Results for 'threat sensitivity'

970 found
Order:
  1. Testimonial Knowledge and Context-Sensitivity: a New Diagnosis of the Threat.Alex Davies - 2019 - Acta Analytica 34 (1):53-69.
    Epistemologists typically assume that the acquisition of knowledge from testimony is not threatened at the stage at which audiences interpret what proposition a speaker has asserted. Attention is instead typically paid to the epistemic status of a belief formed on the basis of testimony that it is assumed has the same content as the speaker’s assertion. Andrew Peet has pioneered an account of how linguistic context sensitivity can threaten the assumption. His account locates the threat in contexts in (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  2. Knowledge Under Threat.Tomas Bogardus - 2014 - Philosophy and Phenomenological Research 88 (2):289-313.
    Many contemporary epistemologists hold that a subject S’s true belief that p counts as knowledge only if S’s belief that p is also, in some important sense, safe. I describe accounts of this safety condition from John Hawthorne, Duncan Pritchard, and Ernest Sosa. There have been three counterexamples to safety proposed in the recent literature, from Comesaña, Neta and Rohrbaugh, and Kelp. I explain why all three proposals fail: each moves fallaciously from the fact that S was at epistemic risk (...)
    Download  
     
    Export citation  
     
    Bookmark   75 citations  
  3. AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):76-83.
    Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, presenting substantial dangers to the data, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Do More Informed Citizens Make Better Climate Policy Decisions?Michael Lokshin, Ivan Torre, Michael Hannon & Miguel Purroy - manuscript
    This study explores the relationship between perceptions of catastrophic events and beliefs about climate change. Using data from the 2023 Life in Transition Survey, the study finds that contrary to conventional wisdom, more accurate knowledge about past catastrophes is associated with lower concern about climate change. The paper proposes that heightened threat sensitivity may underlie both the tendency to overestimate disaster impacts and increased concern about climate change. The findings challenge the assumption that a more informed citizenry necessarily (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. From the sensitive thing to the aesthetic thing: The passage from instrumentalization to the configuration of the world.Jessica Lombard - 2023 - Itinera - Rivista di Filosofia E di Teoria Delle Arti 25:401-417.
    Through Heidegger’s re-reading of Descartes, this article explores a fundamental issue in the contemporary conception of worldliness. In a restricted sense, the human being is the maker of the world in that he appropriates what composes it, i.e., the worldly beings or things. Greatly influenced by the Cartesian notion of extensio, this tendency no longer entails the world as a thing in itself, but as a set of measurable things, thus available and open to activity. This article articulates the (...) relative to the idea of the forming, by the human being, of the essence of the world. Every being, be it an object, an animal or even a human being, seems to be considered as a producer of energy and a structure that could be possessed. For example, such natural space is not campaign or land, but automatically field, that is to say, an agricultural deposit that is symbolically exploited and empirically exploitable. This ontological device prevents us from grasping the world in any other way than in terms of use and productivity. As a result, the ontology of the thing becomes an aesthetic issue in its own right. This issue does not involve here the capture of the object as a bearer of Beauty, but an aesthetic relation in the fundamentally etymological sense (αἰσθητικός) of what is felt, of what is sensible and perceptible. The need for an aesthetic rereading of the world and the things that stand in it presupposes, therefore, the evolution of the human gaze and a metaphysical approach to worldliness, detached from the instrumentalization of the beings and focused on their presence or their proximity. This article aims at demonstrating the necessity of a real human aesthetic responsibility, which can be concretized in the metaphysical thought of the thing that the human being unfolds, by considering it as the persistence in the world of an object whose ontological disposition could never be neutral. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. (1 other version)Spanish slurs and stereotypes for Mexican-Americans in the USA: A context-sensitive account of derogation and appropriation.Adam M. Croom - 2014 - Pragmática Sociocultural 2 (2):145-179.
    Slurs such as spic, slut, wetback, and whore are linguistic expressions that are primarily understood to derogate certain group members on the basis of their descriptive attributes and expressions of this kind have been considered to pack some of the nastiest punches natural language affords. Although prior scholarship on slurs has uncovered several important facts concerning their meaning and use –including that slurs are potentially offensive, are felicitously applied towards some targets yet not others, and are often flexibly used not (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  7.  93
    OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. This paper (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Can We Perceive the Past?E. J. Green - forthcoming - In Lynn Nadel & Sara Aronowitz (eds.), Space, Time, and Memory. Oxford University Press.
