Results for 'Access Control'

974 found
Order:
  1. A Meta-model of Access Control in a Fibred Security Language.Steve Barker, Guido Boella, Dov M. Gabbay & Valerio Genovese - 2009 - Studia Logica 92 (3):437-477.
    The issue of representing access control requirements continues to demand significant attention. The focus of researchers has traditionally been on developing particular access control models and policy specification languages for particular applications. However, this approach has resulted in an unnecessary surfeit of models and languages. In contrast, we describe a general access control model and a logic-based specification language from which both existing and novel access control models may be derived as particular (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  2.  33
    Context-Aware Access Control Model for Privacy Support in Mobile-Based Assisted Living.Nikolay Teslya, Nikolay Shilov, Alexey Kashevnik & Alexander Smirnov - 2015 - Journal of Intelligent Systems 24 (3):333-342.
    The average lifetime of people in advanced countries is significantly increased in the XXI century. The number of old and dependent people is rising due many innovations in health care: new technologies, medicine, and a lot of innovative devices that allow people to monitor their health and consult with a doctor in case of problems. In the last years, a number of information systems have been developed in the health-care area to assist people in living. Modern systems increase their mobility (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  21
    Topology Control and Medium Access Control (MAC) Protocol for Wireless Sensor Networks (WSNs) in Cyber-Physical System.Ang Li, Chen Zhang, Baoyu Zheng & Lei Li - 2021 - Complexity 2021:1-12.
    The system reachability set is calculated by covering all possible behaviours of the system through a finite number of simulation steps to ensure that the system trajectory stays within a set safety region. In this paper, the theory of the game method is applied to the design of the controller, a very small controller is designed, and good control results are obtained by simulation. The system gradually shows a divergent trend and cannot achieve stable control. A multihop channel (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  21
    Impact of Face-Recognition-Based Access Control System on College Students’ Sense of School Identity and Belonging During COVID-19 Pandemic.Qiang Wang, Lan Hou, Jon-Chao Hong, Xiantong Yang & Mengmeng Zhang - 2022 - Frontiers in Psychology 13.
    In the context of coronavirus pandemic, the face-recognition-based access control system has been intensively adopted to protect students’ and teachers’ health and safety in school. However, the impact of FACS, as a new technology, on students’ attitude toward accepting FACS has remained unknown from the psychological halo effect. Drawn on “halo effect” theory where psychological effects affect the sense of social identity and belonging, the present study explored college students’ sense of school identity and belonging in using FACS (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  22
    An abstract dynamic access control architecture.Chuchang Liu, Angela Billard & Benjamin Long - 2011 - Journal of Applied Logic 9 (4):239-249.
  6. International Workshop on Web-Based Internet Computing for Science and Engineering (ICSE 2006)-A Model of XML Access Control with Dual-Level Security Views.Wei Sun, Da-xin Liu & Tong Wang - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes In Computer Science. Springer Verlag. pp. 3842--799.
     
    Export citation  
     
    Bookmark  
  7. Accessing Self-Control.Polaris Koi - 2023 - Erkenntnis 88 (8):3239-3258.
    Self-control is that which is enacted to align our behaviour with intentions, motives, or better judgment in the face of conflicting impulses of motives. In this paper, I ask, what explains interpersonal differences in self-control? After defending a functionalist conception of self-control, I argue that differences in self-control are analogous to differences in mobility: they are modulated by inherent traits and environmental supports and constraints in interaction. This joint effect of individual (neuro)biology and environmental factors is (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  8.  33
    A semantic approach for fine-grain access control of e-health documents.F. Amato, V. Casola, N. Mazzocca & S. Romano - 2013 - Logic Journal of the IGPL 21 (4):692-701.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  37
    Security analysis and resource requirements of group-oriented user access control for hardware-constrained wireless network services.D. Ventura, Aitor Gómez-Goiri, V. Catania, Diego López-de-Ipiña, J. A. M. Naranjo & L. G. Casado - 2016 - Logic Journal of the IGPL 24 (4).
