. So the soldiers on both sides would be permitted to kill each other and, given how McMahan defines “justification,” they would also be justified in doing so and hence not be liable. Thus, we arrive, against McMahan’s intentions, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Shortcomings of and Alternatives to the Rights-Forfeiture Theory of Justified Self-Defense and Punishment.Uwe Steinhoff - manuscript
    I argue that rights-forfeiture by itself is no path to permissibility at all (even barring special circumstances), neither in the case of self-defense nor in the case of punishment. The limiting conditions of self-defense, for instance – necessity, proportionality (or no gross disproportionality), and the subjective element – are different in the context of forfeiture than in the context of justification (and might even be absent in the former context). In particular, I argue that a culpable aggressor, unlike an innocent (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Liability to International Prosecution: The Nature of Universal Jurisdiction.Anthony Reeves - 2017 - European Journal of International Law 28 (4):1047-1067.
    The paper considers the proper method for theorizing about criminal jurisdiction. It challenges a received understanding of how to substantiate the right to punish, and articulates an alternative account of how that theoretical task is properly conducted. The received view says that a special relationship is the ground of a tribunal’s authority to prosecute and, hence, that a normative theory of that authority is faced with identifying a distinctive relation. The alternative account locates prosecutorial standing on an institution’s capacity to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Causation and Liability to Defensive Harm.Lars Christie - 2020 - Journal of Applied Philosophy 37 (3):378-392.
    An influential view in the ethics of self-defence is that causal responsibility for an unjust threat is a necessary requirement for liability to defensive harm. In this article, I argue against this view by providing intuitive counterexamples and by revealing weaknesses in the arguments offered in its favour. In response, adherents of the causal view have advanced the idea that although causally inefficacious agents are not liable to defensive harm, the fact that they may deserve harm can justify harming (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10. Firth and Quong on Liability to Defensive Harm: A Critique.Uwe Steinhoff - manuscript
    Joanna Mary Firth and Jonathan Quong argue that both an instrumental account of liability to defensive harm, according to which an aggressor can only be liable to defensive harms that are necessary to avert the threat he poses, and a purely noninstrumental account which completely jettisons the necessity condition, lead to very counterintuitive implications. To remedy this situation, they offer a “pluralist” account and base it on a distinction between “agency rights” and a “humanitarian right.” I argue, first, that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. What Follows from Defensive Non-Liaibility?Gerald Lang - 2017 - Proceedings of the Aristotelian Society 117 (3):231-252.
    Theories of self-defence tend to invest heavily in ‘liability justifications’: if the Attacker is liable to have defensive violence deployed against him by the Defender, then he will not be wronged by such violence, and selfdefence becomes, as a result, morally unproblematic. This paper contends that liability justifications are overrated. The deeper contribution to an explanation of why defensive permissions exist is made by the Defender’s non-liability. Drawing on both canonical cases of self-defence, featuring Culpable Attackers, and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  12. How to Attack a Non-Strawman: a Reply to the Andrew I. Cohen Review of Escape from Leviathan.J. C. Lester - manuscript
    Primarily using philosophy, but also some social science, Escape from Leviathan (EfL) explains and defends what it calls an extreme version of the implicit ‘classical liberal compatibility thesis’: liberty, welfare, and anarchy are overwhelmingly complementary in normal practice (rationality is added for its intimate theoretical connections to these categories). This is done using theories, not definitions, of each concept. This important thesis is entirely positive. Therefore, somewhat unusually, all normative issues are avoided as irrelevant distractions in this context. In addition, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Rights Forfeiture and Liability to Harm.Massimo Renzo - 2017 - Journal of Political Philosophy 25 (3):324-342.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  14. How not to attack animal rights from an environmental perspective.Comstock Gary - 1988 - Between the Species 4 (3):7.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Complicitous liability in war.Saba Bazargan - 2013 - Philosophical Studies 165 (1):177-195.
