Results for 'Jon Nissenbaum'

1000+ found
Order:
  1.  61
    Parasitic degree phrases.Jon Nissenbaum & Bernhard Schwarz - 2011 - Natural Language Semantics 19 (1):1-38.
    This paper investigates gaps in degree phrases with too, as in John is too rich [for the monastery to hire ___ ]. We present two curious restrictions on such gapped degree phrases. First, the gaps must ordinarily be anteceded by the subject of the associated gradable adjective. Second, when embedded under intensional verbs, gapped degree phrases are ordinarily restricted to surface scope, unlike their counterparts without gaps. Just as puzzlingly, we show that these restrictions are lifted when there is overt (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  2.  96
    A modal ambiguity in for-infinitival relative clauses.Martin Hackl & Jon Nissenbaum - 2012 - Natural Language Semantics 20 (1):59-81.
    This squib presents two puzzles related to an ambiguity found in for-infinitival relative clauses (FIRs). FIRs invariably receive a modal interpretation even in the absence of any overt modal verb. The modal interpretation seems to come in two distinct types, which can be paraphrased by finite relative clauses employing the modal auxiliaries should and could. The two puzzles presented here arise because the availability of the two readings is constrained by factors that are not otherwise known to affect the interpretation (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  3.  38
    A modal ambiguity in for-infinitival relative clauses.Martin Hackl & Jon Nissenbaum - 2012 - Natural Language Semantics 20 (1):59-81.
    This squib presents two puzzles related to an ambiguity found in for-infinitival relative clauses (FIRs). FIRs invariably receive a modal interpretation even in the absence of any overt modal verb. The modal interpretation seems to come in two distinct types, which can be paraphrased by finite relative clauses employing the modal auxiliaries should and could. The two puzzles presented here arise because the availability of the two readings is constrained by factors that are not otherwise known to affect the interpretation (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  4.  43
    Protecting Privacy in an Information Age: The Problem of Privacy in Public.Helen Nissenbaum - 1998 - Law and Philosophy 17 (5-6):559-596.
    Direct download  
     
    Export citation  
     
    Bookmark   40 citations  
  5.  45
    Philosophies of Probability: Objective Bayesianism and its Challenges.Jon Williamson - 2009 - In A. Irvine (ed.), Handbook of the Philosophy of Mathematics. Elsevier.
    This chapter presents an overview of the major interpretations of probability followed by an outline of the objective Bayesian interpretation and a discussion of the key challenges it faces. I discuss the ramifications of interpretations of probability and objective Bayesianism for the philosophy of mathematics in general.
    Direct download  
     
    Export citation  
     
    Bookmark   13 citations  
  6. Genetic enhancement, human extinction, and the best interests of posthumanity.Jon Rueda - 2022 - Bioethics (6):529-538.
    The cumulative impact of enhancement technologies may alter the human species in the very long-term future. In this article, I will start showing how radical genetic enhancements may accelerate the conversion into a novel species. I will also clarify the concepts of ‘biological species’, ‘transhuman’ and ‘posthuman’. Then, I will summarize some ethical arguments for creating a transhuman or posthuman species with a substantially higher level of well-being than the human one. In particular, I will present what I shall call (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  7.  15
    It's good to talk? Examining attitudes towards corporate social responsibility dialogue and engagement processes.Jon Burchell & Joanne Cook - 2006 - Business Ethics 15 (2):154-170.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   26 citations  
  8.  18
    Stakeholder dialogue and organisational learning: changing relationships between companies and NGOs.Jon Burchell & Joanne Cook - 2007 - Business Ethics 17 (1):35-46.
    This article presents a critical examination of the process of stakeholder dialogue in the Corporate Social Responsibility (CSR) field. It utilises data from a three-year research project into stakeholder dialogue processes to discuss three central themes: first, what is meant by the term ‘dialogue’, both from a theoretical perspective and from its practical application within CSR; second, the challenges of creating effective dialogue; and third, measuring and assessing the potential outcomes of dialogue. In providing a critical overview of these themes, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  9.  12
    Editorial.Helen Nissenbaum - 1999 - Ethics and Information Technology 1 (3):171-172.
    Direct download  
     