  10. Client-Server based Remote Access through the Internet: Internet based Remote Process Control.Mohammed Abdullah Hussein - 2011 - Germany: LAP Lambert Academic Publishing.
    Internet based process control usage has grown in the past years. Industry field demands were behind this, and it ranges from factory, office and home automation to tasks simplifications and cost reduction. In this book a hardware interface circuit and a software system used to control the temperature and level of a liquid tank is described. The advantage of the designed interface circuit is its simplicity and low cost. The same can be true for the software system in (...)
     
    Export citation  
     
    Bookmark  
  11.  67
    Controlling access to the internet: The role of filtering. [REVIEW]R. S. Rosenberg - 2001 - Ethics and Information Technology 3 (1):35-54.
    Controlling access to the Internet by means of filtering softwarehas become a growth industry in the U.S. and elsewhere. Its usehas increased as the mandatory response to the current plagues ofsociety, namely, pornography, violence, hate, and in general,anything seen to be unpleasant or threatening. Also of potentialconcern is the possible limitation of access to Web sites thatdiscuss drugs, without distinguishing advocacy from scientificand informed analysis of addiction. With the rise of an effectivecreationist movement dedicated to the elimination of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  12.  53
    Access and control of resources: Lessons from the sanrem crsp. [REVIEW]Cornelia Butler Flora - 2001 - Agriculture and Human Values 18 (1):41-48.
    Attention to differences within communities is important in working toward sustainability of an agro-ecosystem. In the Sustainable Agriculture and Natural Resource Management Collaborative Research Support Program, gender made a difference in terms of access and control over key resources – financial, human, natural, and social capital – critical for project success. Efforts to build social capital among women proved critical in developing both collective and households strategies for sustainability. The sites differed greatly in both landscape and lifescape. Women's (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  13.  90
    Widening access while tightening control: Office-holding, marriages, and elite consolidation in early modern Poland.Paul D. Mclean - 2004 - Theory and Society 33 (2):167-212.
  14.  59
    Tractability and Intractability of Controlled Languages for Data Access.Camilo Thorne & Diego Calvanese - 2012 - Studia Logica 100 (4):787-813.
    In this paper we study the semantic data complexity of several controlled fragments of English designed for natural language front-ends to OWL (Web Ontology Language) and description logic ontology-based systems. Controlled languages are fragments of natural languages, obtained by restricting natural language syntax, vocabulary and semantics with the goal of eliminating ambiguity. Semantic complexity arises from the formal logic modelling of meaning in natural language and fragments thereof. It can be characterized as the computational complexity of the reasoning problems associated (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  15.  15
    How Much Control Do Children and Adolescents Have over Genomic Testing, Parental Access to Their Results, and Parental Communication of Those Results to Others?Ellen Wright Clayton - 2015 - Journal of Law, Medicine and Ethics 43 (3):538-544.
    Adolescents may often have opinions about whether they want genetic and genomic testing in both the clinic and research and about who should have access to the results. This legal analysis demonstrates that the law provides very little protection to minors' wishes.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  16.  94
    Biomedical Big Data: New Models of Control Over Access, Use and Governance.Alessandro Blasimme & Effy Vayena - 2017 - Journal of Bioethical Inquiry 14 (4):501-513.
    Empirical evidence suggests that while people hold the capacity to control their data in high regard, they increasingly experience a loss of control over their data in the online world. The capacity to exert control over the generation and flow of personal information is a fundamental premise to important values such as autonomy, privacy, and trust. In healthcare and clinical research this capacity is generally achieved indirectly, by agreeing to specific conditions of informational exposure. Such conditions can (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  17.  60
    How we can make sense of control-based intuitions for limited access-conceptions of the right to privacy.Björn Lundgren - 2021 - Journal of Ethics and Social Philosophy 20 (3).