    Jeff McMahan has argued against the moral equivalence of combatants (MEC) by developing a liability-based account of killing in warfare. On this account, a combatant is morally liable to be killed only if doing so is an effective means of reducing or eliminating an unjust threat to which that combatant is contributing. Since combatants fighting for a just cause generally do not contribute to unjust threats, they are not morally liable to be killed; thus MEC is mistaken. The problem, (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  17. A Teleosemantic Response to Burge’s Attack on Semantic Reductionism.Sérgio Farias de Souza Filho - 2024 - Erkenntnis:1-19.
    Tyler Burge is famous for defending primitivist naturalism about mental representations, according to which mental representations are primitive natural states. Primitivist naturalism contrasts with semantic reductionism, according to which mental representations are reducible to more fundamental natural states. Burge developed the most compelling and influential attack on semantic reductionism from a primitivist naturalist point of view. My goal in this paper is to defend semantic reduc- tionism from Burge’s attack. I assess and refute his objection to the motivations (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Defensive Liability Without Culpability.Saba Bazargan-Forward - 2016 - In Christian Coons & Michael Weber (eds.), The Ethics of Self-Defense. New York, NY: Oxford University Press USA.
    A minimally responsible threatener is someone who bears some responsibility for imposing an objectively wrongful threat, but whose responsibility does not rise to the level of culpability. Minimally responsible threateners include those who knowingly commit a wrongful harm under duress, those who are epistemically justified but mistaken in their belief that a morally risky activity will not cause a wrongful harm, and those who commit a harm while suffering from a cognitive impairment which makes it prohibitively difficult to recognize and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Civil liability and the 50%+ standard of proof.Martin Smith - 2021 - International Journal of Evidence and Proof 25 (3):183-199.
    The standard of proof applied in civil trials is the preponderance of evidence, often said to be met when a proposition is shown to be more than 50% likely to be true. A number of theorists have argued that this 50%+ standard is too weak – there are circumstances in which a court should find that the defendant is not liable, even though the evidence presented makes it more than 50% likely that the plaintiff’s claim is true. In this paper, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  20. Heart attack analysis & Prediction: A Neural Network Approach with Feature Analysis.Majd N. Allouh & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (9):47-54.
    heart attack analysis & prediction dataset is a major cause of death worldwide. Early detection and intervention are essential for improving the chances of a positive outcome. This study presents a novel approach to predicting the likelihood of a person having heart failure using a neural network model. The dataset comprises 304 samples with 11 features, such as age, sex, chest pain type, Trtbps, cholesterol, fasting blood sugar, resting electrocardiogram results, maximum heart rate achieved, exercise-induced angina, oldpeak, ST_Slope, and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  21. Just saying, just kidding : liability for accountability-avoiding speech in ordinary conversation, politics and law.Elisabeth Camp - 2022 - In Laurence R. Horn (ed.), From lying to perjury: linguistic and legal perspective on lies and other falsehoods. Boston: De Gruyter Mouton. pp. 227-258.
    Mobsters and others engaged in risky forms of social coordination and coercion often communicate by saying something that is overtly innocuous but transmits another message ‘off record’. In both ordinary conversation and political discourse, insinuation and other forms of indirection, like joking, offer significant protection from liability. However, they do not confer blanket immunity: speakers can be held to account for an ‘off record’ message, if the only reasonable interpreta- tions of their utterance involve a commitment to it. Legal (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  22. The Search for Liability in the Defensive Killing of Nonhuman Animals.Cheryl Abbate & C. E. Abbate - 2015 - Social Theory and Practice 41 (1):106-130.
