Search results for 'Gays Identity' (try it on Scholar)

1000+ found
Sort by:
  1. Jan Willem Duyvendak (1996). The Depoliticization of the Dutch Gay Identity, or Why Dutch Gays Aren't Queer. In Steven Seidman (ed.), Queer Theory/Sociology. Blackwell.score: 130.0
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  2. Annamarie Jagose (1996). Queer Theory: An Introduction. New York University Press.score: 72.0
    "Annamarie Jagose knows that queer theory did not spring full-blown from the head of any contemporary theorist. It is the outcome of many different influences and sources, including the homophile movement, gay liberation, and lesbian feminism. In pointing to the history of queer theory-a history that all too often is ignored or elided-Jagose performs a valuable service." -Henry Abelove, co-editor of The Lesbian and Gay Studies Reader The political and academic appropriation of the term queer over the last several years (...)
     
    My bibliography  
     
    Export citation  
  3. William B. Turner (2000). A Genealogy of Queer Theory. Temple University Press.score: 62.0
    As such, the book will interest readers of gay/lesbian/bisexual/transgender studies, intellectual history, political theory, and the history of gender/sexuality ...
    Direct download  
     
    My bibliography  
     
    Export citation  
  4. Steven Seidman (ed.) (1996). Queer Theory/Sociology. Blackwell.score: 60.0
    This book aims to productively engage the pioneering work of Queer theorists and point toe way towards a new sociological Queer studies.
    Direct download  
     
    My bibliography  
     
    Export citation  
  5. Donald E. Hall (2009). Reading Sexualities: Hermeneutic Theory and the Future of Queer Studies. Routledge.score: 60.0
    Sexual hermeneutics -- Desirably queer futures -- Transcending the self -- Global conversations -- Radical sexuality and ethical responsibility -- Conclusion. How sex changes.
    Direct download  
     
    My bibliography  
     
    Export citation  
  6. Lynne Alice & Lynne Star (eds.) (2004). Queer in Aotearoa New Zealand. Dunmore Press.score: 60.0
  7. Annamarie Jagose (1996). Queer Theory. Melbourne University Press.score: 60.0
  8. Stephen Maddison (2000). Fags, Hags, and Queer Sisters: Gender Dissent and Heterosocial Bonds in Gay Culture. St. Martin's Press.score: 60.0
    Fags, Hags and Queer Sisters is a provocative account of the importance of women and cross-gender identification in "gay" male culture. It offers a range of cultural readings from Tennessee William's classic A Streetcar Named Desire and Forster's 'gay' novel Maurice through Pulp Fiction , queer lifestyle magazines, Roseanne , slash fan fiction, and Jarman's Edward II to Almodovar's camp classic Women on the Verge of a Nervous Breakdown. Theoretically sophisticated, yet passionate, accessible and opinionated, Fags, Hags and Queer Sisters (...)
     
    My bibliography  
     
    Export citation  
  9. Elizabeth Weed & Naomi Schor (eds.) (1997). Feminism Meets Queer Theory. Indiana University Press.score: 60.0
  10. Michael Hames-Garcia (2006). What's at Stake in" Gay" Identities? In Linda Alcoff (ed.), Identity Politics Reconsidered. Palgrave Macmillan. 78--95.score: 52.0
  11. Cathy J. Cohen (1996). Contested Membership: Black Gay Identities and the Politics of AIDS. In Steven Seidman (ed.), Queer Theory/Sociology. Blackwell. 362--394.score: 50.0
    No categories
     
    My bibliography  
     
    Export citation  
  12. Raymond-Jean Frontain (2011). Introduction: The Politics of Gay Identity. Intertexts 15 (2):iii-viii.score: 50.0
    No categories
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  13. Angela M. Liszcz & Mark A. Yarhouse (2005). A Survey on Views of How to Assist with Coming Out as Gay, Changing Same-Sex Behavior or Orientation, and Navigating Sexual Identity Confusion. Ethics and Behavior 15 (2):159 – 179.score: 42.0
    This study is an analysis of 186 psychologists' attitudes on what constitutes ethical practice when counseling clients who present with a range of concerns related to their experience of same-sex attraction and behavior. Three different groups of psychologists were surveyed: generalists, specialists in gay and lesbian issues, and religiously affiliated psychologists. Participants also rated the effectiveness of several professional experiences in providing education, direction, sanctions, or support to regulate the practice of counseling nonheterosexual clients. Significant group differences were found regarding (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  14. Julie Byrne, J. Michael Clark & Michael L. Stemmeler (eds.) (1995). Embodying Diversity: Identity, (Bio)Diversity & Sexuality. Monument Press.score: 40.0
    No categories
     