    Over the years, several counterexamples arguably establish the limits of control-based conceptions of privacy and the right to privacy. Some of these counterexamples focus only on privacy, while the control-based conception of the right to privacy is rejected because of conceptual consistency between privacy and the right to privacy. Yet, these counterexamples do not deny the intuitions of control-based conceptions of the right to privacy. This raises the question whether conceptual consistency is more important than intuitions in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18. Attitudes as accessibility bias: Dissociating automatic and controlled processes.B. Keith Payne, Larry L. Jacoby & Alan J. Lambert - 2005 - In Ran R. Hassin, James S. Uleman & John A. Bargh (eds.), The New Unconscious. Oxford Series in Social Cognition and Social Neuroscience. New York: Oxford University Press. pp. 393-420.
  19.  54
    Delegation of access rights in multi-domain service compositions.Laurent Bussard, Anna Nano & Ulrich Pinsdorf - 2009 - Identity in the Information Society 2 (2):137-154.
    Today, it becomes more and more common to combine services from different providers into one application. Service composition is however difficult and cumbersome when there is no common trust anchor. Hence, delegation of access rights across trust domains will become essential in service composition scenarios. This article specifies abstract delegation, discusses theoretical aspects of the concept, and provides technical details of a validation implementation supporting a variety of access controls and associated delegation mechanisms. Abstract delegation allows to harmonize (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  20.  8
    Regulation of activin's access to the cell: why is Mother Nature such a control freak?David J. Phillips - 2000 - Bioessays 22 (8):689-696.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  55
    Lexical access and discourse planning: Bottom-up interference or top-down control troubles?Wendy G. Lehnert - 1986 - Behavioral and Brain Sciences 9 (3):528-529.
  22. Mechanisms that control referential access.Ma Gernsbacher - 1987 - Bulletin of the Psychonomic Society 25 (5):335-335.
  23. Convergence of the source control and actual access accounts of privacy.Haleh Asgarinia - 2023 - AI and Ethics 3 (1).
    In this paper, it is argued that, when properly revised in the face of counter-examples, the source control and actual access views of privacy are extensionally equivalent but different in their underlying rationales. In this sense, the source control view and the actual access view, when properly modified to meet counter-examples, can be metaphorically compared to ‘climbing the same mountain but from different sides’ (as Parfit [1] has argued about normative theories). These two views can equally (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  38
    Strengthening the united states' database protection laws: Balancing public access and private control.David B. Resnik - 2003 - Science and Engineering Ethics 9 (3):301-318.
    This paper develops three arguments for increasing the strength of database protection under U.S. law. First, stronger protections would encourage private investment in database development, and private databases have many potential benefits for science and industry. Second, stronger protections would discourage extensive use of private licenses to protect databases and would allow for greater public control over database laws and policies. Third, stronger database protections in the U.S. would harmonize U.S. and E.U. laws and would thus enhance international trade, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  25. Ongoing spontaneous activity controls access to consciousness: A neuronal model for inattentional blindness.Jean-Pierre Changeux & Stanislas Dehaene - 2005 - PLoS Biology 3 (5):e141.
    1 INSERM-CEA Unit 562, Cognitive Neuroimaging, Service Hospitalier Fre´de´ric Joliot, Orsay, France, 2 CNRS URA2182 Re´cepteurs and Cognition, Institut Pasteur, Paris, France.
     
    Export citation  
     
    Bookmark   45 citations  
  26.  4
    Access to information in Africa: law, culture and practice.Fatima Diallo & Richard Calland (eds.) - 2013 - Boston: Brill.
    As a new praxis emerges, in Access to Information in Africa for the first time African scholars and practitioners reflect on recent advances on the continent, as well as the obstacles that must still be overcome if greater public access to information is to make a distinctive contribution to Africa's democratic and socio-economic future.
