Results for 'identification projective intrusive adhésive'

983 found
Order:
  1.  15
    Le doute en thérapie de couple.Bernadette Legrand - 2008 - Dialogue: Families & Couples 178 (4):41-53.
    Croire ne peut s’appréhender sans son corollaire, douter. Le doute revêt des formes diverses que l’on retrouve en particulier chez les couples en thérapie. Dans ce cadre, pour tenter d’en approcher l’origine et la nature, l’auteur s’appuie sur les concepts d’identification projective, intrusive, adhésive, et de contenance développés par Meltzer. Dans cette perspective, un lien peut être fait entre la relation de couple et celle du bébé à son premier objet. La thérapie de couple est envisagée (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  2.  30
    Beta Hebbian Learning for intrusion detection in networks with MQTT Protocols for IoT devices.Álvaro Michelena, María Teresa García Ordás, José Aveleira-Mata, David Yeregui Marcos del Blanco, Míriam Timiraos Díaz, Francisco Zayas-Gato, Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, Héctor Alaiz-Moretón & José Luis Calvo-Rolle - 2024 - Logic Journal of the IGPL 32 (2):352-365.
    This paper aims to enhance security in IoT device networks through a visual tool that utilizes three projection techniques, including Beta Hebbian Learning (BHL), t-distributed Stochastic Neighbor Embedding (t-SNE) and ISOMAP, in order to facilitate the identification of network attacks by human experts. This work research begins with the creation of a testing environment with IoT devices and web clients, simulating attacks over Message Queuing Telemetry Transport (MQTT) for recording all relevant traffic information. The unsupervised algorithms chosen provide a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  3. Projective identification and consciousness alteration: A bridge between psychoanalysis and neuroscience?Cristiana Cimino & Antonello Correale - 2005 - International Journal of Psychoanalysis 86 (1):51-60.
  4.  31
    Understanding Projective Identification.Louise Braddock - 2018 - Philosophy, Psychiatry, and Psychology 25 (2):65-79.
    How exactly does a patient succeed in imposing a phantasy and its corresponding affect upon his analyst in order to deny it in himself is a most interesting problem… In the analytic situation, a peculiarity of communication[s] of this kind is that, at first sight, they do not seem as if they had been made by the patient at all. The analyst experiences the affect as being his own response to something. The effort involved is in differentiating the patient's contribution (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  40
    Projective Identification, Clinical Context, and Philosophical Elucidation.Adam Leite - 2018 - Philosophy, Psychiatry, and Psychology 25 (2):81-87.
    The clinical concept of projective identification encompasses both unconscious fantasies of putting aspects of oneself into another person, as well as interpersonal processes aimed at evoking a corresponding response in another person, all for purposes of defensive evacuation, control and/or communication.1 In thinking about this complex situation, we need to consider its interpersonal dimensions as well as the intrapsychic processes that take place in each party. Louise Braddock's paper is thought provoking, far-reaching, and important in its use of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  6.  48
    Identification of shareholder ethics and responsibilities in online reverse auctions for construction projects.Yilmaz Hatipkarasulu & James H. Gill - 2004 - Science and Engineering Ethics 10 (2):283-288.
    The increasing number of companies providing internet services and auction tools helped popularize the online reverse auction trend for purchasing commodities and services in the last decade. As a result, a number of owners, both public and private, accepted the online reverse auctions as the bidding technique for their construction projects. Owners, while trying to minimize their costs for construction projects, are also required to address their ethical responsibilities to the shareholders. In the case of online reverse auctions for construction (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  7.  7
    Projective Identification: The Fate of a Concept.Elizabeth Bott Spillius & Edna O'Shaughnessy (eds.) - 2011 - Routledge.
    In this book Elizabeth Spillius and Edna O'Shaughnessy explore the development of the concept of projective identification, which had important antecedents in the work of Freud and others, but was given a specific name and definition by Melanie Klein. They describe Klein's published and unpublished views on the topic, and then consider the way the concept has been variously described, evolved, accepted, rejected and modified by analysts of different schools of thought and in various locations – Britain, Western (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  8
    Identification of investment directions in the regions of the North-West based on the data of the digital platform "Investment Projects".Andrey Alekseevich Pesotskiy - 2022 - Kant 42 (2):48-53.
