Results for 'Electronic identities'

1000+ found
Order:
  1.  41
    Electronic identity management in Estonia between market and state governance.Tarvi Martens - 2010 - Identity in the Information Society 3 (1):213-233.
    The present paper summarizes the development of the national electronic Identity Management System (eIDMS) in Estonia according to a conceptual framework developed in an European comparative research project outlined in the first chapter of this special issue. Its main function is to amend the picture of the European eIDMS landscape by presenting a case with high involvement of the private sector and thereby checking the generalizations from the comparisons of Austria, Belgium, Germany and Spain, presented by Kubicek and Noack (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  2.  58
    Electronic identity in Finland: ID cards vs. bank IDs. [REVIEW]Teemu Rissanen - 2010 - Identity in the Information Society 3 (1):175-194.
    This chapter describes the introduction and diffusion of the Finnish Electronic Identity Card (FINEID card). FINEID establishes an electronic identity (eID), based on the civil registry and placed on an identity chip card issued by Finnish government to Finnish citizens and permanent residents from age 18 and older. It is a non-mandatory electronic identity card introduced in 1999 in order to replace the older citizen ID card. It serves as a travel document and is intended to facilitate (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  3.  40
    Electronic identity management in Sweden: governance of a market approach. [REVIEW]Åke Grönlund - 2010 - Identity in the Information Society 3 (1):195-211.
    This paper reviews the history and current status of electronic identities (eID) and eID management in Sweden, including an outlook for the future. The paper is based on official policy documents, technical documentation, presentations by key experts, and comments from government agencies and independent experts. The future perspective is based on the October 2009 public investigation (SOU 2009:86) by the E-delegation. It is concluded that the E-delegation proposal, while still pending political decision, is a major step forward in (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  4.  38
    The path dependency of national electronic identities.Herbert Kubicek & Torsten Noack - 2010 - Identity in the Information Society 3 (1):111-153.
    This paper compares the four national electronic Identity Management Systems (eIDMS), which have been described in the previous chapters. The section Similarities and differences between four national eIDMS will highlight the differences between these systems conceived as socio-technical systems with regard to the eID itself, the eID cards as tokens, the authentication processes as well as the procedures for distribution and personalisation, the support provided for installing the technology and any provider-related regulation. The section A three-fold path dependency , (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  5.  99
    The Aesthetics of Electronic Dance Music, Part I: History, Genre, Scenes, Identity, Blackness.Nick Wiltsher - 2016 - Philosophy Compass 11 (8):415-425.
    Electronic dance music has much about it to interest philosophers. In this article, I explore facets of dance music cultures, using the issue of authenticity as a framing question. The problem of sorting real or authentic dance music from mainstream or commercial clubbing can be treated as a matter of history and genre-definition; as a matter of defining scenes or subcultures; and as a matter of blackness. In each case, electronic dance music, and critical discourse surrounding it, offers (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  6.  11
    Moments of identity: dynamics of artist, persona, and audience in electronic music.Giovanni Formilan & David Stark - 2023 - Theory and Society 52 (1):35-64.
    In our account of artistic identities among electronic music artists, we point to the notion of persona as a key element in a triadic framework for studying the dynamics of identity. Building on pragmatist theory, we further draw on Pizzorno’s concept of mask and Luhmann’s notion of second-order observation to highlight the dual properties of persona: whether like a mask that is put on or like a probe that is put out, persona is a part that stands apart. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  55
    The introduction of online authentication as part of the new electronic national identity card in Germany.Torsten Noack & Herbert Kubicek - 2010 - Identity in the Information Society 3 (1):87-110.
    This chapter provides an analysis of the long process of introducing an electronic identity for online authentication in Germany. This process is described as a multi-facet innovation, involving actors from different policy fields shifting over time. The eID process started in the late ‘90s in the context of eGovernment and eCommerce with the legislation on e-signatures, which were supposed to allow for online authentication of citizens. When after 5 years it was recognized that this was not the case, a (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  8.  4
    Do Electrons Have Politics? Constructing User Identities in Swedish Electricity.Jane Summerton - 2004 - Science, Technology, and Human Values 29 (4):486-511.