    Direct download  
     
    Export citation  
     
    Bookmark  
  27.  21
    Genetic Information. Acquisition, Access, and Control. Edited by Alison K. Thompson & Ruth F. Chadwick. Pp. 348. (Kluwer Academic/Plenum Publishers, New York, 1999.) $115, ISBN 0-306-46052-1, hardback. [REVIEW]Stanislaw Cebrat - 2003 - Journal of Biosocial Science 35 (1):153-160.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  28. Gun control.Hugh LaFollette - 2000 - Ethics 110 (2):263-281.
    Many of us assume we must either oppose or support gun control. Not so. We have a range of alternatives. Even this way of speaking oversimplifies our choices since there are two distinct scales on which to place alternatives. One scale concerns the degree (if at all) to which guns should be abolished. This scale moves from those who want no abolition (NA) of any guns, through those who want moderate abolition (MA) - to forbid access to some (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   25 citations  
  29.  11
    Sex and Birth-control : Social-Ethics and lntegrated Accesses to an Abortion. 이경희 - 2008 - Journal of Ethics: The Korean Association of Ethics 1 (69):191-213.
    낙태는 인류역사 이래로 가장 오래된 생명윤리 주제 중 하나였으며 암묵적으로는 동서고금을 막론하고 성과 생식을 통제하는 방법으로써 기능해 왔다. 본 논문은 지금까지의 낙태와 피임에 대한 접근이 다분히 일면적 ― 윤리적ㆍ종교적ㆍ법률적 ― 접근이었음을 지적하고, 맥락적ㆍ통합적ㆍ총체적 ― 경제적ㆍ정치적ㆍ인구통계학적ㆍ종교적ㆍ성적ㆍ사회 문화적 맥락 ― 으로 접근하여 낙태문제의 본질에 더 가까이 다가가려는데 목적이 있다.이를 위해 우선 낙태논의의 역사적 발전과정 ― 고대 그리스 로마시대의 정치경제적 이슈였던 낙태와 피임문제가 중세와 기독교 교회 중심의 종교적ㆍ윤리적 이슈로, 그리고 현대에 들어서 낙태문제가 권리 이론으로 발전하는데 영향을 준 페미니즘과 공리주의 ― 에 대해 살피고 (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  77
    Emotional Accessibility Is More Important Than Sexual Accessibility in Evaluating Romantic Relationships – Especially for Women: A Conjoint Analysis.T. J. Wade & Justin Mogilski - 2018 - Frontiers in Psychology 9:303270.
    Prior research examining mate expulsion indicates that women are more likely to expel a mate due to deficits in emotional access while men are more likely to expel a mate due to deficits in sexual access. Prior research highlights the importance of accounting for measurement limitations (e.g., the use of incremental vs. forced-choice measures) when assessing attitudes toward sexual and emotional infidelity; Wade & Brown, 2012; Sagarin et al., 2012). The present research uses conjoint analysis, a novel methodology (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  60
    Subjects' access to cognitive processes: Demand characteristics and verbal report.John G. Adair & Barry Spinner - 1981 - Journal for the Theory of Social Behaviour 11 (1):31–52.
    The present paper examines the arguments and data presented by Nisbett and Wilson relevant to their thesis that subjects do not have access to their own cognitive processes. It is concluded that their review of previous research is selective and incomplete and that the data they present in behalf of their thesis does not withstand a demand characteristics analysis. Furthermore, their use of observer-subject similarity as evidence of subjects' inability to access cognitive processes makes tests of their hypothesis (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  32. The e-z reader model of eye-movement control in reading: Comparisons to other models.Erik D. Reichle, Keith Rayner & Alexander Pollatsek - 2003 - Behavioral and Brain Sciences 26 (4):445-476.