    The purpose of the research is to identify the structure of investment projects in the regions included in the Northwestern Federal District on the basis of the data of the digital platform "Investment Projects". The scientific novelty consists in determining the sectoral structure of investments in the Northwestern Federal District, based on the forms of systematization of information used on this portal. The result of the study is the identification of industry specifics of each region and the selection of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9. Validation in psychoanalysis, and projective identification.Neal Bruss - 1986 - Semiotica 60 (1-2):129-192.
     
    Export citation  
     
    Bookmark  
  10.  6
    Towards the logic of projective identification.Andriy Vasylchenko - 2015 - Journal of Applied Logic 13 (3):197-214.
  11.  20
    Intrusion Detection Systems in Cloud Computing Paradigm: Analysis and Overview.Pooja Rana, Isha Batra, Arun Malik, Agbotiname Lucky Imoize, Yongsung Kim, Subhendu Kumar Pani, Nitin Goyal, Arun Kumar & Seungmin Rho - 2022 - Complexity 2022:1-14.
    Cloud computing paradigm is growing rapidly, and it allows users to get services via the Internet as pay-per-use and it is convenient for developing, deploying, and accessing mobile applications. Currently, security is a requisite concern owning to the open and distributed nature of the cloud. Copious amounts of data are responsible for alluring hackers. Thus, developing efficacious IDS is an imperative task. This article analyzed four intrusion detection systems for the detection of attacks. Two standard benchmark datasets, namely, NSL-KDD and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  10
    Advanced Visualization of Intrusions in Flows by Means of Beta-Hebbian Learning.Héctor Quintián, Esteban Jove, José-Luis Casteleiro-Roca, Daniel Urda, Ángel Arroyo, José Luis Calvo-Rolle, Álvaro Herrero & Emilio Corchado - 2022 - Logic Journal of the IGPL 30 (6):1056-1073.
    Detecting intrusions in large networks is a highly demanding task. In order to reduce the computation demand of analysing every single packet travelling along one of such networks, some years ago flows were proposed as a way of summarizing traffic information. Very few research works have addressed intrusion detection in flows from a visualizations perspective. In order to bridge this gap, the present paper proposes the application of a novel projection method (Beta Hebbian Learning) under this framework. With the aim (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  11
    Signaling through focal adhesion kinase.Steven K. Hanks & Thomas R. Polte - 1997 - Bioessays 19 (2):137-145.
    Focal adhesion kinase (FAK) is a nonreceptor protein‐tyrosine kinase implicated in controlling cellular responses to the engagement of cell‐surface integrins, including cell spreading and migration, survival and proliferation. Aberrant FAK signaling may contribute to the process of cell transformation by certain oncoproteins, including v‐Src. Progress toward elucidating the events leading to FAK activation following integrin‐mediated cell adhesion, as well as events downstream of FAK, has come through the identification of FAK phosphorylation sites and interacting proteins. A signaling partnership is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  14.  13
    La intrusión del estar. Análisis hermenéutico de la significación del espacio para la noción levinasiana de instante.Ángel E. Garrido-Maturano - 2017 - Eidos: Revista de Filosofía de la Universidad Del Norte 27:224-250.
    RESUMEN Este artículo realiza un análisis hermenéutico-critico de la noción de instante como autoafirmación del yo en el joven Lévinas y como relación diacrónica con el otro en sus obras de madurez. Primero elucida la significación esencial del espacio en la constitución del instante. Luego explicita por qué la espacialidad del fenómeno implica la relación con la alteridad como condición de toda forma del instante, incluso del instante de autoafirmación del yo. Finalmente describe el paso del instante de identificación del (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  15.  14
    Feeling Identified vs. Behaving as Such: A Multi-Study Project on Chinese Organizational Identification and Chinese Employees’ Identification Profiles.Jie Yang, Hannah-Hanh D. Nguyen, Xiaobin Xiong & Xinyan Wang - 2019 - Frontiers in Psychology 10.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  23
    Some problems relevant for understanding relation between mentalization, early splitting and projective identification.Petar Jevremović - 2007 - Theoria 50 (1):95-109.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  2
    Objects and Bodies: Objectification and Over-Identification in Tanja Ostojić's Art Projects.Suzana Milevska - 2005 - Feminist Review 81 (1):112-118.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  18. Spacious intimacy: Reflections on essential relationship, empathic resonance, projective identification, and witnessing.Jj Prendergast - 2007 - In John J. Prendergast & G. Kenneth Bradford (eds.), Listening From the Heart of Silence. Paragon House. pp. 2--35.
