Results for 'vulnerable road users'

973 found
Order:
  1. (1 other version)External Human–Machine Interfaces for Autonomous Vehicle-to-Pedestrian Communication: A Review of Empirical Work. [REVIEW]Alexandros Rouchitsas & Håkan Alm - 2019 - Frontiers in Psychology 10.
    Interaction between drivers and pedestrians is often facilitated by informal communicative cues, like hand gestures, facial expressions, and eye contact. In the near future, however, when semi- and fully autonomous vehicles are introduced into the traffic system, drivers will gradually assume the role of mere passengers, who are casually engaged in non-driving-related activities and, therefore, unavailable to participate in traffic interaction. In this novel traffic environment, advanced communication interfaces will need to be developed that inform pedestrians of the current state (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  2. Distributive justice as an ethical principle for autonomous vehicle behavior beyond hazard scenarios.Manuel Dietrich & Thomas H. Weisswange - 2019 - Ethics and Information Technology 21 (3):227-239.
    Through modern driver assistant systems, algorithmic decisions already have a significant impact on the behavior of vehicles in everyday traffic. This will become even more prominent in the near future considering the development of autonomous driving functionality. The need to consider ethical principles in the design of such systems is generally acknowledged. However, scope, principles and strategies for their implementations are not yet clear. Most of the current discussions concentrate on situations of unavoidable crashes in which the life of human (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  3. Designing the Health-related Internet of Things: Ethical Principles and Guidelines.Brent Mittelstadt - 2017 - Information 8 (3):77.
    The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related Internet of Things (H-IoT) increasingly plays a key role in health management by providing real-time tele-monitoring of patients, testing of treatments, actuation of medical devices, and fitness and well-being monitoring. Given its numerous applications and proposed benefits, adoption by medical and social care institutions and consumers may be (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  4. The Province of Human Agency.Anton Ford - 2018 - Noûs 52 (3):697-720.
    Agency is a power, but what is it a power to do? The tradition presents us with three main answers: (1) that agency is a power to affect one’s own will, consequent upon which act further events ensue, beginning with the movement of a part of one's body; (2) that agency is a power to affect one’s own body, consequent upon which act further events ensue, beginning with the movement of an object that one touches; and (3) that agency is (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  5. The seductions of clarity.C. Thi Nguyen - 2021 - Royal Institute of Philosophy Supplement 89:227-255.
    The feeling of clarity can be dangerously seductive. It is the feeling associated with understanding things. And we use that feeling, in the rough-and-tumble of daily life, as a signal that we have investigated a matter sufficiently. The sense of clarity functions as a thought-terminating heuristic. In that case, our use of clarity creates significant cognitive vulnerability, which hostile forces can try to exploit. If an epistemic manipulator can imbue a belief system with an exaggerated sense of clarity, then they (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  6. Hostile Scaffolding.Ryan Timms & David Spurrett - 2023 - Philosophical Papers 52 (1):1-30.
    Most accounts of cognitive scaffolding focus on ways that external structure can support or augment an agent’s cognitive capacities. We call cases where the interests of the user are served benign scaffolding and argue for the possibility and reality of hostile scaffolding. This is scaffolding which depends on the same capacities of an agent to make cognitive use of external structure as in benign cases, but that undermines or exploits the user while serving the interests of another agent. We develop (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  7. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing (...) of likely infections while avoiding too many false positive reports. Centralised apps, in contrast, have the potential to do this. But policy making was influenced by public debates about the right app configuration, which have tended to focus heavily on privacy, and are driven by the assumption that decentralised apps are “privacy preserving by design”. We show that both types of apps are in fact vulnerable to privacy breaches, and, drawing on principles from safety engineering and risk analysis, compare the risks of centralised and decentralised systems along two dimensions, namely the probability of possible breaches and their severity. We conclude that a centralised app may in fact minimise overall ethical risk, and contend that we must reassess our approach to digital contact tracing, and should, more generally, be cautious about a myopic focus on privacy when conducting ethical assessments of data technologies. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  8.  97
    Reconceptualizing The Ethical Guidelines for Mental Health Apps: Values From Feminism, Disability Studies, and Intercultural Ethics.Matthew Dennis, Lily E. Frank, Arthur Bran Herbener, Michał Klincewicz, Malene Flensborg Damholdt, Anna Puzio, Katherine Bassil, Jessica Stone, Philip Schneidenbach, Shriya Das, Ella Thomas & Mat Rawsthorne - 2024 - IEEE Xplore:1-33.