    Export citation  
     
    Bookmark  
  10. Situations and attitudes.Jon Barwise & John Perry - 1981 - Journal of Philosophy 78 (11):668-691.
  11. Accountability in a computerized society.Helen Nissenbaum - 1996 - Science and Engineering Ethics 2 (1):25-42.
    This essay warns of eroding accountability in computerized societies. It argues that assumptions about computing and features of situations in which computers are produced create barriers to accountability. Drawing on philosophical analyses of moral blame and responsibility, four barriers are identified: 1) the problem of many hands, 2) the problem of bugs, 3) blaming the computer, and 4) software ownership without liability. The paper concludes with ideas on how to reverse this trend.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   49 citations  
  12. Online Manipulation: Hidden Influences in a Digital World.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Georgetown Law Technology Review 4:1-45.
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of manipulation that (...)
    Direct download  
     
    Export citation  
     
    Bookmark   33 citations  
  13.  88
    Respecting Context to Protect Privacy: Why Meaning Matters.Helen Nissenbaum - 2018 - Science and Engineering Ethics 24 (3):831-852.
    In February 2012, the Obama White House endorsed a Privacy Bill of Rights, comprising seven principles. The third, “Respect for Context,” is explained as the expectation that “companies will collect, use, and disclose personal data in ways that are consistent with the context in which consumers provide the data.” One can anticipate the contested interpretations of this principle as parties representing diverse interests vie to make theirs the authoritative one. In the paper I will discuss three possibilities and explain why (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  14. Toward an approach to privacy in public: Challenges of information technology.Helen Nissenbaum - 1997 - Ethics and Behavior 7 (3):207 – 219.
    This article highlights a contemporary privacy problem that falls outside the scope of dominant theoretical approaches. Although these approaches emphasize the connection between privacy and a protected personal (or intimate) sphere, many individuals perceive a threat to privacy in the widespread collection of information even in realms normally considered "public". In identifying and describing the problem of privacy in public, this article is preliminary work in a larger effort to map out future theoretical directions.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   28 citations  
  15. Technology, autonomy, and manipulation.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Internet Policy Review 8 (2).
    Since 2016, when the Facebook/Cambridge Analytica scandal began to emerge, public concern has grown around the threat of “online manipulation”. While these worries are familiar to privacy researchers, this paper aims to make them more salient to policymakers — first, by defining “online manipulation”, thus enabling identification of manipulative practices; and second, by drawing attention to the specific harms online manipulation threatens. We argue that online manipulation is the use of information technology to covertly influence another person’s decision-making, by targeting (...)
    Direct download  
     
    Export citation  
     
    Bookmark   32 citations  
  16.  81
    Contextual Integrity Up and Down the Data Food Chain.Helen Nissenbaum - 2019 - Theoretical Inquiries in Law 20 (1):221-256.
    According to the theory of contextual integrity (CI), privacy norms prescribe information flows with reference to five parameters — sender, recipient, subject, information type, and transmission principle. Because privacy is grasped contextually (e.g., health, education, civic life, etc.), the values of these parameters range over contextually meaningful ontologies — of information types (or topics) and actors (subjects, senders, and recipients), in contextually defined capacities. As an alternative to predominant approaches to privacy, which were ineffective against novel information practices enabled by (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  17.  55
    Generalized Quantifiers and Natural Language.Jon Barwise - 1980 - Linguistics and Philosophy 4:159.
  18.  18
    The Not So New Atheists?Jon Wainwright - 2010 - Philosophy Now 78:16-17.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  36
    Admissible sets and structures: an approach to definability theory.Jon Barwise - 1975 - New York: Springer Verlag.
  20.  31
    Sour Grapes: Studies in the Subversion of Rationality.Jon Elster - 1983 - New York: Cambridge University Press.
    Drawing on philosophy, political and social theory, decision-theory, economics, psychology, history and literature, Jon Elster's classic book Sour Grapes continues and complements the arguments of his acclaimed earlier book, Ulysses and the Sirens. Elster begins with an analysis of the notation of rationality, before tackling the notions of irrational behavior, desires and belief with highly sophisticated arguments that subvert the orthodox theories of rational choice. Presented in a fresh series livery and with a specially commissioned preface written by Richard Holton, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   161 citations  
  21.  88
    Interpersonal comparisons of well-being.Jon Elster & John E. Roemer (eds.) - 1991 - New York: Cambridge University Press.
    In this volume a diverse group of economists, philosophers, political scientists, and psychologists address the problems, principles, and practices involved in comparing the well-being of different individuals. A series of questions lie at the heart of this investigation: What is the relevant concept of well-being for the purposes of comparison? How could the comparisons be carried out for policy purposes? How are such comparisons made now? How do the difficulties involved in these comparisons affect the status of utilitarian theories? This (...)
    Direct download  
     