    While theories of animal rights maintain that nonhuman animals possess prima facie rights, such as the right to life, the dominant philosophies of animal rights permit the killing of nonhuman animals for reasons of self-defense. I argue that the animal rights discourse on defensive killing is problematic because it seems to entail that any nonhuman animal who poses a threat to human beings can be justifiably harmed without question. To avoid this human-privileged conclusion, I argue that the animal rights position (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  23. Adversarial Attacks on Image Generation With Made-Up Words.Raphaël Millière - manuscript
    Text-guided image generation models can be prompted to generate images using nonce words adversarially designed to robustly evoke specific visual concepts. Two approaches for such generation are introduced: macaronic prompting, which involves designing cryptic hybrid words by concatenating subword units from different languages; and evocative prompting, which involves designing nonce words whose broad morphological features are similar enough to that of existing words to trigger robust visual associations. The two methods can also be combined to generate images associated with more (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Is the risk–liability theory compatible with negligence law?Toby Handfield & Trevor Pisciotta - 2005 - Legal Theory 11 (4):387-404.
    David McCarthy has recently suggested that our compensation and liability practices may be interpreted as reflecting a fundamental norm to hold people liable for imposing risk of harm on others. Independently, closely related ideas have been criticised by Stephen R. Perry and Arthur Ripstein as incompatible with central features of negligence law. We aim to show that these objections are unsuccessful against McCarthy’s Risk–liability theory, and that such an approach is a promising means both for understanding the moral (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  25. Liability, community, and just conduct in war.Jonathan Parry - 2015 - Philosophical Studies 172 (12):3313-3333.
    Those of us who are not pacifists face an obvious challenge. Common-sense morality contains a stringent constraint on intentional killing, yet war involves homicide on a grand scale. If wars are to be morally justified, it needs be shown how this conflict can be reconciled. A major fault line running throughout the contemporary just war literature divides two approaches to attempting this reconciliation. On a ‘reductivist’ view, defended most prominently by Jeff McMahan, the conflict is largely illusory, since such killing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  26. Strategies of Character Attack.Fabrizio Macagno - 2013 - Argumentation 27 (4):1-33.
    Why are personal attacks so powerful? In political debates, speeches, discussions and campaigns, negative character judgments, aggressive charges and charged epithets are used for different purposes. They can block the dialogue, trigger value judgments and influence decisions; they can force the interlocutor to withdraw a viewpoint or undermine his arguments. Personal attacks are not only multifaceted dialogical moves, but also complex argumentative strategies. They can be considered as premises for further arguments based on signs, generalizations or consequences. They involve tactics (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  27. Necessity and Liability: On an Honour-Based Justification for Defensive Harming.Joseph Bowen - 2016 - Journal of Practical Ethics 4 (2):79-93.
    This paper considers whether victims can justify what appears to be unnecessary defensive harming by reference to an honour-based justification. I argue that such an account faces serious problems: the honour-based justification cannot permit, first, defensive harming, and second, substantial unnecessary harming. Finally, I suggest that, if the purpose of the honour based justification is expressive, an argument must be given to demonstrate why harming threateners, as opposed to opting for a non-harmful alternative, is the most effective means of affirming (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  28. Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework.Tosin ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:8.
    The ever-evolving ways attacker continues to improve their phishing techniques to bypass existing state-of-the-art phishing detection methods pose a mountain of challenges to researchers in both industry and academia research due to the inability of current approaches to detect complex phishing attack. Thus, current anti-phishing methods remain vulnerable to complex phishing because of the increasingly sophistication tactics adopted by attacker coupled with the rate at which new tactics are being developed to evade detection. In this research, we proposed an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  30. The Attack on Liberalism.Mark R. Reiff - 2007 - In Michael D. A. Freeman & Ross Harrison (eds.), Law and philosophy. New York: Oxford University Press.
