Search results for 'Copying' (try it on Scholar)

832 found
Sort by:
  1. Marcus Boon (2010). In Praise of Copying. Harvard University Press.score: 18.0
    What is a copy? -- Copia, or, The abundant style -- Copying as transformation -- Copying and deception -- Montage -- The mass production of copies -- Copying as appropriation.
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  2. Antanas Rudzinskas & Ąžuolas Čekanavičius (2011). Private Copying Exception in Lithuanian Copyright Law: Compatibility with the European Union Law After Preliminary Ruling in Padawan Case. Jurisprudence 18 (1):125-141.score: 18.0
    Private copying exception is an exception to copyright which is present both in Lithuanian national law and law of the European Union. Recent jurisprudence of Court of Justice of the European Union interpreted legal regulation of private copying exception in the laws of the European Union. The mentioned jurisprudence raised concern whether Lithuanian copyright laws on private copying exception and their interpretation in case law of Supreme Court of Lithuania are compatible with the European Union law. This (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  3. Jerry A. Hogan (1961). Copying Redundant Messages. Journal of Experimental Psychology 62 (2):153.score: 15.0
    No categories
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  4. Yongyan Li (2013). Text-Based Plagiarism in Scientific Writing: What Chinese Supervisors Think About Copying and How to Reduce It in Students' Writing. Science and Engineering Ethics 19 (2):569-583.score: 12.0
    Text-based plagiarism, or textual copying, typically in the form of replicating or patchwriting sentences in a row from sources, seems to be an issue of growing concern among scientific journal editors. Editors have emphasized that senior authors (typically supervisors of science students) should take the responsibility for educating novices against text-based plagiarism. To address a research gap in the literature as to how scientist supervisors perceive the issue of textual copying and what they do in educating their students, (...)
    Direct download (8 more)  
     
    My bibliography  
     
    Export citation  
  5. Lei Chang, Hui Jing Lu & Bao Pei Wu (2012). Pathogens Promote Matrilocal Family Ties and the Copying of Foreign Religions. Behavioral and Brain Sciences 35 (2):82-83.score: 12.0
    Within the same pathogen-stress framework as proposed by Fincher & Thornhill (F&T), we argue further that pathogen stress promotes matrilocal rather than patrilocal family ties which, in turn, slow down the process of modernity; and that pathogen stress promotes social learning or copying, including the adoption of foreign religions.
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  6. Tracy A. Suter, Steven W. Kopp & David M. Hardesty (2004). The Relationship Between General Ethical Judgments and Copying Behavior at Work. Journal of Business Ethics 55 (1):61 - 70.score: 12.0
    Electronic technologies, in general, and computer-oriented technologies specifically have had a tremendous impact on all aspects of business. One area of increased concern is the protection of intellectual properties -- notably copyrights -- within the boundaries of the broadly defined technology industry. While the ability to share copyrighted information has always existed at the most basic levels, the advent of the information age has allowed the sharing of this information to take place in potentially greater quantities and without a loss (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  7. D. Waynforth (2007). Mate Choice Copying in Humans. Human Nature 18 (3):264-271.score: 12.0
    There is substantial evidence that in human mate choice, females directly select males based on male display of both physical and behavioral traits. In non-humans, there is additionally a growing literature on indirect mate choice, such as choice through observing and subsequently copying the mating preferences of conspecifics (mate choice copying). Given that humans are a social species with a high degree of sharing information, long-term pair bonds, and high parental care, it is likely that human females could (...)
    No categories
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  8. F. H. Bradley (1907). On Truth and Copying. Mind 16 (62):165-180.score: 9.0
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  9. Alexander Pruss, Identity and the Copying of Minds.score: 9.0
    I argue against psychological theories of identity that claim that in cases where one’s personality and memories are moved into the brain of another, we move with them. I am not entirely convinced by my arguments here, I must confess, but I think they deserve some thought.
    No categories
     