    My bibliography  
     
    Export citation  
  15. Andrea Kleinhuber (2000). The Politics of Identity in Lesbian and Gay Anthropology. Nexus 14 (1):5.score: 40.0
  16. Anna Carastathis (2013). Identity Categories as Potential Coalitions. Signs 38 (4):941-965.score: 38.0
    Kimberlé Williams Crenshaw ends her landmark essay “Mapping the Margins: Intersectionality, Identity Politics, and Violence against Women of Color” with a normative claim about coalitions. She suggests that we should reconceptualize identity groups as “in fact coalitions,” or at least as “potential coalitions waiting to be formed.” In this essay, I explore this largely overlooked claim by combining philosophical analysis with archival research I conducted at the Gay, Lesbian, Bisexual and Transgender Historical Society Archive in San Francisco about (...)
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  17. Paul Van Den Berg (2004). Be Prestige-Resilient! A Contextual Ethics of Cultural Identity. Ethical Theory and Moral Practice 7 (2):197-214.score: 38.0
    This article proposes a new social- and moral-psychological understanding of cultural identity, tailored to the mixed multicultural contexts of every major city today. Seeking to protect vulnerable cultural groups, theories of multiculturalism have insufficiently assessed the psychological significance of intercultural social comparison, in identity-formation. While plays of prestige are a fact of life for immigrant and gay minorities, not everyone is equally able to cope with ascribed negative prestige. This is shown in an analysis of reactive attitudes towards (...)
    Direct download (8 more)  
     
    My bibliography  
     
    Export citation  
  18. Barry O'Leary (2008). “We Cannot Claim Any Particular Knowledge of the Ways of Homosexuals, Still Less of Iranian Homosexuals …”: The Particular Problems Facing Those Who Seek Asylum on the Basis of Their Sexual Identity. [REVIEW] Feminist Legal Studies 16 (1):87-95.score: 38.0
    Many lesbians and gay men apply for asylum in the U.K. each year on the basis that they fear persecution in their home country because of their sexual orientation. The legal basis for claiming asylum on the ground of sexual identity is now well established. Nevertheless, making these claims remains very difficult for applicants. Western cultural expectations around sexual identity often mix with homophobic assumptions about sexual behaviour to present applicants as “not sufficiently gay”. Furthermore, applicants may not (...)
    No categories
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  19. Linda Alcoff (ed.) (2006). Identity Politics Reconsidered. Palgrave Macmillan.score: 38.0
    Based on the ongoing work of the agenda-setting Future of Minority Studies national research project, Identity Politics Reconsidered reconceptualizes the scholarly and political significance of social identity. It focuses on the deployment of “identity” within ethnic-, women’s-, disability-, and gay and lesbian studies in order to stimulate discussion about issues that are simultaneously theoretical and practical, ranging from ethics and epistemology to political theory and pedagogical practice. This collection of powerful essays by both well-known and emerging scholars (...)
     
    My bibliography  
     
    Export citation  
  20. David Bell & Gill Valentine (eds.) (1994). Mapping Desire: Geographies of Sexualities. Routledge.score: 36.0
    Discover the truth about sex in the city (and the country). Mapping Desire explores the places and spaces of sexuality from body to community, from the "cottage" to the Barrio, from Boston to Jakarta, from home to cyberspace. Mapping Desire is the first book to explore sexualities from a geographical perspective. The nature of place and notions of space are of increasing centrality to cultural and social theory. Mapping Desires presents the rich and diverse world of contemporary sexuality, exploring how (...)
    Direct download  
     