    Liberalism is today under attack. This attack is being fought along two fronts, and so appears to be coming from different directions, but it is actually coming exclusively from the right. One source is Islamic fundamentalism, and the other is American neo-conservatism, which in turn unites elements of Christian fundamentalism with elements of neo-Platonic political philosophy and neo-Aristotelian moral theory. Both Islamic fundamentalism and American neo-conservatism are perfectionist views, and while perfectionist attacks on liberalism are nothing new, there (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  31. (1 other version) Probabilistic interpretations of argumentative attacks: logical and experimental foundations.Niki Pfeifer & C. G. Fermüller - 2018 - In V. Kratochvíl & J. Vejnarová (eds.), 11th Workshop on Uncertainty Processing (WUPES'18). pp. 141-152.
    We present an interdisciplinary approach to study systematic relations between logical form and attacks between claims in an argumentative framework. We propose to generalize qualitative attack principles by quantitative ones. Specifically, we use coherent conditional probabilities to evaluate the rationality of principles which govern the strength of argumentative attacks. Finally, we present an experiment which explores the psychological plausibility of selected attack principles.
    Download  
     
    Export citation  
     
    Bookmark  
  32. Material Contribution, Responsibility, and Liability.Christian Barry - 2018 - Journal of Moral Philosophy 15 (6):637-650.
    In her inventive and tightly argued book Defensive Killing, Helen Frowe defends the view that bystanders—those who do not pose threats to others—cannot be liable to being harmed in self-defence or in defence of others. On her account, harming bystanders always infringes their rights against being harmed, since they have not acted in any way to forfeit them. According to Frowe, harming bystanders can be justified only when it constitutes a lesser evil. In this brief essay, I make the case (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Science Under Attack.Nicholas Maxwell - 2005 - The Philosopher’s Magazine 31:37-41.
    Science has been under attack ever since William Blake and Romantic movement. In our time, criticisms of modern science have led to Alan Sokal's spoof, and the so-called science wars. Both sides missed the point. Science deserves to be criticized for seriously misrepresenting its highly problematic aims, which have metaphysical, value and political assumptions associated with them. Instead of repressing these problematic aims, science ought rather to make them explicit, so that they can be critically assessed and, we may (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  34. Attacking authority.Matthews Steve - 2011 - Australian Journal of Professional and Applied Ethics 13 (2):59-70.
    The quality of our public discourse – think of the climate change debate for instance – is never very high. A day spent observing it reveals a litany of misrepresentation and error, argumentative fallacy, and a general lack of good will. In this paper I focus on a microcosmic aspect of these practices: the use of two types of argument – the argumentum ad hominem and appeal to authority – and a way in which they are related. Public debate is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  71
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup 99) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. The Mens Rea of Accomplice Liability: Supporting Intentions.Sherif Girgis - 2013 - Yale Law Journal 123:460-494.
    Accomplice liability makes someone guilty of a crime he never committed, so long as he helped or influenced the perpetrator and did so with the required mens rea. Just what that mens rea should be has been contested for more than a century. Here I consider three major approaches and find them all wanting. I propose rejecting their common (but rarely questioned) assumption that what matters is the helper’s mental state toward the perpetrator’s commission of an offense. I suggest (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  37. The doctrine of vicarious liability and justification for its existence in Zimbabwe's law of delict.Tatenda Ngara - manuscript
    The doctrine of vicarious liability provides that an employer is vicariously or indirectly liable for all delicts or violations of the law committed by his or her employees when they are acting in the course and within the scope of their employment at the time when a delict is committed. In simple terms it is law that imposes liability on employers for the wrong doings of their employees. Some of the reasons why it has been justifiable to have (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Israel’s attack on gaza: some philosophical reflections [online].Peter Cave - 2024 - Daily Philosophy.
    The attachment for download here merely references my 5,500-word final and extended article, criticising those who seek to justify Israeli attacks on Gaza. The article is published online by Daily Philosophy, 5th January 2024, link shown below. -/- After a background of facts (probably well-known by readers concerned about the matters), the article examines typical arguments much used in the media as attempts to justify Israel’s determined destruction of Gaza, involving well over twenty thousand Palestinians killed, hundreds of thousands suffering (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  62
    The Hypothetical Imperative as an Indicator of Irrational Will: The Case of the 2018 Toronto Van Attack.Kevin Michael Stevenson - 2023 - International Journal of Theology, Philosophy and Science 7 (13):13-23.