    Existing ethical guidelines that aim to guide the development of mental health apps tend to overemphasize the role of Western conceptual frameworks. While such frameworks have proved to be a useful first step in introducing ethics to a previously unregulated industry, the rapid global uptake of mental health apps requires thinking more deeply about the diverse populations these apps seek to serve. One way to do this is to introduce more intercultural ethical perspectives into app design and the guidelines that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. (1 other version)The Democratic Biopolitics of PrEP.Karsten Schubert - 2019 - In Helene Gerhards & Kathrin Braun (eds.), Biopolitiken – Regierungen des Lebens Heute. Springer Fachmedien Wiesbaden. pp. 121-153.
    PrEP (Pre-Exposure Prophylaxis) is a relatively new drug-based HIV prevention technique and an important means to lower the HIV risk of gay men who are especially vulnerable to HIV. From the perspective of biopolitics, PrEP inscribes itself in a larger trend of medicalization and the rise of pharmapower. This article reconstructs and evaluates contemporary literature on biopolitical theory as it applies to PrEP, by bringing it in a dialogue with a mapping of the political debate on PrEP. As PrEP (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  10. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but it possesses (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Az elektronikus prevenció lehetőségei az új (szintetikus) drogok használatának megelőzésében: a Rekreációs Drogok Európai Hálózatának (Recreational Drugs European Network ….Zsolt Demetrovics, Barbara Mervo, Ornella Corazza, Zoe Davey, Paolo Deluca, Colin Drummond, A. Enea, Jacek Moskalewicz, G. Di Melchiorre, L. Di Furia, Magí Farré, Liv Flesland, Luciano Floridi, Fruzsina Iszáj, N. Scherbaum, Holger Siemann, Arvid Skutle, Marta Torrens, M. Pasinetti, Cinzia Pezzolesi, Agnieszka Pisarska, Harry Shapiro, Elias Sferrazza, Peer Van der Kreeft & F. Schifano - 2010 - Addictologia Hungarica 1:289–297.
    Recreational Drugs European Network (ReDNet) project aims to use the Psychonaut Web Mapping Project database (Psychonaut Web Mapping Group, 2009) containing novel psychoactive compounds usually not mentioned in the scientific literature and thus unknown to clinicians as a unique source of information. The database will be used to develop an integrated ICT prevention approach targeted at vulnerable individuals and focused on novel synthetic and herbal compounds and combinations. Particular care will be taken in keeping the health professionals working directly (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. (1 other version)Accessing Online Data for Youth Mental Health Research: Meeting the Ethical Challenges.Elvira Perez Vallejos, Ansgar Koene, Christopher James Carter, Daniel Hunt, Christopher Woodard, Lachlan Urquhart, Aislinn Bergin & Ramona Statache - 2019 - Philosophy and Technology 32 (1):87-110.
    This article addresses the general ethical issues of accessing online personal data for research purposes. The authors discuss the practical aspects of online research with a specific case study that illustrates the ethical challenges encountered when accessing data from Kooth, an online youth web-counselling service. This paper firstly highlights the relevance of a process-based approach to ethics when accessing highly sensitive data and then discusses the ethical considerations and potential challenges regarding the accessing of public data from Digital Mental Health (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. The Fragile Landscape of the Sharing Economy in Hungary.Bori Simonovits, Anikó Bernát & Bálint Balázs - 2021 - In Andrzej Klimczuk, Vida Česnuityte & Gabriela Avram (eds.), The Collaborative Economy in Action: European Perspectives. Limerick: University of Limerick. pp. 153-163.
    In this chapter, we assess the current state-of-the-art of the Hungarian sharing economy sector relying on statistics, previous surveys, and expert interviews around case examples. Although we record a fast emergence of an increasing number and a widening variety of multinational and home-grown initiatives, we also contend that in Hungary, the innovation ecosystem of the collaborative economy is still relatively feeble. The linkages that are created through these initiatives are controversial sociologically. The main end-users are highly educated young urbanites. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14. Knowledge in motion: How procedural control of knowledge usage entails selectivity and bias.Ulrich Ansorge - 2021 - Journal of Knowledge Structures and Systems 2 (1):3-28.
