Results for 'Source Control'

993 found
Order:
  1.  13
    Royal Institute of Philosophy.Joanna North Source - 2003 - Philosophy 78 (3):1-19.
    OBJECTIVE: Following two randomized controlled trials that demonstrated reduced mortality and better neurological outcome in cardiac arrest patients, mild therapeutic hypothermia was implemented in many intensive care units. Up to now, no large observational studies have confirmed the beneficial effects of mild therapeutic hypothermia. DESIGN: Internet-based survey combined with a retrospective, observational study. PATIENTS: All patients admitted to an intensive care unit in The Netherlands after cardiac arrest from January 1, 1999 until January 1, 2009. DATA SOURCE: Dutch National (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  2.  7
    Christopher S. Eklwid.Best Source Of Profits - 1996 - In W. Michael Hoffman (ed.), The Ethics of Accounting and Finance: Trust, Responsibility, and Control. Quorum Books.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  22
    The Sources of Behavior: Toward a Naturalistic, Control Account of Agency.Mariam Thalos - 2007 - In Don Ross, David Spurrett, Harold Kincaid & G. Lynn Stephens (eds.), Distributed Cognition and the Will: Individual Volition and Social Context. MIT Press. pp. 123--67.
  4. Top-Down Control of Visual Alpha Oscillations: Sources of Control Signals and Their Mechanisms of Action.Chao Wang, Rajasimhan Rajagovindan, Sahng-Min Han & Mingzhou Ding - 2016 - Frontiers in Human Neuroscience 10.
  5.  13
    The Problem of Correct Source Apportionment in the Decisional Processes of Pollution Control.V. G. Dovì - 1994 - Global Bioethics 7 (1):35-38.
  6.  23
    Performance Analysis of Switched Control Systems Under Common-source Digital Upsets Modeled by MDHMM.Rui Wang, Yanxiao Li, Hui Sun, Youmin Zhang & Yigang Sun - 2018 - Complexity 2018:1-12.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  7.  13
    Using EEG source analysis to understand changes to neural processing of inhibitory control in healthy ageing.Spokes Tara, Cutmore Tim & Shum David - 2014 - Frontiers in Human Neuroscience 8.
  8. 8 The Sources of Behavior: Toward a Naturalistic, Control Account of Agency.Bernhard Schlink - 2007 - In Don Ross, David Spurrett, Harold Kincaid & G. Lynn Stephens (eds.), Distributed Cognition and the Will: Individual Volition and Social Context. MIT Press. pp. 123.
  9. The or‌s and sources of action. Acquisition, representation, and control of action.Bernhard Hommel & Birgit Elsner - 2008 - In Ezequiel Morsella, John A. Bargh & Peter M. Gollwitzer (eds.), Oxford handbook of human action. New York: Oxford University Press.
     