    The E-Z Reader model (Reichle et al. 1998; 1999) provides a theoretical framework for understanding how word identification, visual processing, attention, and oculomotor control jointly determine when and where the eyes move during reading. In this article, we first review what is known about eye movements during reading. Then we provide an updated version of the model (E-Z Reader 7) and describe how it accounts for basic findings about eye movement control in reading. We then review several alternative (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   65 citations  
  33.  84
    Alpha-band oscillations, attention, and controlled access to stored information.Wolfgang Klimesch - 2012 - Trends in Cognitive Sciences 16 (12):606.
  34.  50
    Accessing food resources: Rural and urban patterns of giving and getting food. [REVIEW]Lois Wright Morton, Ella Annette Bitto, Mary Jane Oakland & Mary Sand - 2007 - Agriculture and Human Values 25 (1):107-119.
    Reciprocity and redistribution economies are often used by low-income households to increase access to food, adequate diets, and food security. A United States study of two high poverty rural counties and two low-income urban neighborhoods reveal poor urban households are more likely to access food through the redistribution economy than poor rural households. Reciprocal nonmarket food exchanges occur more frequently in low-income rural households studied compared to low-income urban ones. The rural low-income purposeful sample was significantly more likely (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  35.  38
    Subliminal access to abstract face representations does not rely on attention.Bronson Harry, Chris Davis & Jeesun Kim - 2012 - Consciousness and Cognition 21 (1):573-583.
    The present study used masked repetition priming to examine whether face representations can be accessed without attention. Two experiments using a face recognition task presented masked repetition and control primes in spatially unattended locations prior to target onset. Experiment 1 used the same images as primes and as targets and Experiment 2 used different images of the same individual as primes and targets. Repetition priming was observed across both experiments regardless of whether spatial attention was cued to the location (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  36.  66
    Perceived Access to Self-relevant Information Mediates Judgments of Privacy Violations in Neuromonitoring and Other Monitoring Technologies.D. A. Baker, N. J. Schweitzer & Evan F. Risko - 2013 - Neuroethics 7 (1):43-50.
    Advances in technology are bringing greater insight into the mind, raising a host of privacy concerns. However, the basic psychological mechanisms underlying the perception of privacy violations are poorly understood. Here, we explore the relation between the perception of privacy violations and access to information related to one’s “self.” In two studies using demographically diverse samples, we find that privacy violations resulting from various monitoring technologies are mediated by the extent to which the monitoring is thought to provide (...) to self-relevant information, and generally neuromonitoring did not rate among the more invasive monitoring types. However, brain monitoring was judged to be more of a privacy violation when described as providing access to self-relevant information than when no such access was possible, and control participants did not judge the invasiveness of neuromonitoring any differently than those told it provided no access to self-relevant information. (shrink)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  37.  44
    Informed consent for controlled human infection studies in low‐ and middle‐income countries: Ethical challenges and proposed solutions.Vina Vaswani, Abha Saxena, Seema K. Shah, Ricardo Palacios & Annette Rid - 2020 - Bioethics 34 (8):809-818.
    In controlled human infection studies (CHIs), participants are deliberately exposed to infectious agents in order to better understand the mechanism of infection or disease and test therapies or vaccines. While most CHIs have been conducted in high‐income countries, CHIs have recently been expanding into low‐ and middle‐income countries (LMICs). One potential ethical concern about this expansion is the challenge of obtaining the voluntary informed consent of participants, especially those who may not be literate or have limited education. In some CHIs (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  19
    Direct accessibility for overgeneral memory predicts a worse course of depression: re-analysis of the online computerised memory specificity training for major depression study.Noboru Matsumoto & David John Hallford - 2023 - Cognition and Emotion 37 (2):339-351.
    Researchers have been interested in what retrieval process is responsible for overgeneral autobiographical memories (OGM) in depression. Previous cross-sectional studies demonstrated that, for negatively valenced cues, directly retrieved OGM, rather than generatively retrieved OGM, are associated with depression. However, longitudinal evidence of this relationship is still lacking and needs to be tested. We conducted a re-analysis of the online computerised memory specificity training (c-MeST) data to examine whether directly retrieved OGM for negative cues prospectively predicts high levels of depression 1 (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  9
    Corruption Control in Post-Reform China: A Social Censure Perspective.Guoping Jiang - 2017 - Singapore: Imprint: Springer.
