Results for 'vulnerable road users'

1000+ found
Order:
  1. External Human–Machine Interfaces for Autonomous Vehicle-to-Pedestrian Communication: A Review of Empirical Work. [REVIEW]Alexandros Rouchitsas & Håkan Alm - 2019 - Frontiers in Psychology 10.
    Interaction between drivers and pedestrians is often facilitated by informal communicative cues, like hand gestures, facial expressions, and eye contact. In the near future, however, when semi- and fully autonomous vehicles are introduced into the traffic system, drivers will gradually assume the role of mere passengers, who are casually engaged in non-driving-related activities and, therefore, unavailable to participate in traffic interaction. In this novel traffic environment, advanced communication interfaces will need to be developed that inform pedestrians of the current state (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  2. Distributive justice as an ethical principle for autonomous vehicle behavior beyond hazard scenarios.Manuel Dietrich & Thomas H. Weisswange - 2019 - Ethics and Information Technology 21 (3):227-239.
    Through modern driver assistant systems, algorithmic decisions already have a significant impact on the behavior of vehicles in everyday traffic. This will become even more prominent in the near future considering the development of autonomous driving functionality. The need to consider ethical principles in the design of such systems is generally acknowledged. However, scope, principles and strategies for their implementations are not yet clear. Most of the current discussions concentrate on situations of unavoidable crashes in which the life of human (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  3. Hostile Scaffolding.Ryan Timms & David Spurrett - 2023 - Philosophical Papers 52 (1):1-30.
    Most accounts of cognitive scaffolding focus on ways that external structure can support or augment an agent’s cognitive capacities. We call cases where the interests of the user are served benign scaffolding and argue for the possibility and reality of hostile scaffolding. This is scaffolding which depends on the same capacities of an agent to make cognitive use of external structure as in benign cases, but that undermines or exploits the user while serving the interests of another agent. We develop (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  4. The seductions of clarity.C. Thi Nguyen - 2021 - Royal Institute of Philosophy Supplement 89:227-255.
    The feeling of clarity can be dangerously seductive. It is the feeling associated with understanding things. And we use that feeling, in the rough-and-tumble of daily life, as a signal that we have investigated a matter sufficiently. The sense of clarity functions as a thought-terminating heuristic. In that case, our use of clarity creates significant cognitive vulnerability, which hostile forces can try to exploit. If an epistemic manipulator can imbue a belief system with an exaggerated sense of clarity, then they (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  5. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing (...) of likely infections while avoiding too many false positive reports. Centralised apps, in contrast, have the potential to do this. But policy making was influenced by public debates about the right app configuration, which have tended to focus heavily on privacy, and are driven by the assumption that decentralised apps are “privacy preserving by design”. We show that both types of apps are in fact vulnerable to privacy breaches, and, drawing on principles from safety engineering and risk analysis, compare the risks of centralised and decentralised systems along two dimensions, namely the probability of possible breaches and their severity. We conclude that a centralised app may in fact minimise overall ethical risk, and contend that we must reassess our approach to digital contact tracing, and should, more generally, be cautious about a myopic focus on privacy when conducting ethical assessments of data technologies. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  6. Designing the Health-related Internet of Things: Ethical Principles and Guidelines.Brent Mittelstadt - 2017 - Information 8 (3):77.
    The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related Internet of Things (H-IoT) increasingly plays a key role in health management by providing real-time tele-monitoring of patients, testing of treatments, actuation of medical devices, and fitness and well-being monitoring. Given its numerous applications and proposed benefits, adoption by medical and social care institutions and consumers may be (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  7. A Hobbesian Solution to Infodemics.Tommaso Ostillio - manuscript
    Several studies have lately revealed that social media conceal at least three dangerous pitfalls. Firstly, social media can negatively impact sociopolitical processes in advanced liberal democracies by becoming vehicles for the spread of false information that augments political polarization (Lee et al. 2017; Ostillio 2018). Secondly, as a result of the first point, social mediacan rapidly become a source of incorrect beliefs for those subjects with low digital literacy (Guess et al. 2019). Thirdly, because of the first and second points, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Accessing Online Data for Youth Mental Health Research: Meeting the Ethical Challenges.Elvira Perez Vallejos, Ansgar Koene, Christopher James Carter, Daniel Hunt, Christopher Woodard, Lachlan Urquhart, Aislinn Bergin & Ramona Statache - 2019 - Philosophy and Technology 32 (1):87-110.