    Export citation  
     
    Bookmark  
  10. An Agent of Attention: An Inquiry into the Source of Our Control.Aaron Henry - 2019 - Dissertation, University of Toronto
    When performing a skilled action—whether something impressive like a double somersault or something mundane like reaching for a glass of water—you exercise control over your bodily movements. Specifically, you guide their course. In what does that control consist? In this dissertation, I argue that it consists in attending to what you are doing. More specifically, in attending, agents harness their perceptual and perceptuomotor states directly and practically in service of their goals and, in doing so, settle the fine-grained (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  11. Three Control Views on Privacy.Leonhard Menges - 2022 - Social Theory and Practice 48 (4):691-711.
    This paper discusses the idea that the concept of privacy should be understood in terms of control. Three different attempts to spell out this idea will be critically discussed. The conclusion will be that the Source Control View on privacy is the most promising version of the idea that privacy is to be understood in terms of control.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  1
    Omegasomes control formation, expansion, and closure of autophagosomes.Viola Nähse, Harald Stenmark & Kay O. Schink - 2024 - Bioessays 46 (6):2400038.
    Autophagy, an essential cellular process for maintaining cellular homeostasis and eliminating harmful cytoplasmic objects, involves the de novo formation of double‐membraned autophagosomes that engulf and degrade cellular debris, protein aggregates, damaged organelles, and pathogens. Central to this process is the phagophore, which forms from donor membranes rich in lipids synthesized at various cellular sites, including the endoplasmic reticulum (ER), which has emerged as a primary source. The ER‐associated omegasomes, characterized by their distinctive omega‐shaped structure and accumulation of phosphatidylinositol 3‐phosphate (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  16
    Target Uncertainty During Motor Decision-Making: The Time Course of Movement Variability Reveals the Effect of Different Sources of Uncertainty on the Control of Reaching Movements.Melanie Krüger & Joachim Hermsdörfer - 2019 - Frontiers in Psychology 10:434701.
    The processes underlying motor decision-making have recently caught considerable amount of scientific attention, focusing on the integration of empirical evidence from sensorimotor control research with psychological theories and computational models on decision-making. Empirical studies on motor decision-making suggest that the kinematics of goal-directed reaching movements are sensitive to the level of target uncertainty during movement planning. However, the source of uncertainty as a relevant factor influencing the process of motor decision-making has not been sufficiently considered, yet. In this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14. A Defense of Privacy as Control.Leonhard Menges - 2021 - The Journal of Ethics 25 (3):385-402.
    Even though the idea that privacy is some kind of control is often presented as the standard view on privacy, there are powerful objections against it. The aim of this paper is to defend the control account of privacy against some particularly pressing challenges by proposing a new way to understand the relevant kind of control. The main thesis is that privacy should be analyzed in terms of source control, a notion that is adopted from (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  15.  14
    Steady-State Analysis and Output Voltage Minimization Based Control Strategy for Electric Springs in the Smart Grid with Multiple Renewable Energy Sources.Yun Zou, Michael Z. Q. Chen & Yinlong Hu - 2019 - Complexity 2019:1-12.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Tradable Permit Markets for the Control of Point and Nonpoint Sources of Water Pollution: Technology-Based V. Collective Performance-Based Approaches.Michael A. Taylor - 2003 - Dissertation, The Ohio State University
    The United States Environmental Protection Agency has begun to encourage innovative market-based approaches to address nonpoint source water pollution. These water quality trading programs have the potential to achieve environmental standards at a lower overall cost. Two fundamental questions must be answered before these benefits can be realized: How will trades between point and nonpoint sources be monitored and enforced? and, How will nonpoint sources be included within a trading market? ;Point-nonpoint source trading can be accommodated through either (...)
     