    Electricity systems in many parts of Europe and the United States are currently undergoing transformations that have potentially profound implications for managerial practice and the politics of user identities within these systems. After more than a century of “universal service” that provided technical goods and services to all users on essentially equal terms, utility managers are now constructing and exploiting heterogeneity and difference among users. This article explores local managerial practices within Swedish electricity in the mid-1990s, where managers promoted (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  9.  10
    Low-energy electronic properties of pairs of identical carbon nanotubes.Jiun-Yi Lien & Min-Fa Lin - 2009 - Philosophical Magazine 89 (27):2369-2380.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  33
    The 'Hyperbola of Quantum Chemistry': the Changing Practice and Identity of a Scientific Discipline in the Early Years of Electronic Digital Computers, 1945-65.Buhm Soon B. S. Park - 2003 - Annals of Science 60 (3):219-247.
    In 1965, John A. Pope presented a paper entitled 'Two-Dimensional Chart of Quantum Chemistry' to illustrate the inverse relationship between the sophistication of computational methods and the size of molecules under study. This chart, later called the 'hyperbola of quantum chemistry', succinctly summarized the growing tension between the proponents of two different approaches to computation–the ab initio method and semiempirical method–in the early years of electronic digital computers. Examining the development of quantum chemistry after World War II, I focus (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  11.  6
    On the essential identity of the amplification of longitudinal plasma waves and the negative absorption of Čerenkov radiation in an electron stream.V. L. Ginzburg & V. V. Zheleznyakov - 1965 - Philosophical Magazine 11 (109):197-203.
  12.  36
    Electronic health record as a panopticon: A disciplinary apparatus in nursing practice.Jessica Dillard-Wright - 2019 - Nursing Philosophy 20 (2):e12239.
    The specific arrangements of power/knowledge that characterize nurse interactions with the electronic health record form a panopticon. As health care moves into the 21st century, sophisticated technologies like the electronic health record shape the terrain of professional possibilities. The longer it is in use, the more it is possible to excavate the inherent disciplinary function of electronic health record. A panopticon is a generalizable, replicable apparatus of power that cultivates discipline when similar behaviours are desired from a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  13. Electronic gaming and the ethics of information ownership.Dan Burk - 2005 - International Review of Information Ethics 4:39-45.
    Players of electronic games, particularly on-line role-playing games, may invest a substantial degree of time, effort, and personal identity into the game scenarios they generate. Yet, where the wishes of players diverge from those of game publishers, the legal and ethical interests of players remain unclear. The most applicable set of legal principles are those of copyright law, which is often grounded in utilitarian justifications, but which may also be justified on deontological grounds. Past copyright cases involving video arcade (...)
    No categories
     
    Export citation  
     
    Bookmark  
  14.  40
    Identity Discourses on the Dancefloor.Bryan Rill - 2010 - Anthropology of Consciousness 21 (2):139-162.
    Electronic Dance Music Culture (EDMC) is one of the largest subcultural musical movements in history. The dance floor is a creative context that engenders a freedom among participants to reshape their social identity within the Temporary Autonomous Zones (TAZ) that raves, the central spaces for EDMC, provide. On the dance floor, participants enter into powerful trances that have the capacity to reshape notions of self and personhood. This paper examines such identity discourses and suggests that trance consciousness re-constitutes the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  15.  11
    Is the Electron Magnetic Moment Unique?V. A. Golovko - 2023 - Foundations of Physics 53 (5):1-14.
    There exist two methods for finding the magnetic moment of the electron. The first method employed in quantum electrodynamics consists in calculating the energy of the electron placed in a constant magnetic field, the extra energy due to the field being proportional to the magnetic moment. It is also possible to use the second method proceeding from the fact that the asymptotic form of the vector potential at infinity is proportional to the magnetic moment. If the electron were point-like, both (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  16. Artificial intelligence and personal identity.David Cole - 1991 - Synthese 88 (September):399-417.
