David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Jack Alan Reynolds
Learn more about PhilPapers
It’s morning. You sit down at your desk, cup of coffee in hand, and prepare to begin your day. First, you turn on your computer. Once it is running, you check your e-mail. Having decided it is all spam, you trash it. You close the window on your e-mail program, but leave the program running so that it will periodically check the mail server to see whether you have new mail. If it finds new mail it will alert you by playing a musical tone. Next you start your word processor. You have in mind to write a paper in moral philosophy about whether people who send spam deserve capital punishment. So you open a new window and type several paragraphs of text into it. You like what you wrote, so you save it, creating a file. Later, you have more thoughts about spam and capital punishment, so you open the file again and make some changes. Then it is time to go to class. You turn off your word processor, but leave your computer running so that your email program can collect your e-mail. This mundane sequence of events can seem philosophically puzzling when we think about it carefully. While in your word processor, you opened several windows, entered text into them, and created files. What sorts of things are these files, windows, and text? It might seem that windows are easy to understand. You can, after all, see windows. That is the whole point of them. You see a window by seeing a pattern on the surface of your monitor. Isn’t the window identical with that physical pattern? But that is too quick. First, you can turn your monitor off. The window is still open. You can type text into it, and if you turn the monitor back on you can verify that you made that change. Second, you can drag another window in front of the original window. The original window disappears from view, but it still exists. Things may be happening in it that you cannot see. For example, if it is an e-mail window, new messages may be listed in it as they are 1 downloaded..
|Keywords||No keywords specified (fix it)|
No categories specified
(categorize this paper)
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library||
References found in this work BETA
No references found.
Citations of this work BETA
No citations found.
Similar books and articles
John L. Pollock (2008). What Am I? Philosophy and Phenomenological Research 76 (2):237-309.
John L. Pollock (2008). What Am I? Virtual Machines and the Mind/Body Problem. Philosophy and Phenomenological Research 76 (2):237–309.
Jonathan Schaffer (2003). Overdetermining Causes. Philosophical Studies 114 (1-2):23 - 45.
Anna Szabolcsi (2002). Hungarian Disjunctions and Positive Polarity. In Istvan Kenesei & Peter Siptar (eds.), Approaches to Hungarian, Vol. 8. Univ. of Szeged.
John Collins (2000). Preemptive Prevention. Journal of Philosophy 97 (4):223-234.
John MacFarlane (2011). What Is Assertion? In Jessica Brown & Herman Cappelen (eds.), Assertion. Oup Oxford.
Vefa Karatary & Yağmur Denizhan (2002). Evolution of the “Window”. Sign Systems Studies 30 (1):259-269.
Eyal M. Reingold & Jiye Shen, Peripheral and Parafoveal Cueing and Masking Effects on Saccadic Selectivity in a Gaze-Contingent Window Paradigm.
Thomas J. Hodson, Fred Englander & Valerie Englander (1999). Ethical, Legal and Economic Aspects of Employer Monitoring of Employee Electronic Mail. Journal of Business Ethics 19 (1):99 - 108.
R. A. Spinello (1999). Ethical Reflections on the Problem of Spam. Ethics and Information Technology 1 (3):185-191.
Added to index2010-12-22
Total downloads4 ( #263,925 of 1,099,743 )
Recent downloads (6 months)1 ( #303,379 of 1,099,743 )
How can I increase my downloads?