    The use and acquisition of knowledge appears to be influenced by what humans pay attention to. Thus, looking at attention will tell us something about the mechanisms involved in knowledge (usage). According to the present review, attention reflects selectivity in information processing and it is not necessarily also reflected in a user’s consciousness, as it is rooted in skill memory or other implicit procedural memory forms–that is, attention is rooted in the necessity of human control of mental operations and actions. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Use of Blockchain in Strengthening Cybersecurity And Protecting Privacy.Arif Sari - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):59-66.
    Abstract—The purpose of this study is to highlight and prove the positive impact in which blockchain could have on today’s IoT environment in terms of providing Cybersecurity for not just organizations, but other individuals who share data via the internet. The current IoT environs operates on a centralized cloud based server, meanwhile block chain operates on a decentralized server. The differentiation between the both plays a major role in the level of security they both provide; whereby, decentralized systems are less (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. A Study of Awareness About Cyber Laws for Indian Youth.Jigar Shah - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):10-16.
    In india each and every minute one person become internet users. its convergence with digitally supported platforms and gadgets, safeguarding the parents as well as students from the cybercrimes is becoming a challenging task. In addition to, the pinching reality is that the internet users are not getting updated on the vulnerable cyber threats and security issues, at the pace they are getting updated with the usage of internet enabled tools and apps. Thus the current research paper (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  96
    The Roads to Non-individuals.Jonas R. B. Arenhart & Raoni Wohnrath Arroyo - 2023 - In Jonas R. B. Arenhart & Raoni W. Arroyo (eds.), Non-Reflexive Logics, Non-Individuals, and the Philosophy of Quantum Mechanics: Essays in Honour of the Philosophy of Décio Krause. Springer Verlag. pp. 79-100.
    Ever since its beginnings, standard quantum mechanics has been associated with a metaphysical view according to which the theory deals with non-individual objects, i.e., objects deprived of individuality in some sense of the term. We shall examine the grounds of the claim according to which quantum mechanics is so closely connected with a metaphysics of non-individuals. In particular, we discuss the attempts to learn the ‘metaphysical lessons’ required by quantum mechanics coming from four distinct roads: from the formalism of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Safeguarding Vulnerable Autonomy? Situational Vulnerability, The Inherent Jurisdiction and Insights from Feminist Philosophy.Jonathan Lewis - 2021 - Medical Law Review 29 (2):306-336.
    The High Court continues to exercise its inherent jurisdiction to make declarations about interventions into the lives of situationally vulnerable adults with mental capacity. In light of protective responses of health care providers and the courts to decision-making situations involving capacitous vulnerable adults, this paper has two aims. The first is diagnostic. The second is normative. The first aim is to identify the harms to a capacitous vulnerable adult’s autonomy that arise on the basis of the characterisation (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  19. Recognition, Vulnerability and Trust.Danielle Petherbridge - 2021 - International Journal of Philosophical Studies 29 (1):1-23.
    ABSTRACT This paper examines the question of whether recognition relations are based on trust. Theorists of recognition have acknowledged the ways in which recognition relations make us vulnerable to others but have largely neglected the underlying ‘webs of trust’ in which such relations are embedded. In this paper, I consider the ways in which the theories of recognition developed by Jürgen Habermas and Axel Honneth, not only point to our mutual vulnerability but also implicitly rely upon mutual relations of (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  20. Userization.Andrej Poleev - 2012 - Enzymes 10.
    100 years after creating the Federal Reserve System (FED), whose legality and modus operandi remains questionable, there is time to rethink the national and also international payment system as a whole. The key element of existing economic relationships is the money that makes barter-free exchange possible. But monetary economics is only one aspect of more common political framework designed and established for retention of power. Such egoistic political interest proves its own relevancy and exerts ideological pressure on economic thought that (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  21. Vulnerable due to hope: aspiration paradox as a cross-cultural concern.Eric Palmer - 2014 - Conference Publication, International Development Ethics Association 10th Conference: Development Ethics Contributions for a Socially Sustainable Future.
    (Conference proceedings 2014) This presentation (International Development Ethics Association, July 2014) considers economic vulnerability, exploring the risk of deprivation of necessary resources due to a complex and rarely discussed vulnerability that arises from hope. Pierre Bourdieu’s sociological account of French petit-bourgeois aspiration in The Social Structures of the Economy has recently inspired Wendy Olsen to introduce the term “aspiration paradox” to characterize cases wherein “a borrower's status aspirations may contribute to a situation in which their borrowings exceed their capacity to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Vulnerability, Insecurity and the Pathologies of Trust and Distrust.Catriona Mackenzie - 2020 - International Journal of Philosophical Studies:624-643.