    The categorical imperative inherent in Kant’s ethics has had indubitable historical influence on societies worldwide whether in the form of laws, democracy or public deliberation. The Toronto Van Attack of 2018 and its subsequent legal trial is a case example that shows how the categorical imperative can be applied to assist in understanding the reasoning for the case’s guilty verdict. This paper will convey the applicability of the categorical imperative for examining criminal case studies by closing the gap between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Frege's attack on Husserl and Cantor.Claire Ortiz Hill - 1994 - The Monist 77 (3):345 - 357.
    By drawing attention to these facts and to the relationship between Cantor’s and Husserl's ideas, I have tried to contribute to putting Frege's attack on Husserl "in the proper light" by providing some insight into some of the issues underling criticisms which Frege himself suggested were not purely aimed at Husserl's book. I have tried to undermine the popular idea that Frege's review of the Philosophy of Arithmetic is a straightforward, objective assessment of Husserl’s book, and to give some (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  41. (1 other version)Bioethics, Complementarity, and Corporate Criminal Liability.Ryan Long - 2017 - International Criminal Law Review 17 (6):997-1021.
    This article provides a brief introduction to some contemporary challenges found in the intersection of bioethics and international criminal law involving genetic privacy, organ trafficking, genetic engineering, and cloning. These challenges push us to re-evaluate the question of whether the international criminal law should hold corporations criminally liable. I argue that a minimalist and Strawsonian conception of corporate responsibility could be useful for deterring the wrongs outlined in first few sections and in answering compelling objections to corporate criminal liability.
    Download  
     
    Export citation  
     
    Bookmark  
  42. Xenophobic Attacks on Nigerians in South Africa: Ethical implications and Responses of the Nigerian Government.Big-Alabo Sotonye & Big-Alabo Tamunopubo - 2020 - International Journal of Multidisciplinary Research and Development 7 (3):36-41.
    This study examines the xenophobic attacks on Nigerians in South Africa, its ethical implications and responses of the Nigerian government. The study was guided by two objectives while it adopted the normative theory by Plato and Aristotle. The study looked at conceptual clarification like the concept of xenophobia. The study adopted ex-post research design while data was sourced through secondary source such as textbooks, journal articles, newspapers, magazines and internet while the data generated was analyzed through content analysis. The findings (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Generative AI in EU Law: Liability, Privacy, Intellectual Property, and Cybersecurity.Claudio Novelli, Federico Casolari, Philipp Hacker, Giorgio Spedicato & Luciano Floridi - 2024 - Computer Law and Security Review 4.
    The complexity and emergent autonomy of Generative AI systems introduce challenges in predictability and legal compliance. This paper analyses some of the legal and regulatory implications of such challenges in the European Union context, focusing on four areas: liability, privacy, intellectual property, and cybersecurity. It examines the adequacy of the existing and proposed EU legislation, including the Artificial Intelligence Act (AIA), in addressing the challenges posed by Generative AI in general and LLMs in particular. The paper identifies potential gaps (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. The Terrorist Attacks in Norway, July 22nd 2011— Some Kantian Reflections.Helga Varden - 2014 - Norsk Filosofisk Tidsskrift 49 (3-4):236-259.
    This paper provides a Kantian interpretation of core issues involved in the trial following the terrorist attacks that struck Norway on July 22nd 2011. After a sketch of the controversies surrounding the trial itself, a Kantian theory of why the wrongdoer’s mind struck us as so endlessly disturbed is presented. This Kantian theory, I proceed by arguing, also helps us understand why it was so important to respond to the violence through the legal system and to treat the perpetrator, Anders (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  45. Another attack on Evolution, Rationality and Civilization. A review of Nowak and Highfield ‘SuperCooperators’ (2012).Starks Michael - 2016 - In Michael Starks (ed.), Suicidal Utopian Delusions in the 21st Century: Philosophy, Human Nature and the Collapse of Civilization-- Articles and Reviews 2006-2017 2nd Edition Feb 2018. Las Vegas, USA: Reality Press. pp. 555-560.