    My bibliography  
     
    Export citation  
  10. Catherine Eagleton & Matthew Spencer (2006). Copying and Conflation in Geoffrey Chaucer's Treatise on the Astrolabe: A Stemmatic Analysis Using Phylogenetic Software. Studies in History and Philosophy of Science Part A 37 (2):237-268.score: 9.0
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  11. Myles Mcdonnell (1996). Writing, Copying, and Autograph Manuscripts in Ancient Rome. Classical Quarterly 46 (02):469-.score: 9.0
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  12. Henry Sturt (1907). Mr. Bradley on Truth and Copying. Mind 16 (63):416-417.score: 9.0
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  13. Misato Hayashi, Sumirena Sekine, Masayuki Tanaka & Hideko Takeshita (2009). Copying a Model Stack of Colored Blocks by Chimpanzees and Humans. Interaction Studies 10 (2):130-149.score: 9.0
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  14. Mikko T. Siponen & Tero Vartiainen (2007). Unauthorized Copying of Software: An Empirical Study of Reasons for and Against. Acm Sigcas Computers and Society 37 (1):30-43.score: 9.0
    No categories
    Direct download (8 more)  
     
    My bibliography  
     
    Export citation  
  15. Mónica Tamariz & Simon Kirby (2014). Culture: Copying, Compression, and Conventionality. Cognitive Science 38 (5).score: 9.0
    Through cultural transmission, repeated learning by new individuals transforms cultural information, which tends to become increasingly compressible (Kirby, Cornish, & Smith, ; Smith, Tamariz, & Kirby, ). Existing diffusion chain studies include in their design two processes that could be responsible for this tendency: learning (storing patterns in memory) and reproducing (producing the patterns again). This paper manipulates the presence of learning in a simple iterated drawing design experiment. We find that learning seems to be the causal factor behind the (...)
    No categories
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  16. Tobias Uller & L. Christoffer Johansson (2003). Human Mate Choice and the Wedding Ring Effect. Human Nature 14 (3):267-276.score: 9.0
    Individuals are often restricted to indirect cues when assessing the mate value of a potential partner. Females of some species have been shown to copy each other’s choice; in other words, the probability of a female choosing a particular male increases if he has already been chosen by other females. Recently it has been suggested that mate-choice copying could be an important aspect of human mate choice as well. We tested one of the hypotheses, the so-called wedding ring effect—that (...)
    No categories
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  17. D. Elisseeff & J. Fletcher (1998). Copying in Imperial China. Diogenes 46 (183):7-23.score: 9.0
    No categories
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  18. Michael Geist (2005). E-Commerce Law at the University of Ottawa, Faculty of Law. He Can Reached at< Mgeist@ Uottawa. Ca>. This Appeared in the Toronto Star on 8 August 2005 as" Copying Levy Hasn't Worked Well For Anyone". [REVIEW] Knowledge, Technology, and Policy 18 (3):6-19.score: 9.0
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  19. Vincent W. J. Van Gerven Oei (2011). Anders Breivik: On Copying the Obscure. Continent 1 (3):213-223.score: 9.0
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  20. Daniel Radzinski (1990). Unbounded Syntactic Copying in Mandarin Chinese. Linguistics and Philosophy 13 (1):113 - 127.score: 9.0
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  21. C. J. Ash, P. Cholak & J. F. Knight (1997). Permitting, Forcing, and Copying of a Given Recursive Relation. Annals of Pure and Applied Logic 86 (3):219-236.score: 9.0
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  22. Selmer Bringsjord (1989). In Defense of Copying. Public Affairs Quarterly 3 (1):1-9.score: 9.0
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  23. Maureen Cavan (2005). Digital Copying: A Voice From Canada. Logos 16 (1):35-37.score: 9.0
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  24. A. Davis & B. De Bruyn (2004). The Directional Bias in Children's Line Copying Does Not Generalise to Pointing Actions. In Robert Schwartz (ed.), Perception. Malden Ma: Blackwell Publishing. 168-168.score: 9.0
     