    The book examines corruption control in post-reform China. Contrary to the normal perception that corruption is a type of behavior that violates the law, the author seeks to approach the issue from a social censure perspective, where corruption is regarded as a form of social censure intended to maintain the hegemony of the ruling bloc. Such an approach integrates societal structure, political goals, and agency into a single framework to explain dynamics in corruption control. With both qualitative data (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  40.  28
    Female access to fertile land and other inputs in Zambia: why women get lower yields.William J. Burke, Serena Li & Dingiswayo Banda - 2018 - Agriculture and Human Values 35 (4):761-775.
    Throughout the developing world, it is a well-documented fact that women farmers tend to get lower yields than their male counterparts. Typically this is attributed to disproportionate access to high-quality inputs and labor, with some even arguing there could be a skills-gap stemming from unbalanced access to training and education. This article examines the gender-based yield gap in the context of Zambian maize producers. In addition to the usual drivers, we argue that Zambia’s patriarchal and multi-tiered land distribution (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  41.  44
    Improving access to community-based pulmonary rehabilitation: 3R protocol for real-world settings with cost-benefit analysis.Alda Marques, Cristina Jácome, Patrícia Rebelo, Cátia Paixão, Ana Oliveira, Joana Cruz, Célia Freitas, Marília Rua, Helena Loureiro, Cristina Peguinho, Fábio Marques, Adriana Simões, Madalena Santos, Paula Martins, Alexandra André, Sílvia De Francesco, Vitória Martins, Dina Brooks & Paula Simão - 2019 - BMC Public Health 19 (1):676.
    Pulmonary rehabilitation has demonstrated patients’ physiological and psychosocial improvements, symptoms reduction and health-economic benefits whilst enhances the ability of the whole family to adjust to illness. However, PR remains highly inaccessible due to lack of awareness of its benefits, poor referral and availability mostly in hospitals. Novel models of PR delivery are needed to enhance its implementation while maintaining cost-efficiency. We aim to implement an innovative community-based PR programme and assess its cost-benefit. A 12-week community-based PR will be implemented in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42. A theory of lexical access in speech production.Willem J. M. Levelt, Ardi Roelofs & Antje S. Meyer - 1999 - Behavioral and Brain Sciences 22 (1):1-38.
    Preparing words in speech production is normally a fast and accurate process. We generate them two or three per second in fluent conversation; and overtly naming a clear picture of an object can easily be initiated within 600 msec after picture onset. The underlying process, however, is exceedingly complex. The theory reviewed in this target article analyzes this process as staged and feedforward. After a first stage of conceptual preparation, word generation proceeds through lexical selection, morphological and phonological encoding, phonetic (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   284 citations  
  43.  52
    Terminal illness and access to phase 1 experimental agents, surgeries and devices: Reviewing the ethical arguments.Udo Schüklenk & Christopher Lowry - 2009 - British Medical Bulletin 89 (1):7-22.
    Background: The advent of AIDS brought about a group of patients unwilling to accept crucial aspects of the methodological standards for clinical research investigating Phase 1 drugs, surgeries or devices. Their arguments against placebo controls in trials, which depended-at the time-on the terminal status of patient volunteers led to a renewed discussion of the ethics of denying patients with catastrophic illnesses access to last-chance experimental drugs, surgeries or devices. Sources of data: Existing ethics and health policy literature on the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   9 citations  