    While some trust theorists have adverted to the vulnerabilities involved in trust, especially vulnerability to betrayal, the literature on trust has not engaged with recent work on the ethics of vulnerability. This paper initiates a dialogue between these literatures, and in doing so begins to explore the complex interrelations between vulnerability and trust. More specifically, it aims to show how trust can both mitigate and compound vulnerability. Through a discussion of two examples drawn from literary sources, the paper also investigates (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. Users’ Guide to the Use of Dictionary.Christopher Okeke Ajah - 2019 - GNOSI: An Interdisciplinary Journal of Human Theory and Praxis 2 (1).
    Dictionary making is the preoccupation of a lexicographer (dictionary compiler) and the art of making it (dictionary) is called lexicography. Dictionary can either be in printing or electronic form. It is no doubt a vital tool for language learning and usage. The importance of a dictionary in learning and usage of a language cannot be neglected because its role in learning generally which includes among others: word meaning, word usage, pronunciation, spelling, origin and parts of speech are fundamental in communication. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Guide - User Co-Production in Standardisation.Estelle Huchet, Fernando Machicado, Roberto Scano, Malcolm Fisk, Alexandra Engelt, Diane Whitehouse, Stephan Schug, Caroline Holland, Verina Waights, Andrzej Klimczuk, Frederic Lievens, Marlou Bijlsma & Thamar Zijlstra - 2018
    Research within the H2020 PROGRESSIVE project has identified good practices in user co-production strategies and methodologies. Early findings from research in the PROGRESSIVE project were shared with relevant stakeholders outside the consortium for consultation and review. The outcomes of that initial investigation highlighted the need to focus on the objectives, processes, and methods used in user and older people co-production. This guide adapts these insights and makes them relevant specifically for standardisation in ICT for active and healthy ageing. This guide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Death on The Road.Mota Victor - manuscript
    Road accidents are as same as fatal than domestic violence in Portugal.
    Download  
     
    Export citation  
     
    Bookmark  
  26. Vulnerability in Social Epistemic Networks.Emily Sullivan, Max Sondag, Ignaz Rutter, Wouter Meulemans, Scott Cunningham, Bettina Speckmann & Mark Alfano - 2020 - International Journal of Philosophical Studies 28 (5):1-23.
    Social epistemologists should be well-equipped to explain and evaluate the growing vulnerabilities associated with filter bubbles, echo chambers, and group polarization in social media. However, almost all social epistemology has been built for social contexts that involve merely a speaker-hearer dyad. Filter bubbles, echo chambers, and group polarization all presuppose much larger and more complex network structures. In this paper, we lay the groundwork for a properly social epistemology that gives the role and structure of networks their due. In particular, (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  27. Vulnerability, Recognition, and the Ethics of Pregnancy: A Theological Response.Margaret Kamitsuka - 2024 - Hypatia.
    Vulnerability is a notion discussed in feminist philosophy as a basis for a morality that widens our sense of those whose deaths are grievable. Vulnerability and grievability also factor in reproductive ethics. This essay employs recognition theory to analyze critically how these notions are mobilized in conservative Christian anti-abortion writings and in feminist philosophy. This analysis exposes weaknesses and misrecognition in both sets of discourses. In response, I offer theological arguments for recognizing fetal value without implying a right to life (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Road transport system in Southeast Asia; problems and economic solutions.Maynard Clark, Sara Kaffashi & Mad Nasir Shamsudin - 2016 - Current World Environment 11 (1):10-19.
    In Southeast Asian countries (SEA), road transport accounts for the main energy consumption and CO2 emission. Air pollution is a major concern in densely populated cities such as Bangkok, Manila, and Kuala Lumpur. The main objective of this paper is to give insights on trends of transport development, car ownership, and CO2 emissions in Southeast Asia. This study also attempts to review the successful transportation policies around the globe and to introduce the possible instruments that can help reduce air (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. China's Belt and Road Initiative: Global Politics and Implications.Md Mahmudul Hoque & Riffat Ara Zannat Tama - 2020 - European Scientific Journal 16 (31):279-299.