    Considerations of personal identity bear on John Searle's Chinese Room argument, and on the opposed position that a computer itself could really understand a natural language. In this paper I develop the notion of a virtual person, modelled on the concept of virtual machines familiar in computer science. I show how Searle's argument, and J. Maloney's attempt to defend it, fail. I conclude that Searle is correct in holding that no digital machine could understand language, but wrong in holding that (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   19 citations  
  17.  9
    Personal values, consumer identities, and attitudes toward electric cars among Egyptian consumers.Omneya M. Yacout - 2023 - Business Ethics, the Environment and Responsibility 32 (4):1563-1574.
    Marketing scholars have extensively examined the role of altruistic and ecological personal values and pro-environmental identity in ethical consumption decisions. Conversely, the role of egoistic personal values and other identities has received scant attention from researchers. This research examines the role of altruistic, egoistic, and ecological personal values in triggering two types of identities: pro-environmental and car-authority. The effects of values and identities on personal norms and attitudes toward electric cars were also examined. A sample of Egyptian (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  10
    The Future of Identity: Implications, Challenges, and Complications of Human/Machine Consciousness.Kathleen Ann Goonan - 2014-08-11 - In Russell Blackford & Damien Broderick (eds.), Intelligence Unbound. Wiley. pp. 193–200.
    One model for creating artificial consciousness is replicating every fine detail of the brain on computers and setting the model in motion. Consciousness has been experimentally demonstrated to be a much more fragmented experience than we think it to be, perhaps we only need snippets of ourselves to feel conscious. Perhaps consciousness is nothing less and nothing more than story, and all we need do to continue to feel conscious is maintain identity through computer‐based narrative. Applied nanotechnology has generated uncountable (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  19. The best memories: Identity, narrative, and objects.Richard Heersmink & Christopher Jade McCarroll - 2020 - In Timothy Shanahan & Paul Smart (eds.), Blade Runner 2049: A Philosophical Exploration. Abingdon, UK: Routledge. pp. 87-107.
    Memory is everywhere in Blade Runner 2049. From the dead tree that serves as a memorial and a site of remembrance (“Who keeps a dead tree?”), to the ‘flashbulb’ memories individuals hold about the moment of the ‘blackout’, when all the electronic stores of data were irretrievably erased (“everyone remembers where they were at the blackout”). Indeed, the data wiped out in the blackout itself involves a loss of memory (“all our memory bearings from the time, they were all (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  20.  63
    Persistence and Reidentification in Systems of Identical Quantum Particles: Towards a Post-Atomistic Conception of Matter.Philip Goyal - manuscript
    The quantum symmetrization procedure that is used to handle systems of identical quantum particles brings into question whether the elementary constituents of matter, such as electrons, have the fundamental characteristics of persistence and reidentifiability that are attributed to classical particles. However, we presently lack a coherent conception of matter composed of entities that do not possess one or both of these fundamental characteristics. We also lack a clear a priori understanding of why systems of identical particles (as opposed to non-identical (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  21. Role of Language in Identity Formation: An Analysis of Influence of Sanskrit on Identity Formation.Varanasi Ramabrahmam Varanasi - 2017 - In Omprakash (ed.), Linguistic Foundations of Identity. Aakar. pp. 289-303.
    The contents of Brahmajnaana, the Buddhism, the Jainism, the Sabdabrahma Siddhanta and Shaddarsanas will be discussed to present the true meaning of individual’s identity and I. The influence of spirituality contained in Upanishadic insight in the development of Sanskrit language structure, Indian culture, and individual identity formation will be developed. The cultural and psychological aspects of a civilization on the formation of its language structure and prominence given to various parts of speech and vice versa will be touched upon. These (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  15
    Leaping Out of Our Skins: Postmodern considerations in use of an electronic whiteboard to foster critical engagement in early literacy lessons.Pamela A. Solvie - 2007 - Educational Philosophy and Theory 39 (7):737-754.