    Export citation  
     
    Bookmark   23 citations  
  22. The Algebra of Intensional Logics.Jon Michael Dunn - 1966 - Dissertation, University of Pittsburgh
     
    Export citation  
     
    Bookmark   28 citations  
  23.  81
    Embodying values in technology: Theory and practice.Mary Flanagan, Daniel Howe & Helen Nissenbaum - 2008 - In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press. pp. 322--353.
    Direct download  
     
    Export citation  
     
    Bookmark   31 citations  
  24. A Neglected Additament: Peirce on Logic, Cosmology, and the Reality of God.Jon Alan Schmidt - 2018 - Signs 9 (1):1-20.
    Two different versions of the ending of the first additament to C. S. Peirce's 1908 article, "A Neglected Argument for the Reality of God," appear in the Collected Papers but were omitted from The Essential Peirce. In one, he linked the hypothesis of God's Reality to his entire theory of logic as semeiotic, claiming that proving the latter would also prove the former. In the other, he offered a final outline of his cosmology, in which the Reality of God as (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  25. Grounding Grounding.Jon Litland - 2017 - Oxford Studies in Metaphysics 10.
    The Problem of Iterated Ground is to explain what grounds truths about ground: if Γ grounds φ, what grounds that Γ grounds φ? This paper develops a novel solution to this problem. The basic idea is to connect ground to explanatory arguments. By developing a rigorous account of explanatory arguments we can equip operators for factive and non-factive ground with natural introduction and elimination rules. A satisfactory account of iterated ground falls directly out of the resulting logic: non- factive grounding (...)
    Direct download  
     
    Export citation  
     
    Bookmark   58 citations  
  26.  85
    Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
    This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of “securitization,”developed by the Copenhagen School of International Relations.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  27.  34
    Political and ethical perspectives on data obfuscation.Finn Brunton & Helen Nissenbaum - 2013 - In Mireille Hildebrandt & Katja de Vries (eds.), Privacy, due process and the computational turn. Abingdon, Oxon, [England] ; New York: Routledge. pp. 171.
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  28. Embodying Values in Design: Theory and Practice.M. Flanagan, D. Howe & H. Nissenbaum - 2008 - In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press. pp. 322--353.
    No categories
     