    A prominent view holds that perception and memory are distinguished at least partly by their temporal orientation: Perception functions to represent the present, while memory functions to represent the past. Call this view perceptual presentism. This chapter critically examines perceptual presentism in light of contemporary perception science. I adduce evidence for three forms of perceptual sensitivity to the past: (i) shaping perception by past stimulus exposure, (ii) recruitment of mnemonic representations in perceptual processing, and (iii) perceptual representation of present (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Reversing logical nihilism.Tristan Grøtvedt Haze - 2022 - Synthese 200 (3):1-18.
    Gillian Russell has recently proposed counterexamples to such elementary argument forms as Conjunction Introduction and Identity. These purported counterexamples involve expressions that are sensitive to linguistic context—for example, a sentence which is true when it appears alone but false when embedded in a larger sentence. If they are genuine counterexamples, it looks as though logical nihilism—the view that there are no valid argument forms—might be true. In this paper, I argue that the purported counterexamples are not genuine, on the grounds (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  10.  57
    OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Anxiety: A Case Study on the Value of Negative Emotions.Charlie Kurth - 2011 - In Christine Tappolet, Fabrice Teroni & Anita Konzelman Ziv (eds.), Philosophical Perspectives on Negative Emotions: Shadows of the Soul. New York: Routledge. pp. 95-104.
    Negative emotions are often thought to lack value—they’re pernicious, inherently unpleasant, and inconsistent with human virtue. Taking anxiety as a case study, I argue that this assessment is mistaken. I begin with an account of what anxiety is: a response to uncertainty about a possible threat or challenge that brings thoughts about one’s predicament (‘I’m worried,’ ‘What should I do?’), negatively valenced feelings of concern, and a motivational tendency toward caution regarding the potential threat one faces. Given this (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  12. Objective smells and partial perspectives.Giulia Martina - 2021 - Rivista di Estetica 3 (78):27-46.
    The thesis that smells are objective and independent of perceivers may seem to be in tension with the phenomenon of perceptual variation. In this paper, I argue that there are principled reasons to think that perceptual variation is not a threat to objectivism about smells and is indeed integral to our perceptual relation to the objective world. I first distinguish various kinds of perceptual variation, and argue that the most challenging cases for the objectivist are those where an odourant (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Fictional Persuasion and the Nature of Belief.Asbjørn Steglich-Petersen - 2017 - In Ema Sullivan-Bissett, Helen Bradley & Paul Noordhof (eds.), Art and Belief. Oxford: Oxford University Press. pp. 174-193.
    Psychological studies on fictional persuasion demonstrate that being engaged with fiction systematically affects our beliefs about the real world, in ways that seem insensitive to the truth. This threatens to undermine the widely accepted view that beliefs are essentially regulated in ways that tend to ensure their truth, and may tempt various non-doxastic interpretations of the belief-seeming attitudes we form as a result of engaging with fiction. I evaluate this threat, and argue that it is benign. Even if the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  14. Authenticity in Political Discourse.Ben Jones - 2016 - Ethical Theory and Moral Practice 19 (2):489-504.
    Judith Shklar, David Runciman, and others argue against what they see as excessive criticism of political hypocrisy. Such arguments often assume that communicating in an authentic manner is an impossible political ideal. This article challenges the characterization of authenticity as an unrealistic ideal and makes the case that its value can be grounded in a certain political realism sensitive to the threats posed by representative democracy. First, by analyzing authenticity’s demands for political discourse, I show that authenticity has greater flexibility (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  15. (1 other version)Semantics as Measurement.Derek Ball - 2018 - In Derek Ball & Brian Rabern (eds.), The Science of Meaning: Essays on the Metatheory of Natural Language Semantics. Oxford: Oxford University Press. pp. 381-410.
    This chapter defends a view of semantics on which developing a semantic theory closely resembles developing a scale of measurement. The view helps explain how semantics has made so much progress despite deep disagreements about the target of semantic theorizing (e.g., between those who maintain that semantics is characterizing something psychological, and those who maintain that it is characterizing something social), how appeals to set-theoretic abstracta make sense despite Benacerraf-style worries and despite the fact that set-theoretic entities fit badly with (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Is judicial review undemocratic?Annabelle Lever - 2009 - Perspectives on Politics 7 (4):897-915.