    No categories
     
    Export citation  
     
    Bookmark   1 citation  
  19.  5
    Doubling, distance and identification in the cinema.Paul Coates - 2015 - New York, NY: Palgrave-Macmillan.
    The intention of this project is to argue theoretically for, and exemplify through critical and historical analysis, the interrelatedness of discourses on scale, distance, identification and doubling in the cinema. The link between the first two terms (scale and distance) and the latter two (identification and doubling) is implicit in the title, and its unfolding constitutes the project: for instance, the closer one comes, the deeper identification is likely to be, and the greater the likelihood that what (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  25
    Inclusiveness, Effectiveness and Intrusiveness: Issues in the Developing Uses of DNA Profiling in Support of Criminal Investigations.Robin Williams & Paul Johnson - 2006 - Journal of Law, Medicine and Ethics 34 (2):234-247.
    Current methods of forensic DNA profiling, based on Polymerase Chain Reaction amplifications of a varying number of Short Tandem Repeat loci found at different locations on the human genome, are regularly described as constituting the “gold standard for identification” in contemporary society. At a time when criminal justice systems in Europe and North America increasingly seek to utilize the epistemic authority of a variety of sciences in support of the apprehension and prosecution of suspects and offenders, genetic science and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  21.  8
    Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication.Banghua Wu, Shah Nazir & Neelam Mukhtar - 2020 - Complexity 2020:1-12.
    Security has become one of the important factors for any network communication and transmission of data packets. An organization with an optimal security system can lead to a successful business and can earn huge profit on the business they are doing. Different network devices are linked to route, compute, monitor, and communicate various real-time developments. The hackers are trying to attack the network and want to draw the organization’s significant information for its own profits. During the communication, if an intrusion (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  49
    The projective theory of consciousness: from neuroscience to philosophical psychology.Alfredo Pereira Jr - 2018 - Trans/Form/Ação 41 (s1):199-232.
    : The development of the interdisciplinary areas of cognitive, affective and action neurosciences contributes to the identification of neurobiological bases of conscious experience. The structure of consciousness was philosophically conceived a century ago as consisting of a subjective pole, the bearer of experiences, and an objective pole composed of experienced contents. In more recent formulations, Nagel refers to a “point of view”, in which qualitative experiences are anchored, while Velmans understands that phenomenal content is composed of mental representations “projected” (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  23.  42
    Patriotism and pluralism: identification and compliance in the post-national polity.Antonino Palumbo - 2009 - Ethics and Global Politics 2 (4):321-348.
    The paper discusses the identity-building power and motivational force of patriotism. The basic idea underlying the discussion is that far from being a mere irrational and destructive force, patriotism is an expression of ‘existing human social identity.’ Thus, it argues that rather than dismissing patriotism altogether as an undesirable and/or irrational phenomenon, we need to understand how to discriminate between alternative forms of patriotism while investigating what constitutional reforms might be required to support those forms of patriotic identification that (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  24.  38
    Introduction: Beyond nature/culture dualism: Let's try co-evolution instead of "control".Ronnie Zoe Hawkins - 2006 - Ethics and the Environment 11 (2):1-11.