    This article addresses the general ethical issues of accessing online personal data for research purposes. The authors discuss the practical aspects of online research with a specific case study that illustrates the ethical challenges encountered when accessing data from Kooth, an online youth web-counselling service. This paper firstly highlights the relevance of a process-based approach to ethics when accessing highly sensitive data and then discusses the ethical considerations and potential challenges regarding the accessing of public data from Digital Mental Health (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. The Democratic Biopolitics of PrEP.Karsten Schubert - 2019 - In Helene Gerhards & Kathrin Braun (eds.), Biopolitiken - Regierungen des Lebens heute. Wiesbaden: Springer Fachmedien. pp. 121-153.
    PrEP (Pre-Exposure Prophylaxis) is a relatively new drug-based HIV prevention technique and an important means to lower the HIV risk of gay men who are especially vulnerable to HIV. From the perspective of biopolitics, PrEP inscribes itself in a larger trend of medicalization and the rise of pharmapower. This article reconstructs and evaluates contemporary literature on biopolitical theory as it applies to PrEP, by bringing it in a dialogue with a mapping of the political debate on PrEP. As PrEP (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  10. Az elektronikus prevenció lehetőségei az új (szintetikus) drogok használatának megelőzésében: a Rekreációs Drogok Európai Hálózatának (Recreational Drugs European Network ….Zsolt Demetrovics, Barbara Mervo, Ornella Corazza, Zoe Davey, Paolo Deluca, Colin Drummond, A. Enea, Jacek Moskalewicz, G. Di Melchiorre, L. Di Furia, Magí Farré, Liv Flesland, Luciano Floridi, Fruzsina Iszáj, N. Scherbaum, Holger Siemann, Arvid Skutle, Marta Torrens, M. Pasinetti, Cinzia Pezzolesi, Agnieszka Pisarska, Harry Shapiro, Elias Sferrazza, Peer Van der Kreeft & F. Schifano - 2010 - Addictologia Hungarica 1:289–297.
    Recreational Drugs European Network (ReDNet) project aims to use the Psychonaut Web Mapping Project database (Psychonaut Web Mapping Group, 2009) containing novel psychoactive compounds usually not mentioned in the scientific literature and thus unknown to clinicians as a unique source of information. The database will be used to develop an integrated ICT prevention approach targeted at vulnerable individuals and focused on novel synthetic and herbal compounds and combinations. Particular care will be taken in keeping the health professionals working directly (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. The Democratic Biopolitics of PrEP.Karsten Schubert - 2019 - In Helene Helga Gerhards & Kathrin Braun (eds.), Biopolitiken – Regierungen des Lebens heute. Wiesbaden: Springer Fachmedien. pp. 121-153.
    PrEP (Pre-Exposure Prophylaxis) is a relatively new drug-based HIV prevention technique and an important means to lower the HIV risk of gay men who are especially vulnerable to HIV. From the perspective of biopolitics, PrEP inscribes itself in a larger trend of medicalization and the rise of pharmapower. This article reconstructs and evaluates contemporary literature on biopolitical theory as it applies to PrEP, by bringing it in a dialogue with a mapping of the political debate on PrEP. As PrEP (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  12. The Fragile Landscape of the Sharing Economy in Hungary.Bori Simonovits, Anikó Bernát & Bálint Balázs - 2021 - In Andrzej Klimczuk, Vida Česnuitytė & Gabriela Avram (eds.), The Collaborative Economy in Action: European Perspectives. University of Limerick. pp. 153-163.