    My bibliography  
     
    Export citation  
  25. Ludwig Huber (1998). Movement Imitation as Faithful Copying in the Absence of Insight. Behavioral and Brain Sciences 21 (5):694-694.score: 9.0
    Byrne & Russon use novelty as the primary requirement for providing evidence of true imitation in animals. There are three reasons to object to this. First, experiential learning cannot always be completely excluded as an alternative explanation of the observed behavior. Second, the imitator's manipulations performed during ontogeny cannot be known in full detail. Finally, there is at present only a weak understanding of how novel forms emerge. Data from our own recent experiments will be used to emphasize the need (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  26. Dorothee Kremers, Margarita Briseño Jaramillo, Martin Böye, Alban Lemasson & Martine Hausberger (2011). Do Dolphins Rehearse Show-Stimuli When at Rest? Delayed Matching of Auditory Memory. Frontiers in Psychology 2.score: 9.0
    The mechanisms underlying vocal mimicry in animals remain an open question. Delphinidae are able to copy sounds from their environment that are not produced by conspecifics. Usually, these mimicries occur associated with the context in which they were learned. No reports address the question of separation between auditory memory formation and spontaneous vocal copying although the sensory and motor phases of vocal learning are separated in a variety of songbirds. Here we show that captive bottlenose dolphins produce, during their (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  27. Bill Wagner (1993). A Recycling Approach Worth Copying. Business Ethics 7 (3):17-17.score: 9.0
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  28. Vincent W. J. Van Gerven Oei (2011). Anders Breivik: On Copying the Obscure. Continent 1 (3):213-223.score: 9.0
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  29. Vincent Wj van Gerven Oei (2011). Anders Breivik: On Copying the Obscure. Continent 1 (3):213-223.score: 9.0
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  30. Laura Davis & Mark Usry (2011). Faculty Selling Desk Copies—The Textbook Industry, the Law and the Ethics. Journal of Academic Ethics 9 (1):19-31.score: 6.0
    It is a guilty secret that many college professors sell the complimentary desk copies that they receive from textbook publishers for cash. This article attempts to shed light on the undercover practice by looking at the resale of complimentary textbooks by faculty from four perspectives. Part One provides an overview of the college textbook industry, the business reasons that motivate publishers to provide complimentary desk copies to faculty, and the economic consequences of the entry of the textbooks into the used (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  31. Angela Coventry & Tom Seppalainen (2012). Hume’s Empiricist Inner Epistemology: A Reassessment of The Copy Principle. In Alan Bailey & Dan O'Brien (eds.), The Continuum Companion to Hume. Continuum. 38--56.score: 6.0
    Vivacity, the “liveliness” of perceptions, is central to Hume’s epistemology. Hume equated belief with vivid ideas. Vivacity is a conscious quality so believable ideas are felt to be lively. Hume’s empiricism revolves around a phenomenological, inner epistemology. Through copying, Hume bases vivacity in impressions. Sensory vivacity also concerns liveliness or patterns of change. Through learnt skillful use, it tracks change specific to intentional sense-perceptual experience, Hume’s “coherent and constant” complex impressions. Copying, in turn, communicates the conscious skill of (...)
    Direct download  
     
    My bibliography  
     
    Export citation  
  32. Stefan Larsson (2013). Copy Me Happy: The Metaphoric Expansion of Copyright in a Digital Society. [REVIEW] International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 26 (3):615-634.score: 6.0
    The article uses conceptual metaphor theory to analyse how the concept of “copy” in copyright law is expanding in a digital society to cover more phenomena than originally intended. For this purpose, the legally accepted model for valuing media files in the case against The Pirate Bay (TPB) is used in the analysis. When four men behind TPB were convicted in the District Court of Stockholm, Sweden, on 17 April 2009, to many, it marked a victory over online piracy for (...)
    No categories
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  33. André Spicer (2004). The Philosophy of the Copy and the Art of Colonial Organisation. Philosophy of Management 4 (3):15-24.score: 6.0
    In this paper I work through an Antipodean phenomenon; the prevalence of copying or mimesis in processes of organising. Rejecting claims for a more authentically Antipodean way of organising, I argue that we need to properly understand the weight of the copy through philosophical inquiry into mimesis. I begin this inquiry with neo-institutional theoretical insights into mimesis. I then sketch out a short history of the emergence of the original and the copy. This Platonic distinction is then elaborated upon (...)
    No categories
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  34. Susan Keith (2000). The Existential Copy Editor. Journal of Mass Media Ethics 15 (1):43 – 57.score: 4.0
    Newspaper copy editors labor in anonymity and struggle for respect in their newsrooms. These conditions may make it difficult for them to realize their potential as the last line of defense against violations of ethical practice. By adopting existentialism as a guiding moral philosophy, however, copy editors can find the courage and confidence to act as final guardians of ethical journalism. This article examines how copy editors are often overlooked in the literature of journalism ethics and suggests ways in which (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  35. Jason Merchant, Economy, the Copy Theory, and Antecedent-Contained Deletion.score: 4.0
    This squib investigates the nature and syntactic placement of the restriction of quantificational determiners under the copy theory of movement and presents a brief argument from the interaction of antecedent-contained deletion (ACD) and Principle C that while relative clauses in ACD must be deleted from their base positions, complements and adjuncts in NP need not be, and hence must not be.
     