    This paper examines Jeremy Waldron’s ‘core case’ against judicial review. Waldron’s arguments, it shows, exaggerate the importance of voting to our judgements about the legitimacy and democratic credentials of a society and its government. Moreover, Waldron is insufficiently sensitive to the ways that judicial review can provide a legitimate avenue of political activity for those seeking to rectify historic injustice. While judicial review is not necessary for democratic government, the paper concludes that Waldron is wrong to believe that it is (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  17. (1 other version)How Manipulation Arguments Mischaracterize Determinism (author's original manuscript).Paul Torek - 2023 - Philosophical Papers 51 (3):457-475.
    I outline a heretofore neglected difference between manipulation scenarios and merely deterministic ones. Plausible scientific determinism does not imply that the relevant prior history of the universe is independent of us, while manipulation does. Owing to sensitive dependence of physical outcomes upon initial conditions, in order to trace a deterministic history, a microphysical level of analysis is required. But on this level physical laws are time-symmetrically deterministic, and causality, conceived asymmetrically, disappears. I then consider a revised scenario to resurrect the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Some Reflections on Conventions.Carlo Penco & Massimiliano Vignolo - 2019 - Croatian Journal of Philosophy 19 (3):375-402.
    In Overlooking Conventions Michael Devitt argues in defence of the traditional approach to semantics. Devitt’s main line of argument is an inference to the best explanation: nearly all cases that linguistic pragmatists discuss in order to challenge the traditional approach to semantics are better explained by adding conventions into language, in the form of expanding the range of polysemy or the range of indexicality (in the broad sense of linguistically governed context sensitivity). In this paper, we discuss three aspects (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Apprehending anxiety: an introduction to the Topical Collection on worry and wellbeing.Juliette Vazard & Charlie Kurth - 2022 - Synthese 200 (4):1-17.
    The aim of this collection is to show how work in the analytic philosophical tradition can shed light on the nature, value, and experience of anxiety. Contrary to widespread assumptions, anxiety is not best understood as a mental disorder, or an intrinsically debilitating state, but rather as an often valuable affective state which heightens our sensitivity to potential threats and challenges. As the contributions in this volume demonstrate, learning about anxiety can be relevant for debates, not only in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. (1 other version)Lessons in Conflict of Interest: The Construction of the Martyrdom of David Healy and The Dilemma of Bioethics.James Coyne - 2005 - American Journal of Bioethics 5 (1):W3-W14.
    Bioethics journals have lagged behind medical and science journals in exploring the threat of conflict of interest (COI) to the integrity of publications. Some recent discussions of COI that have occurred in the bioethics literature are reviewed. Discussions of what has been termed the ?Healy affair? unintentionally demonstrate that the direct and indirect influence of undisclosed COI may come from those who call for protection from the undue influence of industry. Paradoxically, the nature and tone of current discussions may (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. A philosophical critique of Feminism: From the third wave to the fourth wave.Mohammed Xolile Ntshangase - 2021 - African Journal of Gender, Society and Development 10 (2):25-40.
    Feminism has been a good movement with the noble aim of freeing the world from the shackles of an evil superiority of men over women. The principal of feminism as a movement was political equality between men and women. In itself, it was a fair and just course such that it was inclusive of men as well, men were also part of the movement with no insults, threats, and hate speech. But in this technological era some impurities have also crept (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Religious Controversies in COVID-19 Restrictions, State, Science, Conspiracies: Four Topics with Theological-Ethical Responses.Christoph Stueckelberger & Tudor Cosmin Ciocan - 2020 - Dialogo 6 (2):168-185.
    The new Coronavirus, namely Sars-CoV-2, took the world by surprise and grew into a pandemic worldwide in a couple of months since the beginning of 2020. It managed to lockdown at home almost half of the world population under the threat of illness and sudden death. Due to the extreme medical advises of containing the spread and damages of this threat, mostly directed towards social distancing, public gatherings cancelation, and contact tracing, each State imposed such regulations to their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  73
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. The Effects of Fake News on Consumers’ Brand Trust: An Exploratory Study in the Food Security Context.Farte Gheorghe-Ilie & Obadă Rareș - 2021 - Romanian Journal of Communication and Public Relations 23 (3):47-61.
    The aim of this study is to explore the effects of fake news on consumers’ brand trust in the food security context. The starting point of our research is the finding that issues related to food security cannot be addressed without the contribution of multinational food corporations. The efficiency of their intervention depends on their capacity to build and preserve their brand trust despite the multifarious fake news stories that contaminate the information flow. Is brand trust sensitive to fake news? (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  12