    Belt and Road Initiative (BRI) is a global infrastructure development project that ambitiously aims to connect Asia with European and African continents through land and sea corridors. China adopted this gigantic game-changing master plan in 2013 and spurred much speculation among scholars and policymakers worldwide. This article investigates the development of the project through the lens of global political geography and economy. From an international relations perspective, the authors consult relevant pieces of literature and focus on the international issues (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  30. A user profiling component with the aid of user ontologies.Nébel István-Tibor, Barry Smith & Paschke Ralf - 2003 - In Nébel István-Tibor, Barry Smith & Paschke Ralf (eds.), Learning – Teaching – Knowledge – Adaptivity (LLWA), University of Karlsruhe (2003). Karlsruhe, Germany:
    Abstract: What follows is a contribution to the field of user modeling for adaptive teaching and learning programs especially in the medical field. The paper outlines existing approaches to the problem of extracting user information in a form that can be exploited by adaptive software. We focus initially on the so-called stereotyping method, which allocates users into classes adaptively, reflecting characteristics such as physical data, social background, and computer experience. The user classifications of the stereotyping method are however ad (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. The role of vulnerability in Kantian ethics.Paul Formosa - 2013 - In Catriona Mackenzie, Wendy Rogers & Susan Dodds (eds.), Vulnerability: New Essays in Ethics and Feminist Philosophy. New York: Oup Usa. pp. 88-109.
    Does the fact that humans are vulnerable, needy and dependent beings play an important role in Kantian ethics? It is sometimes claimed that it cannot and does not. I argue that it can and does. I distinguish between broad (all persons are vulnerable) and narrow (only some persons are vulnerable) senses of vulnerability, and explain the role of vulnerability in both senses in Kantian ethics. The basis of this argument is to show that the core normative focus (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  32. Equity and Social Justice considerations in road safety work: The case of Vision Zero in New York City.Henok Girma Abebe, Matts-Åke Belin & Karin Edvardsson Björnberg - 2024 - Transport Policy 149 (2024):11-20.
    This paper analyses how Vision Zero (VZ) efforts in New York City (NYC) account for equity and social justice implications of road safety work. VZ policy documents, research literature, popular science and opinion articles on road safety work in the city were studied with a prime focus on equity and social justice. Twelve semi-structured interviews with stakeholders involved in road safety and transport planning in the city and at national level were conducted to gain an in-depth understanding (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Spreading the Plague: Vulnerability, Solidarity and Autonomy in the Time of Pandemic.Noemi Magnani - 2020 - Revista de Filosofie Aplicata 3 (Supplementary Issue):69 - 81.
    In a series of reflections published in the wake of the Covid-19 crisis, Giorgio Agamben expresses a number of concerns related to the way the pandemic has altered the very fabric of our societies, potentially changing it forever. While maintaining a certain scepticism towards the threat represented by the virus itself, Agamben claims that the response to the contagion shows how easy it is for authorities to limit individual freedoms in the name of public health, and how readily they are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Epistemic vulnerability and tolerance in society.Maddox Larson - 2024 - The Philosophy, Politics, and Economics Review 3:15-28.
    The question of church-state separation has haunted America since her founding. James Madison and select founding fathers suggest that religions and states are better off when they minimize (or altogether eliminate) their interactions. Many Muslims in Iran, for instance, believe the opposite – aligning state functions with religious motives results in the most effective state. In this paper, I propose a model of thinking about church-state separation in which states and religions must maintain epistemic vulnerability to allow legal, political, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. The Politics of Vulnerability and Care: An Interview with Estelle Ferrarese.Liesbeth Schoonheim, Tivadar Vervoort & Estelle Ferrarese - 2022 - Krisis 42 (1):77-92.
    In this interview, Estelle Ferrarese elaborates on her account of vulnerability and care to highlight its political and social, as opposed to its ethical, dimensions. Drawing on, amongst others, Adorno, Tronto, Castell, and Laugier, she argues that vulnerability and care should not be understood ontologically, as an antropological exposure of the body, but rather socially, as the normative expectations and material conditions under which care work takes place. Situating her approach in anglophone and francophone discussions on vulnerability and precarity, she (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. The Road to ideelle Verähnlichung. Anton Marty’s Conception of Intentionality in the Light of its Brentanian Background.Laurent Cesalli & Hamid Taieb - 2012 - Quaestio 12:171-232.