    Export citation  
     
    Bookmark  
  17.  9
    Mind wandering probes as a source of mind wandering depends on attention control demands.Maren Greve & Christopher A. Was - 2022 - Consciousness and Cognition 103 (C):103355.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  10
    Combined influence of valence and statistical learning on the control of attention: Evidence for independent sources of bias.Haena Kim & Brian A. Anderson - 2021 - Cognition 208 (C):104554.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  11
    Control of phosphatidylinositol‐3‐kinase signaling by nanoscale membrane compartmentalization.Rebecca Cabral-Dias & Costin N. Antonescu - 2023 - Bioessays 45 (3):2200196.
    Phosphatidylinositol‐3‐kinases (PI3Ks) are lipid kinases that produce 3‐phosphorylated derivatives of phosphatidylinositol upon activation by various cues. These 3‐phosphorylated lipids bind to various protein effectors to control many cellular functions. Lipid phosphatases such as phosphatase and tensin homolog (PTEN) terminate PI3K‐derived signals and are critical to ensure appropriate signaling outcomes. Many lines of evidence indicate that PI3Ks and PTEN, as well as some specific lipid effectors are highly compartmentalized, either in plasma membrane nanodomains or in endosomal compartments. We examine the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  6
    Controllability and Optimization of Complex Networks Based on Bridges.Lifu Wang, Guotao Zhao, Zhi Kong & Yunkang Zhao - 2020 - Complexity 2020:1-10.
    In a complex network, each edge has different functions on controllability of the whole network. A network may be out of control due to failure or attack of some specific edges. Bridges are a kind of key edges whose removal will disconnect a network and increase connected components. Here, we investigate the effects of removing bridges on controllability of network. Various strategies, including random deletion of edges, deletion based on betweenness centrality, and deletion based on degree of source (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  9
    Corrigendum: Target Uncertainty During Motor Decision-Making: The Time Course of Movement Variability Reveals the Effect of Different Sources of Uncertainty on the Control of Reaching Movements.Melanie Krüger & Joachim Hermsdörfer - 2019 - Frontiers in Psychology 10.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  1
    The metamemory expectancy illusion in source monitoring affects metamemory control and memory.Marie Luisa Schaper & Ute J. Bayen - 2021 - Cognition 206 (C):104468.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  74
    Controlling inadvertent ambiguity in the logical structure of legal drafting by means of the prescribed definitions of the a-hohfeld structurallanguage.Layman E. Allen & Charles S. Saxon - 1994 - Theoria: Revista de Teoría, Historia y Fundamentos de la Ciencia 9 (2):135-172.
    Two principal sources of imprecision in legal drafting (vagueness and ambiguity) are identified and illustrated. Virtually all of the ambiguity imprecision encountered in legal discourse is ambiguity in the language used to express logical structure, and virtually all of the imprecision resulting is inadvertent. On the other hand, the imprecision encountered in legal writing that results from vagueness is frequently, if not most often, included there deliberately; the drafter has considered it and decided that the vague language best accomplishes the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  7
    Le contrôle des communs numériques à des fins commerciales : le cas des logiciels libres.Stéphane Couture - 2015 - Éthique Publique 17 (2).
    Cet article aborde les formes de contrôle des biens communs par des entreprises commerciales en étudiant le cas des logiciels libres. Les logiciels libres sont des logiciels dont le code source est librement accessible, et peut être modifié et partagé. Cette éthique de partage a permis l’émergence d’un modèle collaboratif souvent présenté comme l’exemple type des « communs numériques ». Cependant, de plus en plus d’entreprises participent aujourd’hui au développement des logiciels libres. Si plusieurs analystes voient d’un bon œil (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  25. Controlled vocabularies in bioinformatics: A case study in the Gene Ontology.Barry Smith & Anand Kumar - 2004 - Drug Discovery Today: Biosilico 2 (6):246-252.
    The automatic integration of information resources in the life sciences is one of the most challenging goals facing biomedical informatics today. Controlled vocabularies have played an important role in realizing this goal, by making it possible to draw together information from heterogeneous sources secure in the knowledge that the same terms will also represent the same entities on all occasions of use. One of the most impressive achievements in this regard is the Gene Ontology (GO), which is rapidly acquiring the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  26. The Sense of Control and the Sense of Agency.Elisabeth Pacherie - 2007 - PSYCHE: An Interdisciplinary Journal of Research On Consciousness 13:1 - 30.
    The now growing literature on the content and sources of the phenomenology of first-person agency highlights the multi-faceted character of the phenomenology of agency and makes it clear that the experience of agency includes many other experiences as components. This paper examines the possible relations between these components of our experience of acting and the processes involved in action specification and action control. After a brief discussion of our awareness of our goals and means of action, it will focus (...)
     
    Export citation  
     
    Bookmark   41 citations  
  27. Who is the controller of controlled processes?Daniel M. Wegner - 2005 - In Ran R. Hassin, James S. Uleman & John A. Bargh (eds.), The New Unconscious. Oxford Series in Social Cognition and Social Neuroscience. Oxford University Press. pp. 19-36.
    Are we the robots? This question surfaces often in current psychological re- search, as various kinds of robot parts-automatic actions, mental mechanisms, even neural circuits-keep appearing in our explanations of human behavior. Automatic processes seem responsible for a wide range of the things we do, a fact that may leave us feeling, if not fully robotic, at least a bit nonhuman. The complement of the automatic process in contemporary psychology, of course, is the controlled process (Atkinson & Shiffrin, 1968; Bargh, (...)
     