    In this chapter, we assess the current state-of-the-art of the Hungarian sharing economy sector relying on statistics, previous surveys, and expert interviews around case examples. Although we record a fast emergence of an increasing number and a widening variety of multinational and home-grown initiatives, we also contend that in Hungary, the innovation ecosystem of the collaborative economy is still relatively feeble. The linkages that are created through these initiatives are controversial sociologically. The main end-users are highly educated young urbanites. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Knowledge in motion: How procedural control of knowledge usage entails selectivity and bias.Ulrich Ansorge - 2021 - Journal of Knowledge Structures and Systems 2 (1):3-28.
    The use and acquisition of knowledge appears to be influenced by what humans pay attention to. Thus, looking at attention will tell us something about the mechanisms involved in knowledge (usage). According to the present review, attention reflects selectivity in information processing and it is not necessarily also reflected in a user’s consciousness, as it is rooted in skill memory or other implicit procedural memory forms–that is, attention is rooted in the necessity of human control of mental operations and actions. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Use of Blockchain in Strengthening Cybersecurity And Protecting Privacy.Arif Sari - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):59-66.
    Abstract—The purpose of this study is to highlight and prove the positive impact in which blockchain could have on today’s IoT environment in terms of providing Cybersecurity for not just organizations, but other individuals who share data via the internet. The current IoT environs operates on a centralized cloud based server, meanwhile block chain operates on a decentralized server. The differentiation between the both plays a major role in the level of security they both provide; whereby, decentralized systems are less (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but it possesses (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. A Study of Awareness About Cyber Laws for Indian Youth.Jigar Shah - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):10-16.
    In india each and every minute one person become internet users. its convergence with digitally supported platforms and gadgets, safeguarding the parents as well as students from the cybercrimes is becoming a challenging task. In addition to, the pinching reality is that the internet users are not getting updated on the vulnerable cyber threats and security issues, at the pace they are getting updated with the usage of internet enabled tools and apps. Thus the current research paper (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. The Road to Necropolis: Technics and Death in the Philosophy of Lewis Mumford.Gregory Morgan Swer - 2003 - History of the Human Sciences 16 (4):39-59.
    The purpose of this article is to explore the close link between technology and death in the philosophical writings of Lewis Mumford. Mumford famously argued that throughout the history of western civilization we find intertwined two competing forms of technics; the democratic biotechnic form and the authoritarian monotechnic form. The former technics were said to be strongly compatible with an organic form of life while the latter were said to be allied to a mechanical power complex. What is perhaps less (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  18. Conceptual Engineering: A Road Map to Practice.Manuel Gustavo Isaac, Steffen Koch & Ryan Nefdt - 2022 - Philosophy Compass 17 (10):1-15.
    This paper discusses the logical space of alternative conceptual engineering projects, with a specific focus on (1) the processes, (2) the targets and goals, and (3) the methods of such projects. We present an overview of how these three aspects interact in the contemporary literature and discuss those alternative projects that have yet to be explored based on our suggested typology. We show how choices about each element in a conceptual engineering project constrain the possibilities for the others, thereby giving (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  19. Philosophy of Perception: A road-map with many bypass roads.Bence Nanay - 2016 - In Current Controversies in Philosophy of Perception. New York: Routledge.
    An introduction to contemporary debates in philosophy of perception.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  20. Userization.Andrej Poleev - 2012 - Enzymes 10.
    100 years after creating the Federal Reserve System (FED), whose legality and modus operandi remains questionable, there is time to rethink the national and also international payment system as a whole. The key element of existing economic relationships is the money that makes barter-free exchange possible. But monetary economics is only one aspect of more common political framework designed and established for retention of power. Such egoistic political interest proves its own relevancy and exerts ideological pressure on economic thought that (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  21. Vulnerability in Social Epistemic Networks.Emily Sullivan, Max Sondag, Ignaz Rutter, Wouter Meulemans, Scott Cunningham, Bettina Speckmann & Mark Alfano - 2020 - International Journal of Philosophical Studies 28 (5):1-23.
    Social epistemologists should be well-equipped to explain and evaluate the growing vulnerabilities associated with filter bubbles, echo chambers, and group polarization in social media. However, almost all social epistemology has been built for social contexts that involve merely a speaker-hearer dyad. Filter bubbles, echo chambers, and group polarization all presuppose much larger and more complex network structures. In this paper, we lay the groundwork for a properly social epistemology that gives the role and structure of networks their due. In particular, (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  22. Safeguarding Vulnerable Autonomy? Situational Vulnerability, The Inherent Jurisdiction and Insights from Feminist Philosophy.Jonathan Lewis - 2021 - Medical Law Review 29 (2):306-336.