    Anton Marty (1847-1914) is known to be the most faithful pupil of Franz Brentano. As a matter of fact, most of his philosophical ideas find their source in the works of his master. Yet, the faithfulness of Marty is not constant. As the rich correspondence between the two thinkers shows, Marty elaborates an original theory of intentionality from ca. 1904 onward. This theory is based on the idea that intentionality is a process of mental assimilation (ideelle Verähnlichung), a process at (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  37. A Road Map of Interval Temporal Logics and Duration Calculi.Valentin Goranko, Angelo Montanari & Guido Sciavicco - 2004 - Journal of Applied Non-Classical Logics 14 (1-2):9-54.
    We survey main developments, results, and open problems on interval temporal logics and duration calculi. We present various formal systems studied in the literature and discuss their distinctive features, emphasizing on expressiveness, axiomatic systems, and (un)decidability results.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  38. Expressive Vulnerabilities: Language and the Non-Human.Joe Larios - 2020 - International Journal of Philosophical Studies 28 (5):662-676.
    Emmanuel Levinas’s work seemingly places a great emphasis on language leading some commentators towards a Kantian reading of him where moral consideration would be based on the moral patient’s capacity for reason with language functioning as a proxy for this. Although this reading is possible, a closer look at Levinas’s descriptions of language reveal that its defining characteristic is not reason but the capacity to express beyond any thematized contents we would give to the Other. This expressivity (which Levinas calls (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  39. Children's Vulnerability and Legitimate Authority Over Children.Anca Gheaus - 2018 - Journal of Applied Philosophy:60-75.
    Children's vulnerability gives rise to duties of justice towards children and determines when authority over them is legitimately exercised. I argue for two claims. First, children's general vulnerability to objectionable dependency on their caregivers entails that they have a right not to be subject to monopolies of care, and therefore determines the structure of legitimate authority over them. Second, children's vulnerability to the loss of some special goods of childhood determines the content of legitimate authority over them. My interest is (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  40. Discriminatory attitude toward vulnerable groups in Singapore: Prevalence, predictors, and pattern.Nur Amali Aminnuddin - 2019 - Journal of Behavioral Science 14 (2):15-30.
    Presently, there is a lack of psychological and quantitative studies in Singapore about discriminatory attitudes. This paper aimed to contribute to this aspect. However, to examine actual behavior can be difficult due to the sensitive nature of the needed data. Hence, this study approached discrimination at an attitudinal level. Six vulnerable groups were examined in this study. They consisted of people of a different race, immigrants or foreign workers, homosexuals, people living with HIV/AIDS, people of a different religion, and (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  41. In defence of posthuman vulnerability.Belen Liedo Fernandez & Jon Rueda - 2021 - Scientia et Fides 9 (1):215-239.
    Transhumanism is a challenging movement that invites us to rethink what defines humanity, including what we value and regret the most about our existence. Vulnerability is a key concept that require thorough philosophical scrutiny concerning transhumanist proposals. Vulnerability can refer to a universal condition of human life or, rather, to the specific exposure to certain harms due to particular situations. Even if we are all vulnerable in the first sense, there are also different sources and levels of vulnerability depending (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  42. The 'Great Equalizer'? Autonomy, Vulnerability and Solidarity in Uncertain Times.Noemi Magnani - 2020 - Biblioteca Della Libertà 2 (228):1 - 22.
    In this paper I engage with the notion that Covid-19 can be seen as the ‘great equalizer’, in virtue of the widespread sense of uncertainty it has caused and the fact that it has forced us to recognize our shared human fragility. Against the view that Covid-19 is the ‘great equalizer’, I argue that, on the contrary, the pandemic reflects existing vulnerabilities and, in many cases, exacerbates them. I do so by offering first a definition of both ontological and relational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Human vulnerability: A break to autonomy?Carlos Alberto Rosas Jimenez - 2015 - Revista de Bioética Latinoamericana 1 (16):1-16.
    In society, human vulnerability is associated with multiple causes such as poverty, injustice, discrimination and illnesses, among others. In the midst of this panorama of external agents that lead human beings to situations of vulnerability, some clearly see – although others not so much – a vulnerability proper to the human person, simply because they exist. This approach to vulnerability is considered to be a conditio humana that affects everyone. Precisely because it is a conditio humana, vulnerability is closely related (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Perils of the Open Road.William Lane Craig & David P. Hunt - 2013 - Faith and Philosophy 30 (1):49-71.