    Export citation  
     
    Bookmark   19 citations  
  29. Safety, fairness, and inclusion: transgender athletes and the essence of Rugby.Jon Pike - 2021 - Journal of the Philosophy of Sport 48 (2):155-168.
    In this paper, I link philosophical discussion of policies for trans inclusion or exclusion, to a method of policy making. I address the relationship between concerns about safety, fairness, and inclusion in policy making about the inclusion of transwomen athletes into women’s sport. I argue for an approach based on lexical priority rather than simple ‘balancing’, considering the different values in a specific order. I present justifying reasons for this approach and this lexical order, based on the special obligations of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  30.  43
    Situations and Attitudes.Jon Barwise - 1981 - Journal of Philosophy 78 (11):668.
  31. Sour grapes: studies in the subversion of rationality.Jon Elster - 1983 - Paris: Editions de la Maison des sciences de l'homme.
    Sour Grapes aims to subvert orthodox theories of rational choice through the study of forms of irrationality. Dr Elster begins with an analysis of the notation of rationality, to provide the background and terms for the subsequent discussions, which cover irrational behaviour, irrational desires and irrational belief. These essays continue and complement the arguments of Jon Elster's earlier book, Ulysses and the Sirens. That was published to wide acclaim, and Dr Elster shows the same versatility here in drawing on philosophy, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   236 citations  
  32. On Some Counterexamples to the Transitivity of Grounding.Jon Erling Litland - 2013 - Essays in Philosophy 14 (1):19-32.
    I discuss three recent counterexamples to the transitivity of grounding due to Jonathan Schaffer. I argue that the counterexamples don’t work and draw some conclusions about the relationship between grounding and explanation.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   113 citations  
  33.  12
    The cutting edge.Helen Nissenbaum - 1998 - Acm Sigcas Computers and Society 28 (1):38-39.
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  34.  19
    Model-Theoretic Logics.Jon Barwise & Solomon Feferman - 2017 - Cambridge University Press.
    This book brings together several directions of work in model theory between the late 1950s and early 1980s.
    Direct download  
     
    Export citation  
     
    Bookmark   65 citations  
  35. On the physical significance of the locality conditions in the bell arguments.Jon P. Jarrett - 1984 - Noûs 18 (4):569-589.
  36. Explaining Social Behavior: More Nuts and Bolts for the Social Sciences.Jon Elster - 2007 - Cambridge University Press.
    This book is an expanded and revised edition of the author's critically acclaimed volume Nuts and Bolts for the Social Sciences. In twenty-six succinct chapters, Jon Elster provides an account of the nature of explanation in the social sciences. He offers an overview of key explanatory mechanisms in the social sciences, relying on hundreds of examples and drawing on a large variety of sources - psychology, behavioral economics, biology, political science, historical writings, philosophy and fiction. Written in accessible and jargon-free (...)
    Direct download  
     
    Export citation  
     
    Bookmark   120 citations  
  37. Nuts and Bolts for the Social Sciences.Jon Elster - 1989 - Cambridge University Press.
    This 1989 book is intended as an introductory survey of the philosophy of the social sciences. It is essentially a work of exposition which offers a toolbox of mechanisms - nuts and bolts, cogs and wheels - that can be used to explain complex social phenomena. Within a brief compass, Jon Elster covers a vast range of topics. His point of departure is the conflict we all face between our desires and our opportunities. How can rational choice theory help us (...)
     
    Export citation  
     
    Bookmark   131 citations  
  38.  43
    It's good to talk? Examining attitudes towards corporate social responsibility dialogue and engagement processes.Jon Burchell & Joanne Cook - 2006 - Business Ethics, the Environment and Responsibility 15 (2):154–170.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   31 citations  
  39.  59
    The Situation in Logic.Jon Barwise - 1988 - Cambridge, England: Center for the Study of Language and Inf.
    The present volume collects some of Barwise's papers written since then, those directly concerned with relations among logic, situation theory, and situation semantics. Several papers appear here for the first time.
    Direct download  
     