    Export citation  
     
    Bookmark   18 citations  
  28.  16
    Border Control and Using Analysis Tools due to the Humanitarian Aspect of the Immigrant Crisis.Timurlenk Chekovik & Jugoslav Achkoski - 2019 - International Letters of Social and Humanistic Sciences 85:1-13.
    Publication date: 24 January 2019 Source: Author: Timurlenk Chekovik, Jugoslav Achkoski The control of migrants in Europe has become increasingly challenging, marked by a number of illegal border-crossing. It revealed a crisis without equivalent since World War II. The European borders are now one of the most affected by migrants from Asia and Africa. Border police is the most responsible for the first interview with the asylum seeker. In terms of basic contribution to the asylum procedure, good cooperation (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29. Control & intervention in complex adaptive systems: From biology to biogen.Andy Clark - unknown
    Markets, companies and various forms of business organizations may all (we have argued) be usefully viewed through the lens of CAS -- the theory of complex adaptive systems. In this chapter, I address one fundamental issue that confronts both the theoretician and the business manager: the nature and opportunities for control and intervention in complex adaptive regimes. The problem is obvious enough. A complex adaptive system, as we have defined it, is soft assembled and largely self-organizing. This means that (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  18
    Controlling growth of the wing: Vestigial integrates signals from the compartment boundaries.Stephen M. Cohen - 1996 - Bioessays 18 (11):855-858.
    In the past few years it has become apparent that the anterior/posterior (A/P) and dorsal/ventral (D/V) compartmant boundaries serve as the source of longrange signals that organize the A/P and D/V axes of the Drosophila wing. Recent work suggests that the vestigial gene may function as a nodal point through which the growth‐controlling activity of these two patterning systems is integrated(1).
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  64
    Open Sourcing Normative Assumptions on Privacy and Other Moral Values in Blockchain Applications.Georgy Ishmaev - 2019 - Dissertation, Delft University of Technology
    The moral significance of blockchain technologies is a highly debated and polarised topic, ranging from accusations that cryptocurrencies are tools serving only nefarious purposes such as cybercrime and money laundering, to the assessment of blockchain technology as an enabler for revolutionary positive social transformations of all kinds. Such technological determinism, however, hardly provides insights of sufficient depth on the moral significance of blockchain technology. This thesis argues rather, that very much like the cryptographic tools before them, blockchains develop in a (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  32. What is self-control?Edmund Henden - 2008 - Philosophical Psychology 21 (1):69 – 90.
    What is self-control and how does the concept of self-control relate to the notion of will-power? A widespread philosophical opinion has been that the notion of will-power does not add anything beyond what can be said using other motivational notions, such as strength of desire and intention. One exception is Richard Holton who, inspired by recent research in social psychology, has argued that will-power is a separate faculty needed for persisting in one's resolutions, what he calls 'strength of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  33.  68
    Self-control and belief.Alfred R. Mele - 1994 - Philosophical Psychology 7 (4):419 – 435.
    Although the extent to which motivational factors are involved in the production and sustaining of biased or 'irrational' beliefs continues to be a controversial issue in social psychology, even those who urge that such beliefs are often explained by non-motivational tendencies admit that biased beliefs sometimes have motivational sources. Sometimes toe are influenced by motivational pressures in ways proscribed by principles that we accept for belief-acquisition or belief-revision ('doxastic' principles). Many garden-variety instances of self-deception are cases in point. We are (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  34. Comment: Affective Control of Action.Gregor Hochstetter & Hong Yu Wong - 2017 - Emotion Review 9 (4):345-348.
    This commentary challenges Railton’s claim that the affective system is the key source of control of action. Whilst the affective system is important for understanding how acting for a reason is possible, we argue that there are many levels of control of action and adaptive behaviour and that the affective system is only one source of control. Such a model seems to be more in line with the emerging picture from affective and movement neuroscience.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  35. Remarks on the logic of imagination. A step towards understanding doxastic control through imagination.Heinrich Wansing - 2017 - Synthese 194 (8):2843-2861.
    Imagination has recently attracted considerable attention from epistemologists and is recognized as a source of belief and even knowledge. One remarkable feature of imagination is that it is often and typically agentive: agents decide to imagine. In cases in which imagination results in a belief, the agentiveness of imagination may be taken to give rise to indirect doxastic control and epistemic responsibility. This observation calls for a proper understanding of agentive imagination. In particular, it calls for the development (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   30 citations  
  36.  13
    Does controlling movement require intelligence?Mark L. Latash & J. Greg Anson - 1997 - Behavioral and Brain Sciences 20 (3):533-536.
    Motor control schemes should have an element of control and an element of coordination. The former is a source of initiative and a zroduct of the brain's work (mind, intelligence, or ) while the latter can be viewed as a process with constraints emerging at a hierarchically lower, autonomous level. Limiting scientific analysis to an object smaller than the universe necessarily leads to a hierarchical (cybernetic) approach.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  37.  4
    Open source standardization: The rise of linux in the network era.Joel West & Jason Dedrick - 2001 - Knowledge, Technology & Policy 14 (2):88-112.
    To attract complementary assets, firms that sponsor proprietary de facto compatibility standards must trade off control of the standard against the imperative for adoption. For example, Microsoft and Intel in turn gained pervasive adoption of their technologies by appropriating only a single layer of the standards architecture and encouraging competition in other layers. In reaction to such proprietary strategies, the open source movement relinquished control to maximize adoption. To illustrate this, we examine the rise of the Linux (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  71
    The Source of Actual Terror: The Philippine Macho-Fascist Duterte.Anna Romina Guevarra & Maya Arcilla - 2020 - Feminist Studies 46 (2):489-494.
    In lieu of an abstract, here is a brief excerpt of the content:Feminist Studies 46, no. 2. © 2020 by Feminist Studies, Inc. 489 Anna Romina Guevarra and Maya Arcilla The Source of Actual Terror: The Philippine Macho-Fascist Duterte  What is JUSTICE with the violence you’ve waged  What is FREEDOM? Our people are encaged  What is JUSTICE with the violence you’ve waged?  What is FREEDOM? Our people are encaged  We have nothing to lose—nothing but (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39. Agency and control.Jesus H. Aguilar - unknown
    The main objective of this thesis is to defend an account of the control that agents possess over their actions from the perspective of the causal theory of action, that is, a theory that sees actions as events caused by internal states of their agents. The explanatory strategy that is employed for this purpose consists in addressing three interdependent and fundamental problems concerning the possibility of this type of control. The first problem arises from the possibility of controlling (...)
     