    In lieu of an abstract, here is a brief excerpt of the content:Introduction:Beyond Nature/Culture Dualism: Let's Try Co-Evolution Instead of "Control"Ronnie Hawkins (bio)In the original call for papers for this special issue, nature/culture dualism was characterized as a way of thinking that holds human culture and nonhuman nature to be radically different ontological spheres, hyperseparated and oppositional, or, as Val Plumwood maintains in her essay, an orientation that assumes "separate casts of characters in separate dramas." In the human sphere, individuals (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  25. From First Efficient Cause to God: Scotus on the Identification Stage of the Cosmological Argument.Timothy O'Connor - 1996 - In Ludger Honnefelder, Rega Wood & Mechthild Dreyer (eds.), John Duns Scotus: metaphysics and ethics. New York: E.J. Brill.
    In this paper, I examine some main threads of the identification stage of Scotus's project in the fourth chapter of De Primo, where he tries to show that a first efficient cause must have the attributes of simplicity, intellect, will, and infinity. Many philosophers are favorably disposed towards one or another argument such as Scotus's (e.g., the cosmological argument from contingency) purporting to show that there is an absolutely first efficient cause. How far can Scotus take us from this (...)
     
    Export citation  
     
    Bookmark   6 citations  
  26.  18
    Post-Modernism and the Social Sciences: Insights, Inroads, and Intrusions.Pauline Marie Rosenau & Pauline Vaillancourt Rosenau - 1991 - Princeton University Press.
    Post-modernism offers a revolutionary approach to the study of society: in questioning the validity of modern science and the notion of objective knowledge, this movement discards history, rejects humanism, and resists any truth claims. In this comprehensive assessment of post-modernism, Pauline Rosenau traces its origins in the humanities and describes how its key concepts are today being applied to, and are restructuring, the social sciences. Serving as neither an opponent nor an apologist for the movement, she cuts through post-modernism's often (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   47 citations  
  27.  10
    Civilizational Self-Identification as a Response to the Neoliberal Crisis.Валерия Игоревна Спиридонова - 2023 - Russian Journal of Philosophical Sciences 66 (1):77-97.
    The article discusses issues related to overcoming the crisis situation of non-Western countries, including Russia, caused by the uncritical acceptance of the neoliberal universalistic paradigm of development at the turn of the century. The intellectual response to the crisis led the initiative of civilizational self-identification of these countries based on the formation of a new principle of supranational organization in the form of a “civilizationstate,” which is perceived by Western analysts as a fundamental global challenge of modernity requiring a (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  30
    Analysing Social Values in Identification; A Framework for Research on the Representation and Implementation of Values.Rusten Menard - 2016 - Journal for the Theory of Social Behaviour 46 (2):122-142.
    This article contributes to the concept of social values by presenting analytical tools that explore how social values are classified, re-presented and interpersonally performed in the construction of identities. I approach social values as classificatory systems of acceptability and desirability that are collectively generated. The meanings of social values are embedded in culture and in power imbalanced social relations; they constantly undergo reformulation in identification processes and are also used to define the social order. I suggest that social values (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  22
    Analysing Social Values in Identification; A Framework for Research on the Representation and Implementation of Values.Rusten Menard - 2016 - Journal for the Theory of Social Behaviour 46 (2):122-142.
    This article contributes to the concept of social values by presenting analytical tools that explore how social values are classified, re-presented and interpersonally performed in the construction of identities. I approach social values as classificatory systems of acceptability and desirability that are collectively generated. The meanings of social values are embedded in culture and in power imbalanced social relations; they constantly undergo reformulation in identification processes and are also used to define the social order. I suggest that social values (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  18
    Civilizational and institutional aspects of national self-identification in ukraine: Philosophical-anthropological approach.M. I. Boichenko, O. V. Yakovleva & V. V. Liakh - 2018 - Anthropological Measurements of Philosophical Research 14:50-61.
    Purpose. This article clarifies the significance of the person’s social self-identification as a basis for civilization and institutional explanation of national self-identification in Ukraine. Theoretical basis. The authors found that the analysis of the cultural and anthropological principles of national self-identity reveals two main opposed concepts: the concept of "eastern" cultural and social self-identity of Ukraine, which correlates with the metaphor of the split between "East" and "West", and the concept of "western" projection of the European future of (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  31.  18
    Civil Status and Identification in Nineteenth-Century France: A Matter of State Control?Paul-André Rosental - 2012 - In Registration and Recognition: Documenting the Person in World History. pp. 137.