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2024 - International Journal of Engineering Innovations and Management Strategies 5 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short- Term Memory (LSTM) and Convolutional Neural Networks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  14
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short-Term Memory (LSTM) and Convolutional Neural Networks (CNNs), (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Sensitivity, Safety, and Epistemic Closure.Bin Zhao - 2022 - International Journal of Philosophical Studies 30 (1):56-71.
    It has been argued that an advantage of the safety account over the sensitivity account is that the safety account preserves epistemic closure, while the sensitivity account implies epistemic closure failure. However, the argument fails to take the method-relativity of the modal conditions on knowledge, viz., sensitivity and safety, into account. In this paper, I argue that the sensitivity account and the safety account are on a par with respect to epistemic closure once the method-relativity of (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  28. Sensitivity Actually.Michael Blome-Tillmann - 2017 - Philosophy and Phenomenological Research 94 (3):606-625.
    A number of prominent epistemologists claim that the principle of sensitivity “play[s] a starring role in the solution to some important epistemological problems”. I argue that traditional sensitivity accounts fail to explain even the most basic data that are usually considered to constitute their primary motivation. To establish this result I develop Gettier and lottery cases involving necessary truths. Since beliefs in necessary truths are sensitive by default, the resulting cases give rise to a serious explanatory problem for (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  29. Sensitivity, safety, and impossible worlds.Guido Melchior - 2021 - Philosophical Studies 178 (3):713-729.
    Modal knowledge accounts that are based on standards possible-worlds semantics face well-known problems when it comes to knowledge of necessities. Beliefs in necessities are trivially sensitive and safe and, therefore, trivially constitute knowledge according to these accounts. In this paper, I will first argue that existing solutions to this necessity problem, which accept standard possible-worlds semantics, are unsatisfactory. In order to solve the necessity problem, I will utilize an unorthodox account of counterfactuals, as proposed by Nolan, on which we also (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  30. Saving Sensitivity.Brett Topey - 2021 - Philosophical Quarterly 72 (1):177-196.
    Sensitivity has sometimes been thought to be a highly epistemologically significant property, serving as a proxy for a kind of responsiveness to the facts that ensure that the truth of our beliefs isn’t just a lucky coincidence. But it's an imperfect proxy: there are various well-known cases in which sensitivity-based anti-luck conditions return the wrong verdicts. And as a result of these failures, contemporary theorists often dismiss such conditions out of hand. I show here, though, that a (...)-based understanding of epistemic luck can be developed that respects what was attractive about sensitivity-based approaches in the first place but that's immune to these failures. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  31. Sensitivity and inductive knowledge revisited.Guido Melchior - forthcoming - Dialectica.
    The orthodox view about sensitivity and induction has it that beliefs formed via induction are insensitive. Since inductive knowledge is highly plausible, this problem is usually regarded as a reductio argument against sensitivity accounts of knowledge. Some adherents of sensitivity defend sensitivity against this objection, for example by considering backtracking interpretations of counterfactuals. All these extant views about sensitivity and induction have to be revised, since the problem of sensitivity and induction is a different (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  32. Emerging viral threats and the simultaneity of the non-simultaneous: zooming out in times of Corona.Hub Zwart - 2020 - Medicine, Health Care and Philosophy 23 (4):589-602.
    This paper addresses global bioethical challenges entailed in emerging viral diseases, focussing on their socio-cultural dimension and seeing them as symptomatic of the current era of globalisation. Emerging viral threats exemplify the extent to which humans evolved into a global species, with a pervasive and irreversible impact on the planetary ecosystem. To effectively address these disruptive threats, an attitude of preparedness seems called for, not only on the viroscientific, but also on bioethical, regulatory and governance levels. This paper analyses the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Sensitivity, Causality, and Statistical Evidence in Courts of Law.Michael Blome-Tillmann - 2015 - Thought: A Journal of Philosophy 4 (2):102-112.
    Recent attempts to resolve the Paradox of the Gatecrasher rest on a now familiar distinction between individual and bare statistical evidence. This paper investigates two such approaches, the causal approach to individual evidence and a recently influential (and award-winning) modal account that explicates individual evidence in terms of Nozick's notion of sensitivity. This paper offers counterexamples to both approaches, explicates a problem concerning necessary truths for the sensitivity account, and argues that either view is implausibly committed to the (...)
    Download  
     