    Export citation  
     
    Bookmark   1 citation  
  40. Did the NSA and GCHQ Diminish Our Privacy? What the Control Account Should Say.Leonhard Menges - 2020 - Moral Philosophy and Politics 7 (1):29-48.
    A standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent is easily available to another person, but not accessed. Critics contend that control accounts have the implausible implication that the privacy of the relevant agent is diminished in threatened loss cases. Recently, threatened loss cases have become important because (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  41. Crowd-sourced science: societal engagement, scientific authority and ethical practice.Sean F. Johnston, Benjamin Franks & Sandy Whitelaw - 2017 - Journal of Information Ethics 26 (1):49-65.
    This paper discusses the implications for public participation in science opened by the sharing of information via electronic media. The ethical dimensions of information flow and control are linked to questions of autonomy, authority and appropriate exploitation of knowledge. It argues that, by lowering the boundaries that limit access and participation by wider active audiences, both scientific identity and practice are challenged in favor of extra-disciplinary and avocational communities such as scientific enthusiasts and lay experts. Reconfigurations of hierarchy, mediated (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  42.  67
    The rise of randomized controlled trials (RCTs) in international development in historical perspective.Gil Eyal & Luciana Souza Leão - 2019 - Theory and Society 48 (3):383-418.
    This article brings a historical perspective to explain the recent dissemination of randomized controlled trials (RCTs) as the new “gold standard” method to assess international development projects. Although the buzz around RCT evaluations dates from the 2000s, we show that what we are witnessing now is a second wave of RCTs, while a first wave began in the 1960s and ended by the early 1980s. Drawing on content analysis of 123 RCTs, participant observation, and secondary sources, we compare the two (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  43.  20
    Open source intelligence and AI: a systematic review of the GELSI literature.Riccardo Ghioni, Mariarosaria Taddeo & Luciano Floridi - forthcoming - AI and Society:1-16.
    Today, open source intelligence (OSINT), i.e., information derived from publicly available sources, makes up between 80 and 90 percent of all intelligence activities carried out by Law Enforcement Agencies (LEAs) and intelligence services in the West. Developments in data mining, machine learning, visual forensics and, most importantly, the growing computing power available for commercial use, have enabled OSINT practitioners to speed up, and sometimes even automate, intelligence collection and analysis, obtaining more accurate results more quickly. As the infosphere expands (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  44.  10
    Source localization and functional network analysis in emotion cognitive reappraisal with EEG-fMRI integration.Wenjie Li, Wei Zhang, Zhongyi Jiang, Tiantong Zhou, Shoukun Xu & Ling Zou - 2022 - Frontiers in Human Neuroscience 16.
    BackgroundThe neural activity and functional networks of emotion-based cognitive reappraisal have been widely investigated using electroencephalography and functional magnetic resonance imaging. However, single-mode neuroimaging techniques are limited in exploring the regulation process with high temporal and spatial resolution.ObjectivesWe proposed a source localization method with multimodal integration of EEG and fMRI and tested it in the source-level functional network analysis of emotion cognitive reappraisal.MethodsEEG and fMRI data were simultaneously recorded when 15 subjects were performing the emotional cognitive reappraisal task. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  44
    Damage Control: Unintended Pregnancy in the United States Military.Kathryn L. Ponder & Melissa Nothnagle - 2010 - Journal of Law, Medicine and Ethics 38 (2):386-395.