    My bibliography  
     
    Export citation  
  21. Raja Halwani, Gary Jaeger, James S. Stramel, Richard Nunan, William S. Wilkerson & Timothy F. Murphy (2008). What is Gay and Lesbian Philosophy? Metaphilosophy 39 (4-5):433-471.score: 32.0
    Abstract: This essay explores recent trends and major issues related to gay and lesbian philosophy in ethics (including issues concerning the morality of homosexuality, the natural function of sex, and outing and coming out); religion (covering past and present debates about the status of homosexuality and how biblical and qur'anic passages have been interpreted by both sides of the debate); the law (especially a discussion of the debates surrounding sodomy laws, same-sex marriage and its impact on transsexuals, and whether the (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  22. Elizabeth Victor (2013). Agency, Identity, and Narrative: Making Sense of the Self in Same-Sex Divorce. APA Newsletter on Philosophy and Lesbian, Gay, Bisexual, and Transgender Issues 12 (2):16-19.score: 30.0
  23. Adam Henschke (2010). Did You Just Say What I Think You Said? Talking About Genes, Identity and Information. Identity in the Information Society 3 (3):435-456.score: 27.0
    Genetic information is becoming increasingly used in modern life, extending beyond medicine to familial history, forensics and more. Following this expansion of use, the effect of genetic information on people’s identity and ultimately people’s quality of life is being explored in a host of different disciplines. While a multidisciplinary approach is commendable and necessary, there is the potential for the multidisciplinarity to produce conceptual misconnection. That is, while experts in one field may understand their use of a term like (...)
    Direct download (11 more)  
     
    My bibliography  
     
    Export citation  
  24. Simone Gozzano (2012). Type-Identity Conditions for Phenomenal Properties. In Simone Gozzano & Christopher S. Hill (eds.), New Perspective on Type Identity. The Mental and the Physical. Cambridge University Press. 111.score: 27.0
    In this essay I shall argue that the crucial assumptions of Kripke's argument, i.e. the collapse of the appearance/reality distinction in the case of phenomenal states and the idea of a qualitatively identical epistemic situation, imply an objective principle of identity for mental-state types. This principle, I shall argue, rather than being at odds with physicalism, is actually compatible with both the type-identity theory of the mind and Kripke's semantics and metaphysics. Finally, I shall sketch a version of (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  25. Vanessa Paz Dennen (2009). Constructing Academic Alter-Egos: Identity Issues in a Blog-Based Community. [REVIEW] Identity in the Information Society 2 (1):23-38.score: 27.0
    Choosing to interact with others in an online forum provides an opportunity for exploring one’s own identity. With each new group joined, a person must make decisions about self-presentation and react to an audience. Such decisions continue as social interactions occur and relationships develop. This paper discusses how bloggers who have affiliated with each other to form a loosely knit community develop largely pseudonymous identities along with norms surrounding the development and performance of identity. The study is ethnographic (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  26. Adrian Rahaman & Martina Angela Sasse (2010). A Framework for the Lived Experience of Identity. Identity in the Information Society 3 (3):605-638.score: 27.0
    This paper presents a framework for the design of human-centric identity management systems. Whilst many identity systems over the past few years have been labelled as human-centred, we argue that the term has been appropriated by technologists to claim moral superiority of their products, and by system owners who confuse administrative convenience with benefits for users. The framework for human-centred identity presented here identifies a set of design properties that can impact the lived experience of the individuals (...)
    Direct download (10 more)  
     
    My bibliography  
     
    Export citation  
  27. Colin Gavaghan (2010). A Whole New... You? 'Personal Identity', Emerging Technologies and the Law. Identity in the Information Society 3 (3):423-434.score: 27.0
    In this article, I argue that lawmakers must abandon their previous reluctance to engage with questions of personal identity (PI). While frequently seen as an esoteric subject, of limited interest outside of academic philosophy departments, I attempt to show that, in fact, assumptions about PI—and its durability in the face of certain psychological or genetic changes—underpin many current legal rules. This is most perhaps obviously exemplified with regard to reproductive technologies. Yet the Parfitian challenge to identify a victim of (...)
    Direct download (10 more)  
     