    Nowak is (or was) a respected Harvard professor of mathematical biology with numerous well regarded publications. Sadly, he has chosen to launch an arrogant attack on science motivated by religious fervor. His recent actions show the evil consequences when universities accept money from religious groups, science journals are so awed by big names that they avoid proper peer review, and egos are permitted to get out of control. Most of this book is good, but it repeats the utterly misconceived (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Ultimate Integrity: A Reformulation of Unlimited Liability.Christopher Maier - 2023 - Canadian Journal of Practical Philosophy 10 (1).
    An examination of the idea of Unlimited Liability found in the Canadian Armed Forces’ (CAF) ethos as a reason for the acceptance of lethal risk tasking faced by members of the CAF. This paper argues that the idea of unlimited liability is at best unhelpful as a concept and needs to be replaced with the concept of ‘ultimate integrity.’ This new concept links directly to the CAF’s first ethical principle – respect the dignity of all persons. This new (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Experimental Evidence against Pyrrhonism: Attacking a Straw Man.Diego E. Machuca - 2022 - Dialogue 61 (1):123-138.
    In a recent article, Mario Attie-Picker maintains that a number of experimental studies provide evidence against Sextus Empiricus’s empirical claims about both the connection between belief and anxiety and the connection between suspension of judgement and undisturbedness. In this article, I argue that Sextus escapes unharmed from the challenge raised by the studies in question for the simple reason that he does not make the claims ascribed to him. In other words, I argue that Attie-Picker is attacking a straw man.
    Download  
     
    Export citation  
     
    Bookmark  
  48. Enhancing Reduced Risk of Obese Patient Exposure to COVID-19 Attack through Food and Nutritional Adjustment.Patience Abosede Olunusi & Motunrayo Risikat Asunmo - 2023 - International Journal of Home Economics, Hospitality and Allied Research 2 (2):206-218.
    The COVID-19 pandemic is a major global challenge. There are several risk factors associated with mortality in patients with COVID-19, including age, gender, diabetes mellitus, cerebrovascular, cardiovascular, and pulmonary diseases. Among these factors, patients with cardiovascular disease, diabetes mellitus, and obesity have the highest mortality rates. This paper aims to review how adjusting food and nutrition can help reduce the risk of obese patients contracting COVID-19. Various literature sources were examined, including studies on the genetics of obesity and the consequences (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. The Benefits of Experience Greatly Exceed the Liabilities.Ethan Bradley & David Wasserman - 2023 - American Journal of Bioethics 23 (1):44-46.
    Nelson et al.(2023) argue that the inclusion of personal experience in bioethical debates has significant benefits and liabilities, illustrating their claim with two examples: unproven medical treatments and disability bioethics. We believe that the benefits of including personal experience in disability bioethics far exceed its liabilities. The absence of participants with relevant experience impoverishes and biases bioethical debates, while the biases risked by their inclusion are hardly unique to personal experiences and are readily mitigated.
    Download  
     
    Export citation  
     
    Bookmark  
  50. Two Paradoxes of Common Knowledge: Coordinated Attack and Electronic Mail.Harvey Lederman - 2018 - Noûs 52 (4):921-945.
    The coordinated attack scenario and the electronic mail game are two paradoxes of common knowledge. In simple mathematical models of these scenarios, the agents represented by the models can coordinate only if they have common knowledge that they will. As a result, the models predict that the agents will not coordinate in situations where it would be rational to coordinate. I argue that we should resolve this conflict between the models and facts about what it would be rational to (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
1 — 50 / 953