    Postmodern theory is used to consider literacy instruction with and without an electronic whiteboard to investigate what it means to move beyond using technology to replicate older models of classroom structure that may be historically situated but that also limit or at least, do not support engagement in ways that may be possible through use of new technologies. Using postmodern theory in this regard is a way in which to consider again the thoughts and practices that tend to construct (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23. "Identity and Judgment: Five Theses and a Program".David Kolb - 1994 - Nordic Journal of Architectural Research:37-40.
    The theses and program below ask about judgment and tradition in a self-consciously plural world. The little program points down a path I am exploring in a pair of texts, one on notions of identity in the history of philosophy, and one on the identity of buildings and places. The underlying issue of those texts is: what will replace the old notion of a particular identity? Places, persons, and communities do not and have never had such simple identities as (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  9
    Neo-classical Relativistic Mechanics Theory for Electrons that Exhibits Spin, Zitterbewegung, Dipole Moments, Wavefunctions and Dirac’s Wave Equation.James L. Beck - 2023 - Foundations of Physics 53 (3):1-39.
    In this work, a neo-classical relativistic mechanics theory is presented where the spin of an electron is an inherent part of its world space-time path as a point particle. The fourth-order equation of motion corresponds to the same covariant Lagrangian function in proper time as in special relativity except for an additional spin energy term. The theory provides a hidden-variable model of the electron where the dynamic variables give a complete description of its motion, giving a classical mechanics explanation of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25.  29
    Leaping out of our skins: Postmodern considerations in use of an electronic whiteboard to Foster critical engagement in early literacy lessons.Pamela A. Solvie - 2007 - Educational Philosophy and Theory 39 (7):737–754.
    Postmodern theory is used to consider literacy instruction with and without an electronic whiteboard to investigate what it means to move beyond using technology to replicate older models of classroom structure that may be historically situated but that also limit or at least, do not support engagement in ways that may be possible through use of new technologies. Using postmodern theory in this regard is a way in which to consider again the thoughts and practices that tend to construct (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  26.  81
    Privacy preserving electronic petitions.Claudia Diaz, Eleni Kosta, Hannelore Dekeyser, Markulf Kohlweiss & Girma Nigusse - 2008 - Identity in the Information Society 1 (1):203-219.
    We present the design of a secure and privacy preserving e-petition system that we have implemented as a proof-of-concept demonstrator. We use the Belgian e-ID card as source of authentication, and then proceed to issue an anonymous credential that is used to sign petitions. Our system ensures that duplicate signatures are detectable, while preserving the anonymity of petition signers. We analyze the privacy and security requirements of our application, present an overview of its architecture, and discuss the applicability of data (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  13
    Biometric Bodies, Or How to Make Electronic Fingerprinting Work in India.Ursula Rao - 2018 - Body and Society 24 (3):68-94.
    The rapid spread of electronic fingerprinting not only creates new regimes of surveillance but compels users to adopt novel ways of performing their bodies to suit the new technology. This ethnography uses two Indian case studies – of a welfare office and a workplace – to unpack the processes by which biometric devices become effective tools for determining identity. While in the popular imaginary biometric technology is often associated with providing disinterested and thus objective evaluation of identity, in practice (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  20
    Vagueness and identity.Joanna Odrowąż-Sypniewska - 2001 - Dissertation, University of St Andrews
    The main focus of this thesis is indeterminate identity and its relations to vague objects and to imprecise designation. Evans's argument concerning indeterminate-identity statements is often regarded as a proof that vague objects cannot exist. In chapter I I try to argue that the argument may be refuted by vague objects theorists. In chapter II I present various accounts of what indeterminate identity between objects may consist in and three different characteristics of it. I argue that there are objects whose (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  18
    The role of control and other factors in the electronic surveillance workplace.Jengchung V. Chen & Yangil Park - 2005 - Journal of Information, Communication and Ethics in Society 3 (2):79-91.