    Export citation  
     
    Bookmark   126 citations  
  40. The Liar: An Essay on Truth and Circularity.Jon Barwise & John Etchemendy - 1987 - Oxford, England and New York, NY, USA: Oxford University Press USA. Edited by John Etchemendy.
    Bringing together powerful new tools from set theory and the philosophy of language, this book proposes a solution to one of the few unresolved paradoxes from antiquity, the Paradox of the Liar. Treating truth as a property of propositions, not sentences, the authors model two distinct conceptions of propositions: one based on the standard notion used by Bertrand Russell, among others, and the other based on J.L. Austin's work on truth. Comparing these two accounts, the authors show that while the (...)
  41.  70
    Why ‘Meaningful Competition’ is not fair competition.Jon Pike - 2023 - Journal of the Philosophy of Sport 50 (1):1-17.
    In this paper I discuss a new conception that has arrived relatively recently on the scene, in the context of the debate over the inclusion of transwomen (hereafter TW) in female sport. That conception is ‘Meaningful Competition’ (hereafter MC) – a term used by some of those who advocate for the inclusion of TW in female sport if and only if they reduce their testosterone levels. I will argue that MC is not fair. I understand MC as a substitute concept, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  42. Alchemies of the Mind: Rationality and the Emotions.Jon Elster - 1998 - Cambridge University Press.
    Jon Elster has written a comprehensive, wide-ranging book on the emotions in which he considers the full range of theoretical approaches. Drawing on history, literature, philosophy and psychology, Elster presents a complete account of the role of the emotions in human behaviour. While acknowledging the importance of neurophysiology and laboratory experiment for the study of emotions, Elster argues that the serious student of the emotions can learn more from the great thinkers and writers of the past, from Aristotle to Jane (...)
     
    Export citation  
     
    Bookmark   90 citations  
  43.  59
    Commons-based Peer production and virtue.Yochai Benkler & Helen Nissenbaum - 2006 - Journal of Political Philosophy 14 (4):394–419.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   27 citations  
  44. Ulysses and the Sirens: studies in rationality and irrationality.Jon Elster (ed.) - 1979 - Paris: Editions de la Maison des sciences de l'homme.
    This book was first published in 1984, as the revised edition of a 1979 original. The text is composed of studies in a descending sequence from perfect rationality, through imperfect and problematical rationality, to irrationality. Specifically human rationality is characterized by its capacity to relate strategically to the future, in contrast to the myopic 'gradient climbing' of natural selection. There is trenchant analysis of some of the parallels proposed in this connection between the biological and the social sciences. In the (...)
     
    Export citation  
     
    Bookmark   110 citations  
  45.  46
    Stakeholder dialogue and organisational learning: Changing relationships between companies and NGOs.Jon Burchell & Joanne Cook - 2007 - Business Ethics, the Environment and Responsibility 17 (1):35–46.
    This article presents a critical examination of the process of stakeholder dialogue in the Corporate Social Responsibility (CSR) field. It utilises data from a three-year research project into stakeholder dialogue processes to discuss three central themes: first, what is meant by the term ‘dialogue’, both from a theoretical perspective and from its practical application within CSR; second, the challenges of creating effective dialogue; and third, measuring and assessing the potential outcomes of dialogue. In providing a critical overview of these themes, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  46. Semantic Innocence and Uncompromising Situations.Jon Barwise & John Perry - 1981 - Midwest Studies in Philosophy 6 (1):387-404.
  47.  81
    Explaining Technical Change: A Case Study in the Philosophy of Science.Jon Elster - 1983 - Universitetsforlaget.
    In this volume, first published in 1983, Jon Elster approaches the study of technical change from an epistemological perspective.
    Direct download  
     
    Export citation  
     
    Bookmark   91 citations  
  48. Can Trust be Secured Online? A theoretical perspective.Helen Nissenbaum - 1999 - Etica E Politica 1 (2).
  49. Protecting privacy in an information age: The problem of privacy in public. [REVIEW]Helen Nissenbaum - 1998 - Law and Philosophy 17 (s 5-6):559-596.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   48 citations  
  50.  21
    The Multiple Self.Jon Elster (ed.) - 1985 - New York: Cambridge University Press.
    The essays in this volume consider the question of whether the self is a unity or whether it should be conceived without metaphor as divided - as a 'multiple self'. The issue is a central one for several disciplines. It bears directly on the account of rationality and the explanation of individual decision-making and behaviour. Is the hypothesis of a multiple self required to deal with the problems of self-deception and weakness of will; and can the conceptual tools developed in (...)
    Direct download  
     
    Export citation  
     
    Bookmark   21 citations  
1 — 50 / 1000