    Export citation  
     
    Bookmark   45 citations  
  34. Where Sensitivity Don't Work.Mark Anthony Dacela - 2017 - Suri 6 (2):110-123.
    Robert Nozick (1981, 172) offers the following analysis of knowledge (where S stands for subject and p for proposition): -/- D1 S knows that p =df (1) S believes p, (2) p is true, (3) if p weren’t true, S wouldn’t believe that p (variation condition), and (4) If p were true, S would believe it (adherence condition). Jointly, Nozick refers to conditions 3 and 4 as the sensitivity condition: for they require that the belief be sensitive to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Value Sensitive Design to Achieve the UN SDGs with AI: A Case of Elderly Care Robots.Steven Umbrello, Marianna Capasso, Maurizio Balistreri, Alberto Pirni & Federica Merenda - 2021 - Minds and Machines 31 (3):395-419.
    Healthcare is becoming increasingly automated with the development and deployment of care robots. There are many benefits to care robots but they also pose many challenging ethical issues. This paper takes care robots for the elderly as the subject of analysis, building on previous literature in the domain of the ethics and design of care robots. Using the value sensitive design approach to technology design, this paper extends its application to care robots by integrating the values of care, values that (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  36. Sensitivity has Multiple Heterogeneity Problems: a Reply to Wallbridge.Guido Melchior - 2017 - Philosophia 45 (4):1741-1747.
    In this paper, I defend the heterogeneity problem for sensitivity accounts of knowledge against an objection that has been recently proposed by Wallbridge in Philosophia. I argue in, 479–496, 2015) that sensitivity accounts of knowledge face a heterogeneity problem when it comes to higher-level knowledge about the truth of one’s own beliefs. Beliefs in weaker higher-level propositions are insensitive, but beliefs in stronger higher-level propositions are sensitive. The resulting picture that we can know the stronger propositions without being (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  37. Sensitivity and Higher-Order Knowledge.Kevin Wallbridge - 2016 - Pacific Philosophical Quarterly.
    Vogel, Sosa, and Huemer have all argued that sensitivity is incompatible with knowing that you do not believe falsely, therefore the sensitivity condition must be false. I show that this objection misses its mark because it fails to take account of the basis of belief. Moreover, if the objection is modified to account for the basis of belief then it collapses into the more familiar objection that sensitivity is incompatible with closure.
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  38. Mapping Value Sensitive Design onto AI for Social Good Principles.Steven Umbrello & Ibo van de Poel - 2021 - AI and Ethics 1 (3):283–296.
    Value Sensitive Design (VSD) is an established method for integrating values into technical design. It has been applied to different technologies and, more recently, to artificial intelligence (AI). We argue that AI poses a number of challenges specific to VSD that require a somewhat modified VSD approach. Machine learning (ML), in particular, poses two challenges. First, humans may not understand how an AI system learns certain things. This requires paying attention to values such as transparency, explicability, and accountability. Second, ML (...)
    Download  
     