    The High Court continues to exercise its inherent jurisdiction to make declarations about interventions into the lives of situationally vulnerable adults with mental capacity. In light of protective responses of health care providers and the courts to decision-making situations involving capacitous vulnerable adults, this paper has two aims. The first is diagnostic. The second is normative. The first aim is to identify the harms to a capacitous vulnerable adult’s autonomy that arise on the basis of the characterisation (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  23.  69
    Vulnerability, Recognition, and the Ethics of Pregnancy: A Theological Response.Margaret Kamitsuka - 2024 - Hypatia.
    Vulnerability is a notion discussed in feminist philosophy as a basis for a morality that widens our sense of those whose deaths are grievable. Vulnerability and grievability also factor in reproductive ethics. This essay employs recognition theory to analyze critically how these notions are mobilized in conservative Christian anti-abortion writings and in feminist philosophy. This analysis exposes weaknesses and misrecognition in both sets of discourses. In response, I offer theological arguments for recognizing fetal value without implying a right to life (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Vulnerability, Insecurity and the Pathologies of Trust and Distrust.Catriona Mackenzie - 2020 - International Journal of Philosophical Studies:624-643.
    While some trust theorists have adverted to the vulnerabilities involved in trust, especially vulnerability to betrayal, the literature on trust has not engaged with recent work on the ethics of vulnerability. This paper initiates a dialogue between these literatures, and in doing so begins to explore the complex interrelations between vulnerability and trust. More specifically, it aims to show how trust can both mitigate and compound vulnerability. Through a discussion of two examples drawn from literary sources, the paper also investigates (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25. Recognition, Vulnerability and Trust.Danielle Petherbridge - 2021 - International Journal of Philosophical Studies 29 (1):1-23.
    ABSTRACT This paper examines the question of whether recognition relations are based on trust. Theorists of recognition have acknowledged the ways in which recognition relations make us vulnerable to others but have largely neglected the underlying ‘webs of trust’ in which such relations are embedded. In this paper, I consider the ways in which the theories of recognition developed by Jürgen Habermas and Axel Honneth, not only point to our mutual vulnerability but also implicitly rely upon mutual relations of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  26. Fittingness: A User’s Guide.Chris Howard & R. A. Rowland - 2023 - In Chris Howard & R. A. Rowland (eds.), Fittingness. OUP.
    The chapter introduces and characterizes the notion of fittingness. It charts the history of the relation and its relevance to contemporary debates in normative and metanormative philosophy and proceeds to survey issues to do with fittingness covered in the volume’s chapters, including the nature and epistemology of fittingness, the relations between fittingness and reasons, the normativity of fittingness, fittingness and value theory, and the role of fittingness in theorizing about responsibility. The chapter concludes with a brief discussion of issues to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. A user profiling component with the aid of user ontologies.Nébel István-Tibor, Barry Smith & Paschke Ralf - 2003 - In Learning – Teaching – Knowledge – Adaptivity (LLWA), University of Karlsruhe (2003). Karlsruhe, Germany:
    Abstract: What follows is a contribution to the field of user modeling for adaptive teaching and learning programs especially in the medical field. The paper outlines existing approaches to the problem of extracting user information in a form that can be exploited by adaptive software. We focus initially on the so-called stereotyping method, which allocates users into classes adaptively, reflecting characteristics such as physical data, social background, and computer experience. The user classifications of the stereotyping method are however ad (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. A Road Map of Interval Temporal Logics and Duration Calculi.Valentin Goranko, Angelo Montanari & Guido Sciavicco - 2004 - Journal of Applied Non-Classical Logics 14 (1-2):9-54.