    Open theists deny that God knows future contingents. Most open theists justify this denial by adopting the position that there are no future contingent truths to be known. In this paper we examine some of the arguments put forward for this position in two recent articles in this journal, one by Dale Tuggy and one by Alan Rhoda, Gregory Boyd, and Thomas Belt. The arguments concern time, modality, and the semantics of ‘will’ statements. We explain why we find none of (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  45. (1 other version)Conceptual Engineering: A Road Map to Practice.Manuel Gustavo Isaac, Steffen Koch & Ryan Nefdt - 2022 - Philosophy Compass 17 (10):1-15.
    This paper discusses the logical space of alternative conceptual engineering projects, with a specific focus on (1) the processes, (2) the targets and goals, and (3) the methods of such projects. We present an overview of how these three aspects interact in the contemporary literature and discuss those alternative projects that have yet to be explored based on our suggested typology. We show how choices about each element in a conceptual engineering project constrain the possibilities for the others, thereby giving (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  46.  96
    Bioethical Implications of Vulnerability and Politics for Healthcare in Ethiopia and The Ways Forward.Kirubel Manyazewal Mussie, Bernice Simone Elger, Mirgissa Kaba, Félix Pageau & Isabelle Wienand - 2022 - Journal of Bioethical Inquiry 19 (4):667-681.
    Vulnerability and politics are among the relevant and key topics of discussion in the Ethiopian healthcare context. Attempts by the formal bioethics structure in Ethiopia to deliberate on ethical issues relating to vulnerability and politics in healthcare have been limited, even though the informal analysis of bioethical issues has been present in traditional Ethiopian communities. This is reflected in religion, social values, and local moral underpinnings. Thus, the aim of this paper is to discuss the bioethical implications of vulnerability and (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  47. A Beginner’s Guide to Crossing the Road: Towards an Epistemology of Successful Action in Complex Systems.Ragnar van Der Merwe & Alex Broadbent - forthcoming - Interdisciplinary Science Reviews.
    Crossing the road within the traffic system is an example of an action human agents perform successfully day-to-day in complex systems. How do they perform such successful actions given that the behaviour of complex systems is often difficult to predict? The contemporary literature contains two contrasting approaches to the epistemology of complex systems: an analytic and a post-modern approach. We argue that neither approach adequately accounts for how successful action is possible in complex systems. Agents regularly perform successful actions (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Comprehensive User Engagement Sites (CUES) in Philadelphia: A Constructive Proposal.Peter Clark, Marvin J. H. Lee, S. Gulati, A. Minupuri, P. Patel, S. Zheng, Sam A. Schadt, J. Dubensky, M. DiMeglio, S. Umapathy, Olivia Nguyen, Kevin Cooney & S. Lathrop - 2018 - Internet Journal of Public Health 18 (1):1-22.
    This paper is a study about Philadelphia’s comprehensive user engagement sites (CUESs) as the authors address and examine issues related to the upcoming implementation of a CUES while seeking solutions for its disputed questions and plans. Beginning with the federal drug schedules, the authors visit some of the medical and public health issues vis-à-vis safe injection facilities (SIFs). Insite, a successful Canadian SIF, has been thoroughly researched as it represents a paradigm for which a Philadelphia CUES can expand upon. Also, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. The Road Not Taken – Reading Calabresi’s “The Future of Law and Economics”.Paolo Silvestri - 2019 - Global Jurist 19 (3):1-7.
    The publication of Guido Calabresi’s book “The Future of Law and Economics” has drawn a substantial amount of attention among law and economics scholars. We thought that the best way to devote special attention to this book was to devote a Special issue to it. This article situates Calabresi’s book among other reflections on the future of the discipline, introduces and explains the reasons behind this Special issue and discuss the organization and content of it. -/- We emphasize how Calabresi’s (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. The Road to Necropolis: Technics and Death in the Philosophy of Lewis Mumford.Gregory Morgan Swer - 2003 - History of the Human Sciences 16 (4):39-59.
    The purpose of this article is to explore the close link between technology and death in the philosophical writings of Lewis Mumford. Mumford famously argued that throughout the history of western civilization we find intertwined two competing forms of technics; the democratic biotechnic form and the authoritarian monotechnic form. The former technics were said to be strongly compatible with an organic form of life while the latter were said to be allied to a mechanical power complex. What is perhaps less (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
1 — 50 / 973