    Civil status, and particularly birth certificates, rather than identity papers, are the legal basis of identification in France. Its nineteenth-century history presents a complex picture, which cannot be reduced to a process of increasing state control. Far from implementing ambitious registration projects, French liberal administration left information scattered and scarce as compared to European standards. It had to find a balance between the need to provide open information in order to minimize uncertainty in social and economic relationships, and the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  36
    Expert identification and selection: Legal liability concerns and directions. [REVIEW]Kathleen Mykytyn, Peter P. Mykytyn & Stephen Lunce - 1993 - AI and Society 7 (3):225-237.
    Legal liabilities pertaining to the identification and selection of domain experts is an issue that could adversely impact expert systems developers. Problems pertaining to flawed knowledge, improperly defined expertise, and behavioural and psychological impediments are just some of the issues. This paper examines the torts of strict products liability and negligence that system developers could incur as a result of expert-related difficulties. Parallels from legal scholars and federal and state court decisions are discussed relevant to expert system projects and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33.  34
    The Application of the Acoustic Complexity Indices (ACI) to Ecoacoustic Event Detection and Identification (EEDI) Modeling.A. Farina, N. Pieretti, P. Salutari, E. Tognari & A. Lombardi - 2016 - Biosemiotics 9 (2):227-246.
    In programs of acoustic survey, the amount of data collected and the lack of automatic routines for their classification and interpretation can represent a serious obstacle to achieving quick results. To overcome these obstacles, we are proposing an ecosemiotic model of data mining, ecoacoustic event detection and identification, that uses a combination of the acoustic complexity indices and automatically extracts the ecoacoustic events of interest from the sound files. These events may be indicators of environmental functioning at the scale (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  34.  61
    Exploring the Myth of the Bobby and the Intrusion of the State into Social Space.Mark Brunger - 2014 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 27 (1):121-134.
    This paper aims to increase the reader’s understanding of how the notion of the ‘bobby on the beat’ has been elevated to iconic, if not mythical, status within British policing. In doing so, the article utilises the semiotic idea of myth, as conceptualized by Roland Barthes, to explore how through representations of the ‘bobby on the beat’ police officers have been projected in a more avuncular re-assuring role to a public fearful of crime, which fails to do service to the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  35.  33
    Creating mutual identification and solidarity in highly diversified societies. The importance of identification by shared participation.Patrick Loobuyck - 2012 - South African Journal of Philosophy 31 (3):560-575.
    Like the liberal nationalists, we insist that a sense of belonging together is necessary for the practice of an egalitarian democracy. Therefore, we can take a shared national identity as one of the building blocks of the welfare state. However, we argue that a shared cultural or civic national identity can not be a necessary condition for this sense of belonging together. The mere fact of co-operation and common participation in shared activities and projects can create a sense of belonging (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  36.  33
    Animals Who Think and Love: Law, Identification and the Moral Psychology of Guilt.Alan Norrie - 2019 - Criminal Law and Philosophy 13 (3):515-544.
    How does the human animal who thinks and loves relate to criminal justice? This essay takes up the idea of a moral psychology of guilt promoted by Bernard Williams and Herbert Morris. Against modern liberal society’s ‘peculiar’ legal morality of voluntary responsibility, it pursues Morris’s ethical account of guilt as involving atonement and identification with others. Thinking of guilt in line with Morris, and linking it with the idea of moral psychology, takes the essay to Freud’s metapsychology in Civilization (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  37.  44
    Proportional ethical review and the identification of ethical issues.D. Hunter - 2007 - Journal of Medical Ethics 33 (4):241-245.