    Export citation  
     
    Bookmark   35 citations  
  39. The Threat of Algocracy: Reality, Resistance and Accommodation.John Danaher - 2016 - Philosophy and Technology 29 (3):245-268.
    One of the most noticeable trends in recent years has been the increasing reliance of public decision-making processes on algorithms, i.e. computer-programmed step-by-step instructions for taking a given set of inputs and producing an output. The question raised by this article is whether the rise of such algorithmic governance creates problems for the moral or political legitimacy of our public decision-making processes. Ignoring common concerns with data protection and privacy, it is argued that algorithmic governance does pose a significant (...) to the legitimacy of such processes. Modelling my argument on Estlund’s threat of epistocracy, I call this the ‘threat of algocracy’. The article clarifies the nature of this threat and addresses two possible solutions. It is argued that neither solution is likely to be successful, at least not without risking many other things we value about social decision-making. The result is a somewhat pessimistic conclusion in which we confront the possibility that we are creating decision-making processes that constrain and limit opportunities for human participation. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   58 citations  
  40. Assessment Sensitivity about Future Contingents, Vindication and Self-Refutation.Corine Besson & Anandi Hattiangadi - manuscript
    John MacFarlane has recently argued that his brand of truth relativism – Assessment Sensitivity – provides the best solution to the puzzle of future contingents: statements about the future that are metaphysically neither necessary nor impossible. In this paper, we show that even if we grant all of the metaphysical, semantic and pragmatic assumptions in terms of which MacFarlane sets and solves the puzzle, Assessment Sensitivity is ultimately self-refuting.
    Download  
     
    Export citation  
     
    Bookmark  
  41. Sensitivity hasn’t got a Heterogeneity Problem - a Reply to Melchior.Kevin Wallbridge - 2017 - Philosophia 45 (2):835-841.
    In a recent paper, Melchior pursues a novel argumentative strategy against the sensitivity condition. His claim is that sensitivity suffers from a ‘heterogeneity problem:’ although some higher-order beliefs are knowable, other, very similar, higher-order beliefs are insensitive and so not knowable. Similarly, the conclusions of some bootstrapping arguments are insensitive, but others are not. In reply, I show that sensitivity does not treat different higher-order beliefs differently in the way that Melchior states and that while genuine bootstrapping (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  42. Sensitivity, safety, and the law: A reply to Pardo.David Enoch & Levi Spectre - 2019 - Legal Theory 25 (3):178-199.
    ABSTRACTIn a recent paper, Michael Pardo argues that the epistemic property that is legally relevant is the one called Safety, rather than Sensitivity. In the process, he argues against our Sensitivity-related account of statistical evidence. Here we revisit these issues, partly in order to respond to Pardo, and partly in order to make general claims about legal epistemology. We clarify our account, we show how it adequately deals with counterexamples and other worries, we raise suspicions about Safety's value (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  43. The Metasemantics of Contextual Sensitivity.Jeffrey C. King - 2014 - In Alexis Burgess & Brett Sherman (eds.), Metasemantics: New Essays on the Foundations of Meaning. New York: Oxford University Press. pp. 97-118.
    Some contextually sensitive expressions are such that their context independent conventional meanings need to be in some way supplemented in context for the expressions to secure semantic values in those contexts. As we’ll see, it is not clear that there is a paradigm here, but ‘he’ used demonstratively is a clear example of such an expression. Call expressions of this sort supplementives in order to highlight the fact that their context independent meanings need to be supplemented in context for them (...)
    Download  
     