    We survey main developments, results, and open problems on interval temporal logics and duration calculi. We present various formal systems studied in the literature and discuss their distinctive features, emphasizing on expressiveness, axiomatic systems, and (un)decidability results.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  29. Road transport system in Southeast Asia; problems and economic solutions.Maynard Clark, Sara Kaffashi & Mad Nasir Shamsudin - 2016 - Current World Environment 11 (1):10-19.
    In Southeast Asian countries (SEA), road transport accounts for the main energy consumption and CO2 emission. Air pollution is a major concern in densely populated cities such as Bangkok, Manila, and Kuala Lumpur. The main objective of this paper is to give insights on trends of transport development, car ownership, and CO2 emissions in Southeast Asia. This study also attempts to review the successful transportation policies around the globe and to introduce the possible instruments that can help reduce air (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. The Road to ideelle Verähnlichung. Anton Marty’s Conception of Intentionality in the Light of its Brentanian Background.Laurent Cesalli & Hamid Taieb - 2012 - Quaestio 12:171-232.
    Anton Marty (1847-1914) is known to be the most faithful pupil of Franz Brentano. As a matter of fact, most of his philosophical ideas find their source in the works of his master. Yet, the faithfulness of Marty is not constant. As the rich correspondence between the two thinkers shows, Marty elaborates an original theory of intentionality from ca. 1904 onward. This theory is based on the idea that intentionality is a process of mental assimilation (ideelle Verähnlichung), a process at (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  31. Epistemic vulnerability and tolerance in society.Maddox Larson - 2024 - The Philosophy, Politics, and Economics Review 3:15-28.
    The question of church-state separation has haunted America since her founding. James Madison and select founding fathers suggest that religions and states are better off when they minimize (or altogether eliminate) their interactions. Many Muslims in Iran, for instance, believe the opposite – aligning state functions with religious motives results in the most effective state. In this paper, I propose a model of thinking about church-state separation in which states and religions must maintain epistemic vulnerability to allow legal, political, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. China's Belt and Road Initiative: Global Politics and Implications.Md Mahmudul Hoque & Riffat Ara Zannat Tama - 2020 - European Scientific Journal 16 (31):279-299.
    Belt and Road Initiative (BRI) is a global infrastructure development project that ambitiously aims to connect Asia with European and African continents through land and sea corridors. China adopted this gigantic game-changing master plan in 2013 and spurred much speculation among scholars and policymakers worldwide. This article investigates the development of the project through the lens of global political geography and economy. From an international relations perspective, the authors consult relevant pieces of literature and focus on the international issues (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  33. Expressive Vulnerabilities: Language and the Non-Human.Joe Larios - 2020 - International Journal of Philosophical Studies 28 (5):662-676.
    Emmanuel Levinas’s work seemingly places a great emphasis on language leading some commentators towards a Kantian reading of him where moral consideration would be based on the moral patient’s capacity for reason with language functioning as a proxy for this. Although this reading is possible, a closer look at Levinas’s descriptions of language reveal that its defining characteristic is not reason but the capacity to express beyond any thematized contents we would give to the Other. This expressivity (which Levinas calls (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. A User’s Guide to Hybrid Tools.Caleb Perl - 2020 - Mind 129 (513):129-158.
    Hybrid metaethical theories have significant promise; they would have important upshots if they were true. But they also face severe problems. The problems are severe enough to make many philosophers doubt that they could be true. My ambition is to show that the problems are just instances of a highly general problem: a problem about what are sometimes called ‘intensional anaphora'. I'll also show that any adequate explanation of intensional anaphora immediately solves all the problems for the hybrid theorist. We (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  35. Vulnerable due to hope: aspiration paradox as a cross-cultural concern.Eric Palmer - 2014 - Conference Publication, International Development Ethics Association 10th Conference: Development Ethics Contributions for a Socially Sustainable Future.
    (Conference proceedings 2014) This presentation (International Development Ethics Association, July 2014) considers economic vulnerability, exploring the risk of deprivation of necessary resources due to a complex and rarely discussed vulnerability that arises from hope. Pierre Bourdieu’s sociological account of French petit-bourgeois aspiration in The Social Structures of the Economy has recently inspired Wendy Olsen to introduce the term “aspiration paradox” to characterize cases wherein “a borrower's status aspirations may contribute to a situation in which their borrowings exceed their capacity to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Enhancing user creativity: semantic measures for idea generation.Georgi V. Georgiev & Danko D. Georgiev - 2018 - Knowledge-Based Systems 151:1-15.