    My bibliography  
     
    Export citation  
  36. Marco Giovanelli (2010). Urbild Und Abbild. Leibniz, Kant Und Hausdorff Über Das Raumproblem: The Original and the Copy. Leibniz, Kant and Hausdorff on the Problem of Space. Journal for General Philosophy of Science / Zeitschrift für Allgemeine Wissenschaftstheorie 41 (2):283 - 313.score: 4.0
    The article attempts to reconsider the relationship between Leibniz's and Kant's philosophy of geometry on the one hand and the nineteenth century debate on the foundation of geometry on the other. The author argues that the examples used by Leibniz and Kant to explain the peculiarity of the geometrical way of thinking are actually special cases of what the Jewish-German mathematician Felix Hausdorff called "transformation principle", the very same principle that thinkers such as Helmholtz or Poincaré applied in a more (...)
    No categories
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  37. Sachiko Kusukawa (2012). Thomas Kirke's Copy of Philosophical Transactions. Spontaneous Generations 6 (1):8-14.score: 4.0
    In this paper, I discuss a drawing that substituted for an engraving in a copy of Philosophical Transactions once owned by Thomas Kirke (1650–1706, FRS 1693). I suggest that prints allowed Kirke to train his eye as well as his hand. His case is useful for raising further questions about visual representations in early modern science.
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  38. Solen Sausset, Eric Lambert & Thierry Olive (2013). Flexibility of Orthographic and Graphomotor Coordination During a Handwritten Copy Task: Effect of Time Pressure. Frontiers in Psychology 4:866.score: 4.0
    The coordination of the various processes involved in language production is a subject of keen debate in writing research. Some authors hold that writing processes can be flexibly coordinated according to task demands, whereas others claim that process coordination is entirely inflexible. For instance, orthographic planning has been shown to be resource-dependent during handwriting, but inflexible in typing, even under time pressure. The present study therefore went one step further in studying flexibility in the coordination of orthographic processing and graphomotor (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  39. Marian David, The Correspondence Theory of Truth. Stanford Encyclopedia of Philosophy.score: 3.0
    Narrowly speaking, the correspondence theory of truth is the view that truth is correspondence to a fact -- a view that was advocated by Russell and Moore early in the 20 th century. But the label is usually applied much more broadly to any view explicitly embracing the idea that truth consists in a relation to reality, i.e., that truth is a relational property involving a characteristic relation (to be specified) to some portion of reality (to be specified). During the (...)
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  40. Robert F. Easley (2005). Ethical Issues in the Music Industry Response to Innovation and Piracy. Journal of Business Ethics 62 (2):163 - 168.score: 3.0
    The current conflict between the recording industry and a portion of its customers who are involved in illicit copying of music files arose from innovations involving the compression and electronic distribution of files over the internet. This paper briefly describes some of the challenges faced by the recording industry, and examines some of the ethical issues that arise in various industry and consumer responses to the opportunities and threats presented by these innovations. The paper concludes by highlighting the risks (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  41. Peter Langland‐Hassan (2014). What It Is to Pretend. Pacific Philosophical Quarterly 95 (1).score: 3.0
    Pretense is a topic of keen interest to philosophers and psychologists. But what is it, really, to pretend? What features qualify an act as pretense? Surprisingly little has been said on this foundational question. Here I defend an account of what it is to pretend, distinguishing pretense from a variety of related but distinct phenomena, such as (mere) copying and practicing. I show how we can distinguish pretense from sincerity by sole appeal to a person's beliefs, desires, and intentions (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  42. Timothy Paul Cronan & Sulaiman Al-Rafee (2008). Factors That Influence the Intention to Pirate Software and Media. Journal of Business Ethics 78 (4):527 - 545.score: 3.0
    This study focuses on one of the newer forms of software piracy, known as digital piracy, and uses the Theory of Planned Behavior (TPB) as a framework to attempt to determine factors that influence digital piracy (the illegal copying/downloading of copyrighted software and media files). This study examines factors, which could determine an individual’s intention to pirate digital material (software, media, etc.). Past piracy behavior and moral obligation, in addition to the prevailing theories of behavior (Theory of Planned Behavior), (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  43. Brian Hilton, Chong Ju Choi & Stephen Chen (2004). The Ethics of Counterfeiting in the Fashion Industry: Quality, Credence and Profit Issues. [REVIEW] Journal of Business Ethics 55 (4):345 - 354.score: 3.0
    One of the greatest problems facing luxury goods firms in a globalizing market is that of counterfeiting. The purpose of this paper is to analyze the different types of counterfeiting that take place in thefashion industry and the ethical issues raised. We argue that the problem partly lies in the industry itself. Copying of designs is endemic and condoned, which raises several ethical dilemmas in passing judgment on the practice of counterfeiting. We analyze the ethical issues in a number (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  44. Steven M. Bayne (2000). Kant's Answer to Hume: How Kant Should Have Tried to Stand Hume's Copy Thesis on its Head. British Journal for the History of Philosophy 8 (2):207 – 224.score: 3.0
  45. James Wilson (2009). Could There Be a Right to Own Intellectual Property? Law and Philosophy 28 (4):393 - 427.score: 3.0
    Intellectual property typically involves claims of ownership of types, rather than particulars. In this article I argue that this difference in ontology makes an important moral difference. In particular I argue that there cannot be an intrinsic moral right to own intellectual property. I begin by establishing a necessary condition for the justification of intrinsic moral rights claims, which I call the Rights Justification Principle. Briefly, this holds that if we want to claim that there is an intrinsic moral right (...)
    Direct download (8 more)  
     