  44. Born which Way? ADHD, Situational Self-Control, and Responsibility.Polaris Koi - 2021 - Neuroethics 14 (2):205-218.
    Debates concerning whether Attention Deficit/Hyperactivity Disorder mitigates responsibility often involve recourse to its genetic and neurodevelopmental etiology. For such arguments, individuals with ADHD have diminished self-control, and hence do not fully satisfy the control condition for responsibility, when there is a genetic or neurodevelopmental etiology for this diminished capacity. In this article, I argue that the role of genetic and neurobiological explanations has been overstated in evaluations of responsibility. While ADHD has genetic and neurobiological causes, rather than embrace (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  45.  30
    Power, Control, and Resistance in Philippine and American Police Interview Discourse.Ma Kaela Joselle R. Madrunio & Rachelle B. Lintao - 2024 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 37 (2):449-484.
    This paper is aimed at assessing how power, control, and resistance come into play and how resistance counteracts power and control in police investigative interviewing. Considering that the Philippines was once a colony of the United States, it is essential to compare the two samples as the Philippine legal system is highly patterned after the American jurisprudence (Mercullo in JForensicRes 11:1–4, 2020). Highlighting the existing and emerging power relations between the police interviewer and the interviewee, the study employed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46. Attention is Rational-Access Consciousness.Declan Smithies - 2011 - In Christopher Mole, Declan Smithies & Wayne Wu (eds.), Attention: Philosophical and Psychological Essays. New York: Oxford University Press. pp. 247--273.
    This chapter argues that attention is a distinctive mode of consciousness, which plays an essential functional role in making information accessible for use in the rational control of thought and action. The main line of argument can be stated quite simply. Attention is what makes information fully accessible for use in the rational control of thought and action. But what makes information fully accessible for use in the rational control of thought and action is a distinctive mode (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   54 citations  
  47.  34
    On-line control of pointing is modified by unseen visual shapes.Erin K. Cressman, Ian M. Franks, James T. Enns & Romeo Chua - 2007 - Consciousness and Cognition 16 (2):265-275.
    Shapes that are rendered invisible through backward masking are still able to influence motor responses: this is called masked priming. Yet it is unknown whether this influence is on the control of ongoing action, or whether it merely influences the initiation of an already-programmed action. We modified a masked priming procedure such that the critical prime-mask sequence was displayed during the execution of an already-initiated goal-directed pointing movement. Psychophysical tests of prime visibility indicated that the identity of the prime (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  48. An Indirect Argument for the Access Theory of Privacy.Jakob Mainz - 2021 - Res Publica 27 (3):309-328.
    In this paper, I offer an indirect argument for the Access Theory of privacy. First, I develop a new version of the rival Control Theory that is immune to all the classic objections against it. Second, I show that this new version of the Control Theory collapses into the Access Theory. I call the new version the ‘Negative Control Account’. Roughly speaking, the classic Control Theory holds that you have privacy if, and only if, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  49.  48
    Volitional control in the learning of artificial grammars.Peter A. Bibby & Geoffrey Underwood - 1999 - Behavioral and Brain Sciences 22 (5):757-758.
    Dienes & Perner argue that volitional control in artificial grammar learning is best understood in terms of the distinction between implicit and explicit knowledge representations. We maintain that direct, explicit access to knowledge organised in a hierarchy of implicitness/explicitness is neither necessary nor sufficient to explain volitional control. People can invoke volitional control when their knowledge is implicit, as in the case of artificial grammar learning, and they can invoke volitional control when any part of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  50.  82
    Accessing the meaning of invisible words.Yung-Hao Yang & Su-Ling Yeh - 2011 - Consciousness and Cognition 20 (2):223-233.
    Previous research has shown implicit semantic processing of faces or pictures, but whether symbolic carriers such as words can be processed this way remains controversial. Here we examine this issue by adopting the continuous flash suppression paradigm to ensure that the processing undergone is indeed unconscious without the involvement of partial awareness. Negative or neutral words projected into one eye were made invisible due to strong suppression induced by dynamic-noise patterns shown in the other eye through binocular rivalry. Inverted and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   15 citations  
1 — 50 / 974