    My bibliography  
     
    Export citation  
  28. Hanna Krasnova, Oliver Günther, Sarah Spiekermann & Ksenia Koroleva (2009). Privacy Concerns and Identity in Online Social Networks. Identity in the Information Society 2 (1):39-63.score: 27.0
    Driven by privacy-related fears, users of Online Social Networks may start to reduce their network activities. This trend can have a negative impact on network sustainability and its business value. Nevertheless, very little is understood about the privacy-related concerns of users and the impact of those concerns on identity performance. To close this gap, we take a systematic view of user privacy concerns on such platforms. Based on insights from focus groups and an empirical study with 210 subjects, we (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  29. Thierry Nabeth (2009). Social Web and Identity: A Likely Encounter. [REVIEW] Identity in the Information Society 2 (1):1-5.score: 27.0
    The Web 2.0, with online social technologies such as social networking services, blogs, wikis, or microbloging, has brought the vision of the Internet as a social landscape in which people are engaged in a multitude of social activities. This editorial of the special issue ‘Social Web and Identity’ discusses the importance of identity in the context of the Social Web, introducing the different papers of this special issue and the different aspects associated to these online identities. The topics (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  30. Ernesto Schwartz-Marín & Irma Silva-Zolezzi (2010). “The Map of the Mexican's Genome”: Overlapping National Identity, and Population Genomics. [REVIEW] Identity in the Information Society 3 (3):489-514.score: 27.0
    This paper explores the intersections between national identity and the production of medical/population genomics in Mexico. The ongoing efforts to construct a Haplotype Map of Mexican genetic diversity offers a unique opportunity to illustrate and analyze the exchange between the historic-political narratives of nationalism, and the material culture of genomic science. Haplotypes are central actants in the search for medically significant SNP’s (single nucleotide polymorphisms), as well as powerful entities involved in the delimitation of ancestry, temporality and variability (www.hapmap.org). (...)
    Direct download (11 more)  
     
    My bibliography  
     
    Export citation  
  31. Giulio Galiero & Gabriele Giammatteo (2009). Trusting Third-Party Storage Providers for Holding Personal Information. A Context-Based Approach to Protect Identity-Related Data in Untrusted Domains. Identity in the Information Society 2 (2):99-114.score: 27.0
    The never ending growth of digital information and the availability of low-cost storage facilities and networks capacity is leading users towards moving their data to remote storage resources. Since users’ data often holds identity-related information, several privacy issues arise when data can be stored in untrusted domains. In addition digital identity management is becoming extremely complicated due to the identity replicas proliferation necessary to get authentication in different domains. GMail and Amazon Web Services, for instance, are two (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  32. Tarvi Martens (2010). Electronic Identity Management in Estonia Between Market and State Governance. Identity in the Information Society 3 (1):213-233.score: 27.0
    The present paper summarizes the development of the national electronic Identity Management System (eIDMS) in Estonia according to a conceptual framework developed in an European comparative research project outlined in the first chapter of this special issue. Its main function is to amend the picture of the European eIDMS landscape by presenting a case with high involvement of the private sector and thereby checking the generalizations from the comparisons of Austria, Belgium, Germany and Spain, presented by Kubicek and Noack (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  33. D. Barnard-Wills & D. Ashenden (2010). Public Sector Engagement with Online Identity Management. Identity in the Information Society 3 (3):657-674.score: 27.0
    The individual management of online identity, as part of a wider politics of personal information, privacy, and dataveillance, is an area where public policy is developing and where the public sector attempts to intervene. This paper attempts to understand the strategies and methods through which the UK government and public sector is engaging in online identity management. The analysis is framed by the analytics of government (Dean 2010) and governmentality (Miller and Rose 2008). This approach draws attention to (...)
    Direct download (10 more)  
     
    My bibliography  
     
    Export citation  
  34. Teemu Rissanen (2010). Electronic Identity in Finland: ID Cards Vs. Bank IDs. [REVIEW] Identity in the Information Society 3 (1):175-194.score: 27.0
    This chapter describes the introduction and diffusion of the Finnish Electronic Identity Card (FINEID card). FINEID establishes an electronic identity (eID), based on the civil registry and placed on an identity chip card issued by Finnish government to Finnish citizens and permanent residents from age 18 and older. It is a non-mandatory electronic identity card introduced in 1999 in order to replace the older citizen ID card. It serves as a travel document and is intended to (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  35. Ruth Halperin & James Backhouse (2008). A Roadmap for Research on Identity in the Information Society. Identity in the Information Society 1 (1):71-87.score: 27.0
    As research into identity in the information society gets into its stride, with contributions from many scholarly disciplines such as technology, social sciences, the humanities and the law, a moment of intellectual stocktaking seems appropriate. This article seeks to provide a roadmap of research currently undertaken in the field of identity and identity management showing how the area is developing and how disparate contributions relate to each other. Five different perspectives are proposed through which work in the (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  36. Hidehito Gomi (2010). A Persistent Data Tracking Mechanism for User-Centric Identity Governance. Identity in the Information Society 3 (3):639-656.score: 27.0
    Identity governance is an emerging concept for fine-grained conditional disclosure of identity information and enforcement of corresponding data handling policies. Although numerous technologies underlying identity management have been developed, people still have difficulty obtaining a clear picture of how their identity information is maintained, used, and propagated. An identity management framework is described for tracking the history of how a person’s identity information is handled after it is transferred across domains of control and for (...)
    Direct download (9 more)  
     