    My bibliography  
     
    Export citation  
  46. Richard S. Glass & Wallace A. Wood (1996). Situational Determinants of Software Piracy: An Equity Theory Perspective. [REVIEW] Journal of Business Ethics 15 (11):1189 - 1198.score: 3.0
    Software piracy has become recognized as a major problem for the software industry and for business. One research approach that has provided a theoretical framework for studying software piracy has been to place the illegal copying of software within the domain of ethical decision making assumes that a person must be able to recognize software piracy as a moral issue. A person who fails to recognize a moral issue will fail to employ moral decision making schemata. There is substantial (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  47. Man Kit Chang (1998). Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior. [REVIEW] Journal of Business Ethics 17 (16):1825-1834.score: 3.0
    This study is a comparison of the validity of theory of reasoned action and theory of planned behavior as applied to the area of moral behavior (i.e., illegal copying of software) using structural equation modeling. Data were collected from 181 university students on the various components of the theories and used to asses the influence of attitude, subjective norm, and perceived behavioral control on the intention to make unauthorized software copies. Theory of planned behavior was found to be better (...)
    Direct download (7 more)  
     
    My bibliography  
     
    Export citation  
  48. Matt Gers (2008). The Case for Memes. Biological Theory 3 (4):305-315.score: 3.0
    The significant theoretical objections that have been raised against memetics have not received adequate defense, even though there is ongoing empirical research in this field. In this paper I identify the key objections to memetics as a viable explanatory tool in studies of cultural evolution. I attempt to defuse these objections by arguing that they fail to show the absence of replication, high-fidelity copying, or lineages in the cultural domain. I further respond to meme critics by arguing that, despite (...)
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  49. Stephen Pink & Stanley Martens, Schroedinger's Register: Foundational Issues and Physical Realization.score: 3.0
    This work-in-progress paper consists of four points which relate to the foundations and physical realization of quantum computing. The first point is that the qubit cannot be taken as the basic unit for quantum computing, because not every superposition of bit-strings of length n can be factored into a string of n-qubits. The second point is that the “No-cloning” theorem does not apply to the copying of one quantum register into another register, because the mathematical representation of this (...) is the identity operator, which is manifestly linear. The third point is that quantum parallelism is not destroyed only by environmental decoherence. There are two other forms of decoherence, which we call measurement decoherence and internal decoherence, that can also destroy quantum parallelism. The fourth point is that processing the contents of a quantum register “one qubit at a time” destroys entanglement. (shrink)
    Translate to English
    | Direct download  
     
    My bibliography  
     
    Export citation  
  50. Neera K. Badhwar, (Not for Citations. Published Copy Available on Request.).score: 3.0
    1.1 Are commercial societies unfriendly to friendship? Many critics of commercial societies, from both the left and the right, have thought so. They claim that the free-market system of property rights, freedom of contract, and other liberty rights – the “negative” right of individuals to peacefully pursue their own ends – is impersonal and dehumanizing, or even inherently divisive and adversarial. Yet (their complaint goes) the psychology and morality of markets and liberty rights pervade far too many relationships in a (...)
    Translate to English
    | Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
1 — 50 / 832