    Human creativity generates novel ideas to solve real-world problems. This thereby grants us the power to transform the surrounding world and extend our human attributes beyond what is currently possible. Creative ideas are not just new and unexpected, but are also successful in providing solutions that are useful, efficient and valuable. Thus, creativity optimizes the use of available resources and increases wealth. The origin of human creativity, however, is poorly understood, and semantic measures that could predict the success of generated (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  37. Comprehensive User Engagement Sites (CUES) in Philadelphia: A Constructive Proposal.Peter Clark, Marvin J. H. Lee, S. Gulati, A. Minupuri, P. Patel, S. Zheng, Sam A. Schadt, J. Dubensky, M. DiMeglio, S. Umapathy, Olivia Nguyen, Kevin Cooney & S. Lathrop - 2018 - Internet Journal of Public Health 18 (1):1-22.
    This paper is a study about Philadelphia’s comprehensive user engagement sites (CUESs) as the authors address and examine issues related to the upcoming implementation of a CUES while seeking solutions for its disputed questions and plans. Beginning with the federal drug schedules, the authors visit some of the medical and public health issues vis-à-vis safe injection facilities (SIFs). Insite, a successful Canadian SIF, has been thoroughly researched as it represents a paradigm for which a Philadelphia CUES can expand upon. Also, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Human vulnerability: A break to autonomy?Carlos Alberto Rosas Jimenez - 2015 - Revista de Bioética Latinoamericana 1 (16):1-16.
    In society, human vulnerability is associated with multiple causes such as poverty, injustice, discrimination and illnesses, among others. In the midst of this panorama of external agents that lead human beings to situations of vulnerability, some clearly see – although others not so much – a vulnerability proper to the human person, simply because they exist. This approach to vulnerability is considered to be a conditio humana that affects everyone. Precisely because it is a conditio humana, vulnerability is closely related (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Perils of the Open Road.William Lane Craig & David P. Hunt - 2013 - Faith and Philosophy 30 (1):49-71.
    Open theists deny that God knows future contingents. Most open theists justify this denial by adopting the position that there are no future contingent truths to be known. In this paper we examine some of the arguments put forward for this position in two recent articles in this journal, one by Dale Tuggy and one by Alan Rhoda, Gregory Boyd, and Thomas Belt. The arguments concern time, modality, and the semantics of ‘will’ statements. We explain why we find none of (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  40. In defence of posthuman vulnerability.Belen Liedo Fernandez & Jon Rueda - 2021 - Scientia et Fides 9 (1):215-239.
    Transhumanism is a challenging movement that invites us to rethink what defines humanity, including what we value and regret the most about our existence. Vulnerability is a key concept that require thorough philosophical scrutiny concerning transhumanist proposals. Vulnerability can refer to a universal condition of human life or, rather, to the specific exposure to certain harms due to particular situations. Even if we are all vulnerable in the first sense, there are also different sources and levels of vulnerability depending (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  41. The Road Not Taken – Reading Calabresi’s “The Future of Law and Economics”.Paolo Silvestri - 2019 - Global Jurist 19 (3):1-7.
    The publication of Guido Calabresi’s book “The Future of Law and Economics” has drawn a substantial amount of attention among law and economics scholars. We thought that the best way to devote special attention to this book was to devote a Special issue to it. This article situates Calabresi’s book among other reflections on the future of the discipline, introduces and explains the reasons behind this Special issue and discuss the organization and content of it. -/- We emphasize how Calabresi’s (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Roads to Necessitarianism.Matthew Mandelkern & Daniel Rothschild - 2021 - Journal of Philosophical Logic 50 (1):89-96.
    We show that each of three natural sets of assumptions about the conditional entails necessitarianism: that anything possible is necessary.