    My bibliography  
     
    Export citation  
  37. Theodora Varvarigou & Vassiliki Andronikou (2009). Identity Management in GRID Computing and Service Oriented Architectures: Research and Practice. [REVIEW] Identity in the Information Society 2 (2):95-98.score: 27.0
    Today, Service-Oriented Architecture (SOA) and Grid and Cloud computing comprise the key technologies in distributed systems. In systems following the SOA approach, functionalities are delivered and consumed as services. Given the variety of resources (i.e. data, computing capabilities, applications, etc) as well as the variation of user-requested Quality of Service (e.g., high performance, fast access, low cost, high media resolution, etc), there is a need for advanced user management, trust establishment and service management mechanisms which adjust, monitor and evaluate service (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  38. Matteo Gaeta, Juergen Jaehnert, Kleopatra Konstanteli, Sergio Miranda, Pierluigi Ritrovato & Theodora Varvarigou (2009). Federated Identity Management in Mobile Dynamic Virtual Organizations. Identity in the Information Society 2 (2):115-136.score: 27.0
    Over the past few years, the Virtual Organization (VO) paradigm has been emerging as an ideal solution to support collaboration among globally distributed entities (individuals and/or organizations). However, due to rapid technological and societal changes, there has also been an astonishing growth in technologies and services for mobile users. This has opened up new collaborative scenarios where the same participant can access the VO from different locations and mobility becomes a key issue for users and services. The nomadicity and mobility (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  39. Ian Angell (2008). As I See It: Enclosing Identity. [REVIEW] Identity in the Information Society 1 (1):23-37.score: 27.0
    This article claims that an ‘enclosure of the commons’ is underway, which reaches far beyond intellectual property, to a point where, through profiling, ‘identity’ has itself become enclosed property that can be owned by another. With a detour through the natures of both money and innovation, this paper looks at the imperative driving ‘intellectual property rights.’ By introducing the notion of biopiracy, it shows how ‘invasion of privacy’ is justified, and ends with “a world of rapacious, state-aided ‘privatization’” of (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  40. Lothar Fritsch, Kristin Skeide Fuglerud & Ivar Solheim (2010). Towards Inclusive Identity Management. Identity in the Information Society 3 (3):515-538.score: 27.0
    The article argues for a shift of perspective in identity management (IDM) research and development. Accessibility and usability issues affect identity management to such an extent that they demand a reframing and reformulation of basic designs and requirements of modern identity management systems. The rationale for the traditional design of identity management systems and mechanisms has been security concerns as defined in the field of security engineering. By default the highest security level has been recommended and (...)
    Direct download (8 more)  
     