    Presently, there is a movement in the UK research governance framework towards what is referred to as proportional ethical review. Proportional ethical review is the notion that the level of ethical review and scrutiny given to a research project ought to reflect the level of ethical risk represented by that project. Relatively innocuous research should receive relatively minimal review and relatively risky research should receive intense scrutiny. Although conceptually attractive, the notion of proportional review depends on the possibility of effectively (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   22 citations  
  38.  49
    Coaching for a Sustainability Transition: Empowering Student-Led Sustainability Initiatives by Developing Skills, Group Identification, and Efficacy Beliefs.Karen R. S. Hamann, Jana R. Holz & Gerhard Reese - 2021 - Frontiers in Psychology 12.
    Self-, collective, and participative efficacy are strong predictors of sustainability action. Yet, few studies have investigated the dynamics and variability of efficacy beliefs. In this transdisciplinary study, we tested such factors in the context of a peer-to-peer coaching program for sustainability volunteers, embedded in a structured-educational context. Over weekends, 2 qualified coaches trained 36 German bottom-up, student-led sustainability initiatives. These coaches instructed students in team building, envisioning, project planning, and on-campus sustainability practice. While 317 participants completed our pre-questionnaire, N = (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  21
    Identity and the Cognitive Value of Logical Equations in Frege’s Foundational Project.Matthias Schirn - 2023 - Notre Dame Journal of Formal Logic 64 (4):495-544.
    In this article, I first analyze and assess the epistemological and semantic status of canonical value-range equations in the formal language of Frege’s Grundgesetze der Arithmetik. I subsequently scrutinize the relation between (a) his informal, metalinguistic stipulation in Grundgesetze I, Section 3, and (b) its formal counterpart, which is Basic Law V. One point I argue for is that the stipulation in Section 3 was designed not only to fix the references of value-range names, but that it was probably also (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  11
    Implementing a process for integration research: Ecosystem Services Project, Australia.Steven J. Cork & Wendy Proctor - 2005 - Journal of Research Practice 1 (2):Article M6.
    This paper reports on the design and implementation of a multi-phase interactive process among a set of scientists, policy makers, land managers, and community representatives, so as to facilitate communication, mutual understanding, and participative decision making. This was part of the Ecosystem Services Project in Australia. The project sought to broaden public understanding about the natural ecosystems in Australia. The study reported here pertains to one of the project sites--the Goulburn Broken catchment, a highly productive agricultural watershed in the south-east (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  41.  4
    The Politics of Representation as a Projection of Identity: The Female Body in its Oriental Construction in Serbian Art.Simona Cupic - 2003 - European Journal of Women's Studies 10 (3):321-334.
    This article deals with questions concerning the nature of representation of the female body within the so-called `oriental' discourse in Serbian art: Who is the painter? For whom is the work painted? With whom is the work identified? With what other possibilities of identification does the work leave us? In the context of the historical codes, a stance towards a body is seen as a projection of the social, cultural and power impulses. In the first case studied, the artist (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  42.  39
    ‘You Can't Stop Undergraduates Asking Silly Questions’: Academics' Views on Submission of Undergraduate Student Projects for Ethical Review.Jenny Scott, Karen Rodham, Gordon Taylor & Julie Turner-Cobb - 2008 - Research Ethics 4 (4):147-151.
    Undergraduate projects may contribute new knowledge, but commonly their main purpose is an exercise in learning and applying simple research methods. They are usually short term and a first step into the research field. Support for undergraduate research experience is simple enough. However, integral to the research process is ethical scrutiny. A high standard of conduct of research is essential. The question of whether undergraduate student projects should be subject to full ethical review, to the same extent as that undertaken (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  43.  7
    Orientation in Immigrant Narratives: The Role of Ethnicity in the Identification of Characters. [REVIEW]Anna de Fina - 2000 - Discourse Studies 2 (2):131-157.
    Every year, thousands of undocumented Mexican workers enter the United States. Their presence, together with the settlement of undocumented and legal immigrants from many other countries, constitutes the source of one of the most persistent ideological conflicts in American history: the conflict over immigrants' rights. Official discourses in many cases identify being Hispanic with poor performance at school, drug abuse, poverty and violence. However, aside from mainstream images of who immigrants are, little research has been done on the identity that (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  44. Issues, concepts and methods relating to the identification of the ethics of emerging ICTs.Bernd Stahl, Richard Heersmink, Philippe Goujon, Catherine Flick, Jeroen van den Hoven, Kutoma Wakunuma, Veikko Ikonen & Michael Rader - 2010 - Communications of the IIMA 10 (1):33-43.