    Export citation  
     
    Bookmark   57 citations  
  44. Paraconsistent Sensitivity Analysis for Bayesian Significance Tests.Julio Michael Stern - 2004 - Lecture Notes in Artificial Intelligence 3171:134-143.
    In this paper, the notion of degree of inconsistency is introduced as a tool to evaluate the sensitivity of the Full Bayesian Significance Test (FBST) value of evidence with respect to changes in the prior or reference density. For that, both the definition of the FBST, a possibilistic approach to hypothesis testing based on Bayesian probability procedures, and the use of bilattice structures, as introduced by Ginsberg and Fitting, in paraconsistent logics, are reviewed. The computational and theoretical advantages of (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  45. The sensitivity of legal proof.Guido Melchior - 2024 - Synthese 203 (5):1-23.
    The proof paradox results from conflicting intuitions concerning different types of fallible evidence in a court of law. We accept fallible individual evidence but reject fallible statistical evidence even when the conditional probability that the defendant is guilty given the evidence is the same, a seeming inconsistency. This paper defends a solution to the proof paradox, building on a sensitivity account of checking and settling a question. The proposed sensitivity account of legal proof not only requires sensitivity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Dimensions of the Threat to the Self Posed by Deep Brain Stimulation: Personal Identity, Authenticity, and Autonomy.Przemysław Zawadzki - 2020 - Diametros 18 (69):71-98.
    Deep Brain Stimulation (DBS) is an invasive therapeutic method involving the implantation of electrodes and the electrical stimulation of specific areas of the brain to modulate their activity. DBS brings therapeutic benefits, but can also have adverse side effects. Recently, neuroethicists have recognized that DBS poses a threat to the very fabric of human existence, namely, to the selves of patients. This article provides a review of the neuroethical literature examining this issue, and identifies the crucial dimensions related to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  47. Context Sensitivity and Indirect Reports.Nellie Wieland - 2010 - Philosophy and Phenomenological Research 81 (1):40-48.
    In this paper, I argue that Contextualist theories of semantics are not undermined by their purported failure to explain the practice of indirect reporting. I adopt Cappelen & Lepore’s test for context sensitivity to show that the scope of context sensitivity is much broader than Semantic Minimalists are willing to accept. The failure of their arguments turns on their insistence that the content of indirect reports is semantically minimal.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  48. Strategic Sensitivity and Its Impact on Boosting the Creative Behavior of Palestinian NGOs.Hamdan K. Muhammad, El Talla A. Suliman, J. Shobaki Mazen & Samy S. Abu-Naser - 2020 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 4 (5):80-102.
    The study aimed to identify the strategic sensitivity and its impact on enhancing the creative behavior of Palestinian NGOs in Gaza Strip, and the study used the descriptive analytical approach and the questionnaire as a main tool for collecting data from employees of associations working in Gaza Strip governorates, and the cluster sample method was used and the sample size reached (343) individuals (298) questionnaires were retrieved, and the following results were reached: The relative weight of strategic sensitivity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Time Sensitivity and Acceptance of Testimony.Nader Alsamaani - 2020 - Organon F: Medzinárodný Časopis Pre Analytickú Filozofiu 27 (4):422–436.
    Time sensitivity seems to affect our intuitive evaluation of the reasonable risk of fallibility in testimonies. All things being equal, we tend to be less demanding in accepting time sensitive testimonies as opposed to time insensitive testimonies. This paper considers this intuitive response to testimonies as a strategy of acceptance. It argues that the intuitive strategy, which takes time sensitivity into account, is epistemically superior to two adjacent strategies that do not: the undemanding strategy adopted by non-reductionists and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Statistical Evidence, Sensitivity, and the Legal Value of Knowledge.David Enoch, Levi Spectre & Talia Fisher - 2012 - Philosophy and Public Affairs 40 (3):197-224.
    The law views with suspicion statistical evidence, even evidence that is probabilistically on a par with direct, individual evidence that the law is in no way suspicious of. But it has proved remarkably hard to either justify this suspicion, or to debunk it. In this paper, we connect the discussion of statistical evidence to broader epistemological discussions of similar phenomena. We highlight Sensitivity – the requirement that a belief be counterfactually sensitive to the truth in a specific way – (...)
    Download  
     
    Export citation  
     
    Bookmark   112 citations  
1 — 50 / 970