    My bibliography  
     
    Export citation  
  41. David Murakami Wood & Rodrigo Firmino (2009). Empowerment or Repression? Opening Up Questions of Identification and Surveillance in Brazil Through a Case of 'Identity Fraud'. Identity in the Information Society 2 (3):297-317.score: 27.0
    A real but typical case of identity fraud is used to open up the complex web of identification systems in Brazil. It is argued that identification has two poles related to the nature of citizenship—repression and inclusion—and that reactions from citizens to new identification schemes can be attributed to how they view the purpose of the cards in these terms. In Brazil, a sense of inclusion and citizenship based on a fear of anonymity and exclusion predominates leading to widespread (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  42. Andrea J. Baker (2009). Mick or Keith: Blended Identity of Online Rock Fans. [REVIEW] Identity in the Information Society 2 (1):7-21.score: 27.0
    This paper discusses the “blended identity” of online rock fans to show that the standard dichotomy between anonymous and real life personas is an inadequate description of self-presentation in online communities. Using data from an ethnographic, exploratory study of an online community and comparison groups including interviews, an online questionnaire, fan discussion boards, and participant/observation, the research analyzes fan identity online and then offline. Rolling Stones fans often adopt names that illustrate their allegiance to the band, along with (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  43. David G. W. Birch (2008). Psychic ID: A Blueprint for a Modern National Identity Scheme. [REVIEW] Identity in the Information Society 1 (1):189-201.score: 27.0
    The issue of identity cards is hotly debated in many countries, but it often seems to be an oddly backward-looking debate that presumes outdated “Orwellian” architectures. In the modern world, surely we should be debating the requirements for national identity management schemes, in which identity cards may or may not be a useful implementation, before we move on to architecture. If so, then, what should a U.K. national identity management scheme for the 21st century look like? (...)
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  44. Sébastien Canard, Eric Malville & Jacques Traoré (2009). A Client-Side Approach for Privacy-Preserving Identity Federation. Identity in the Information Society 2 (3):269-295.score: 27.0
    Providing Single Sign-On (SSO) between service providers and enabling service providers to share user personal attributes are critical for both users to benefit from a seamless access to their services, and service providers to realize new business opportunities. Today, however, the users have several independent, partial identities spread over different service providers. Providing SSO and attribute sharing requires that links (federations) are established between (partial) identities. In SAML 2.0 (Maler et al. 2003), the links between identities are stored and managed (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  45. Åke Grönlund (2010). Electronic Identity Management in Sweden: Governance of a Market Approach. [REVIEW] Identity in the Information Society 3 (1):195-211.score: 25.0
    This paper reviews the history and current status of electronic identities (eID) and eID management in Sweden, including an outlook for the future. The paper is based on official policy documents, technical documentation, presentations by key experts, and comments from government agencies and independent experts. The future perspective is based on the October 2009 public investigation (SOU 2009:86) by the E-delegation. It is concluded that the E-delegation proposal, while still pending political decision, is a major step forward in terms of (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  46. Shelley Weinberg (2011). Locke on Personal Identity. Philosophy Compass 6 (6):398-407.score: 24.0
    Locke’s account of personal identity has been highly influential because of its emphasis on a psychological criterion. The same consciousness is required for being the same person. It is not so clear, however, exactly what Locke meant by ‘consciousness’ or by ‘having the same consciousness’. Interpretations vary: consciousness is seen as identical to memory, as identical to a first personal appropriation of mental states, and as identical to a first personal distinctive experience of the qualitative features of one’s own (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  47. James Giles (1993). The No-Self Theory: Hume, Buddhism, and Personal Identity. Philosophy East and West 43 (2):175-200.score: 24.0
    The problem of personal identity is often said to be one of accounting for what it is that gives persons their identity over time. However, once the problem has been construed in these terms, it is plain that too much has already been assumed. For what has been assumed is just that persons do have an identity. A new interpretation of Hume's no-self theory is put forward by arguing for an eliminative rather than a reductive view of (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  48. John Perry (ed.) (1975). Personal Identity. University of California Press.score: 24.0
    Contents PART I: INTRODUCTION 1 John Perry: The Problem of Personal Identity, 3 PART II: VERSIONS OF THE MEMORY THEORY 2 John Locke: Of Identity and ...
    Direct download  
     
    My bibliography  
     
    Export citation  
  49. Mauro Dorato & Matteo Morganti (2013). Grades of Individuality. A Pluralistic View of Identity in Quantum Mechanics and in the Sciences. Philosophical Studies 163 (3):591-610.score: 24.0
    This paper offers a critical assessment of the current state of the debate about the identity and individuality of material objects. Its main aim, in particular, is to show that, in a sense to be carefully specified, the opposition between the Leibnizian ‘reductionist’ tradition, based on discernibility, and the sort of ‘primitivism’ that denies that facts of identity and individuality must be analysable has become outdated. In particular, it is argued that—contrary to a widespread consensus—‘naturalised’ metaphysics supports both (...)
    Direct download (8 more)  
     
    My bibliography  
     
    Export citation  
  50. Derek A. Parfit (1995). The Unimportance of Identity. In H. Harris (ed.), Identity. Oxford University Press. 13-45.score: 24.0
    We can start with some science fiction. Here on Earth, I enter the Teletransporter. When I press some button, a machine destroys my body, while recording the exact states of all my cells. The information is sent by radio to Mars, where another machine makes, out of organic materials, a perfect copy of my body. The person who wakes up on Mars seems to remember living my life up to the moment when I pressed the button, and he is in (...)
    Direct download  
     
    My bibliography  
     
    Export citation  
1 — 50 / 1000