    Ethical issues of information and communication technologies (ICTs) are important because they can have significant effects on human liberty, happiness, their ability to lead a good life. They are also of functional interest because they can determine whether technologies are used and whether their positive potential can unfold. For these reasons policy makers are interested in finding out what these issues are and how they can be addressed. The best way of creating ICT policy that is sensitive to ethical issues (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  45. Troubles with truth-making: Necessitation and projection.Benjamin Schnieder - 2006 - Erkenntnis 64 (1):61-74.
    The main question of this paper is how to understand the notion of a truth-maker. In section 1, I show that the identification of truth-making with necessitation cannot capture the pretheoretic understanding of notions such as ‘x makes something true’. In section 2, I examine Barry Smith’s reaction to this problem: he defines truth-making as the combination of necessitation and projection. I focus on the formal part of Smith’s account, which is shown to yield undesired results. However, in section (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  46.  31
    Causal Factors of Corruption in Construction Project Management: An Overview.Emmanuel Kingsford Owusu, Albert P. C. Chan & Ming Shan - 2019 - Science and Engineering Ethics 25 (1):1-31.
    The development of efficient and strategic anti-corruption measures can be better achieved if a deeper understanding and identification of the causes of corruption are established. Over the past years, many studies have been devoted to the research of corruption in construction management. This has resulted in a significant increase in the body of knowledge on the subject matter, including the causative factors triggering these corrupt practices. However, an apropos systematic assessment of both past and current studies on the subject (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  47.  30
    Trans Men & Trans Women: The Role of Personal History in Self-Identification.Julian Rome - 2018 - Stance 11:11-21.
    This paper addresses one of the ways in which transgender individuals identify with respect to personal history, living “stealth,” whereby transgender individuals do not disclose their transgender status (that is, they present themselves as cisgender), oftentimes no longer considering themselves transgender. Individuals who live stealth are often criticized for inauthenticity; thus, this paper analyses Sartrean notions of authenticity and personal history, thereby arguing that the person who lives stealth is not living inauthentically but rather is constituting their conception of self (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48. Comment on Crooks's intertheoretic identification and mind-brain reductionism.J. R. Smythies - 2002 - Journal of Mind and Behavior 23 (3):245-248.
    This paper focuses on perception and surveys the scientific evidence that the theory of direct realism adopted by most contemporary philosophers is incorrect. This evidence is provided by experiments on the spatial and temporal "filling-in" of percepts. It also examines the myth of the projection of sensations. The conclusion is that we do not perceive the world as it actually is, but as the brain computes it most probably to be.
     
    Export citation  
     
    Bookmark   2 citations  
  49.  4
    An attempt to bring out a “new breed” of people in 18th-century Russia and Russian self-identification.Ihor Nemchynov - 2005 - Sententiae 12 (1):142-151.
    The paradigm of the interaction of "own" and "foreign", Russia and Europe defined Russian culture during the 18th-20th centuries. The utopian idea of creating a "new kind" of people, which appeared in the circle of Catherine II under the influence of European Enlightenment ideas, accurately characterizes this paradigm. The Enlightenment was a radical rejection of the traditional feudal worldview, a rejection of the old foundations of life. The author emphasizes that Catherine II and her entourage were not determined to radically (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  19
    The State of Ohio’s Auditors, the Enumeration of Population, and the Project of Eugenics.Cameron Graham, Martin E. Persson, Vaughan S. Radcliffe & Mitchell J. Stein - 2022 - Journal of Business Ethics 187 (3):565-587.
    In 1856, the State of Ohio began an enumeration of its population to count and identify people with disabilities. This paper examines the ethical role of the accounting profession in this project, which supported the transatlantic eugenics movement and its genocidal attempts to eliminate disabled persons from the population. We use a theoretical approach based on Levinas who argued that the self is generated through engagement with the Other, and that this engagement presupposes a responsibility to and for the Other. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 983