    Women's access to reproductive health care is an ongoing source of conflict in U.S. politics; however, women in the military are often overlooked in these debates. Reproductive health care, including family planning, is a fundamental component of health care for women. Unintended pregnancy carries substantial health risks and financial costs, particularly for servicewomen. Compared with their civilian counterparts, women in the military experience greater challenges in preventing unwanted pregnancy and have less access to contraceptive services and abortion. Current military (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  46.  7
    Cognitive Control Processes and Defense Mechanisms That Influence Aggressive Reactions: Toward an Integration of Socio-Cognitive and Psychodynamic Models of Aggression.Jean Gagnon, Joyce Emma Quansah & Paul McNicoll - 2022 - Frontiers in Human Neuroscience 15.
    Research on cognitive processes has primarily focused on cognitive control and inhibitory processes to the detriment of other psychological processes, such as defense mechanisms, which can be used to modify aggressive impulses as well as self/other images during interpersonal conflicts. First, we conducted an in-depth theoretical analysis of three socio-cognitive models and three psychodynamic models and compared main propositions regarding the source of aggression and processes that influence its enactment. Second, 32 participants completed the Hostile Expectancy Violation Paradigm (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  41
    Controlling Perimeters, Controlling Lives:Israel and Gaza.Sari Bashi - 2013 - Law and Ethics of Human Rights 7 (2):243-282.
    This article analyzes the way in which the Israeli military exercises control over life in Gaza by regulating who and what may enter or leave. Using primary source documents obtained via the Freedom of Information Act proceedings, the article details a military bureaucracy that micro-manages requests to move people and goods through Gaza’s crossings. For example, the transfer of chickpea paste requires approval from a senior military official holding the rank of major general, and soldiers evaluate the quality (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  48. Aux sources du catholicisme social, l’Ecole de la Tour du Pin. [REVIEW]Ofm Edmund Dougan - 1964 - Philosophical Studies (Dublin) 13:207-210.
    René de la Tour du Pin once noted, about his own Aphorismes de politique sociale that it was not written to attract readers so much as to provoke thought. The same kind of remark might be made about this study. Though in some chapters the argument moves very smoothly and effortlessly, it is in others complicated, over-charged and somewhat repetitive. But it is a study that deals with a complicated and difficult subject, in a highly original fashion, and is well (...)
    No categories
     
    Export citation  
     
    Bookmark  
  49.  27
    Quality Control in Health Care: Developments in the Law of Medical Malpractice.Barry R. Furrow - 1993 - Journal of Law, Medicine and Ethics 21 (2):173-192.
    Physicians and institutional providers face expanding liability exposure today, in spite of state tort reform legislation and public awareness of the costs of malpractice for providers. Standards of practice are evolving rapidly; new medical technologies are being introduced at a rapid rate; information is proliferating as to treatment efficacy, patient risk, and diseases generally. Tort standards mirror this change. As medical standards of care evolve, they provide a benchmark against which to measure provider failure. The liability exposure of physicians is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  50. What Reaching Teaches: Consciousness, Control, and the Inner Zombie.Andy Clark - 2007 - British Journal for the Philosophy of Science 58 (3):563-594.
    What is the role of conscious visual experience in the control and guidance of human behaviour? According to some recent treatments, the role is surprisingly indirect. Conscious visual experience, on these accounts, serves the formation of plans and the selection of action types and targets, while the control of 'online' visually guided action proceeds via a quasi-independent non-conscious route. In response to such claims, critics such as (Wallhagen [2007], pp. 539-61) have suggested that the notions of control (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   36 citations  
1 — 50 / 993