    Download  
     
    Export citation  
     
    Bookmark  
  43. The role of vulnerability in Kantian ethics.Paul Formosa - 2014 - In Catriona Mackenzie, Wendy Rogers & Susan Dodds (eds.), Vulnerability: New Essays in Ethics and Feminist Philosophy. New York: Oxford University Press. pp. 88-109.
    Does the fact that humans are vulnerable, needy and dependent beings play an important role in Kantian ethics? It is sometimes claimed that it cannot and does not. I argue that it can and does. I distinguish between broad (all persons are vulnerable) and narrow (only some persons are vulnerable) senses of vulnerability, and explain the role of vulnerability in both senses in Kantian ethics. The basis of this argument is to show that the core normative focus (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  44.  75
    Is violence escalation the consequence of art vandalism, road blockades, and assaults for the cause of climate change mitigation?Quan-Hoang Vuong, Viet-Phuong La & Minh-Hoang Nguyen - manuscript
    Environmental activism is expected to improve society’s well-being and environmental sustainability. Nevertheless, some inappropriate ways of activism, like road blockage, art vandalism, assaults, etc., have been recently conducted and risked causing adverse repercussions, including violence escalation. The current study aims to explore which types of environmental activism are more likely to escalate violence between activists, affected citizens, and police. Bayesian Mindsponge Framework (BMF) analytics was employed to analyze a dataset of 89 blockage, vandalism, and harassment cases in 13 countries (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. The Vulnerable Self: Enabling the Recognition of Racial Inequality.Desirée H. Melton - 2009 - In Lisa Tessman (ed.), Feminist Ethics and Social and Political Philosophy: Theorizing the Non-Ideal. Springer. pp. 149--164.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  46. Guide - User Co-Production in Standardisation.Estelle Huchet, Fernando Machicado, Roberto Scano, Malcolm Fisk, Alexandra Engelt, Diane Whitehouse, Stephan Schug, Caroline Holland, Verina Waights, Andrzej Klimczuk, Frederic Lievens, Marlou Bijlsma & Thamar Zijlstra - 2018
    Research within the H2020 PROGRESSIVE project has identified good practices in user co-production strategies and methodologies. Early findings from research in the PROGRESSIVE project were shared with relevant stakeholders outside the consortium for consultation and review. The outcomes of that initial investigation highlighted the need to focus on the objectives, processes, and methods used in user and older people co-production. This guide adapts these insights and makes them relevant specifically for standardisation in ICT for active and healthy ageing. This guide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  10
    Philosophy of Science: A User's Guide.Adrian Currie & Sophie Veigl (eds.) - forthcoming - MIT Press.
    Thought experiments play a role in science and in some central parts of contemporary philosophy. They used to play a larger role in philosophy of science, but have been largely abandoned as part of the field’s “practice turn”. This chapter discusses possible roles for thought experimentation within a practice-oriented philosophy of science. Some of these roles are uncontroversial, such as exemplification and aiding discovery. A more controversial role is the reliance on thought experiments to justify philosophical claims. It is proposed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Children's Vulnerability and Legitimate Authority Over Children.Anca Gheaus - 2018 - Journal of Applied Philosophy:60-75.
    Children's vulnerability gives rise to duties of justice towards children and determines when authority over them is legitimately exercised. I argue for two claims. First, children's general vulnerability to objectionable dependency on their caregivers entails that they have a right not to be subject to monopolies of care, and therefore determines the structure of legitimate authority over them. Second, children's vulnerability to the loss of some special goods of childhood determines the content of legitimate authority over them. My interest is (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  49. Users’ Guide to the Use of Dictionary.Christopher Okeke Ajah - 2019 - GNOSI: An Interdisciplinary Journal of Human Theory and Praxis 2 (1).
    Dictionary making is the preoccupation of a lexicographer (dictionary compiler) and the art of making it (dictionary) is called lexicography. Dictionary can either be in printing or electronic form. It is no doubt a vital tool for language learning and usage. The importance of a dictionary in learning and usage of a language cannot be neglected because its role in learning generally which includes among others: word meaning, word usage, pronunciation, spelling, origin and parts of speech are fundamental in communication. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  88
    Death on The Road.Mota Victor - manuscript
    Road accidents are as same as fatal than domestic violence in Portugal.
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000