    Many office workers use computers and the Internet not only to get their daily jobs done but also to deal with their personal businesses. Therefore employers nowadays monitor their employees electronically to prevent the misuse of the company resources. The use of electronic monitoring in organizations causes issues of trust and privacy. This study is dedicated to developing a conceptual model on the two issues under electronic monitoring. Control, considered as the essence of the definition of privacy as (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Quantum identity, content, and context: from classical to non-classical logic.José Acacio de Barros, Federico Holik & Décio Krause - 2022 - In Shyam Wuppuluri & Ian Stewart (eds.), From Electrons to Elephants and Elections: Exploring the Role of Content and Context. Springer Nature.
     
    Export citation  
     
    Bookmark  
  31.  35
    Anonymity, pseudonymity, or inescapable identity on the net (abstract).Deborah G. Johnson & Keith Miller - 1998 - Acm Sigcas Computers and Society 28 (2):37-38.
    The first topic of concern is anonymity, specifically the anonymity that is available in communications on the Internet. An earlier paper argues that anonymity in electronic communication is problematic because: it makes law enforcement difficult ; it frees individuals to behave in socially undesirable and harmful ways ; it diminishes the integrity of information since one can't be sure who information is coming from, whether it has been altered on the way, etc.; and all three of the above contribute (...)
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  32.  92
    The integrated information theory of consciousness: A case of mistaken identity.Bjorn Merker, Kenneth Williford & David Rudrauf - 2022 - Behavioral and Brain Sciences 45:e41.
    Giulio Tononi's integrated information theory (IIT) proposes explaining consciousness by directly identifying it with integrated information. We examine the construct validity of IIT's measure of consciousness,phi(Φ), by analyzing its formal properties, its relation to key aspects of consciousness, and its co-variation with relevant empirical circumstances. Our analysis shows that IIT's identification of consciousness with the causal efficacy with which differentiated networks accomplish global information transfer (which is what Φ in fact measures) is mistaken. This misidentification has the consequence of requiring (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  33.  18
    Using the Spanish national identity card in social networks.V. Gayoso MartÍnez, L. HernÁndez Encinas, A. MartÍn MuÑoz & R. DurÁn DÍaz - 2020 - Logic Journal of the IGPL 28 (4):519-530.
    The distinctive security features of the Spanish electronic national identity card, known as Documento Nacional de Identidad electrónico, allow us to propose the usage of this cryptographic smart card in an authentication framework that can be used during the registration and login phases of internet services where the validation of the user’s age and real identity are key elements, as it is the case for example of the so-called social networks. Using this mechanism with NFC-capable devices, the identity and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  34.  35
    The Austrian case: multi-card concept and the relationship between citizen ID and social security cards. [REVIEW]Georg Aichholzer & Stefan Strauß - 2010 - Identity in the Information Society 3 (1):65-85.
    National electronic identity (e-ID) card schemes and electronic identity management systems (e-IDMS) in Europe are characterised by considerable diversity. This contribution analyses the creation of a national e-IDMS in Austria with the aim of improving our understanding of the reasons behind the genesis of particular designs of national e-IDMS. It seeks to explain how the system’s specific design evolved and which factors shaped its appearance. Being part of a comparative four country study, a common theoretical framework is employed (...)
    No categories
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  35.  17
    Eliminating LGBTIQQ Health Disparities: The Associated Roles of Electronic Health Records and Institutional Culture.Edward J. Callahan, Shea Hazarian, Mark Yarborough & John Paul Sánchez - 2014 - Hastings Center Report 44 (s4):48-52.
    For all humans, sexual orientation and gender identity are essential elements of identity, informing how we plan and live our lives. The historic invisibility of sexual minorities in medicine has meant that these important aspects of their identities as patients have been ignored, with the result that these patients have been denied respect, culturally competent services, and proper treatment. Likely due to historic rejection and mistreatment, there is evidence of reluctance on the part of LGBT patients to disclose their (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  78
    The ethics of biometrics: The risk of social exclusion from the widespread use of electronic identification.Jeremy Wickins - 2007 - Science and Engineering Ethics 13 (1):45-54.
    Discussions about biotechnology tend to assume that it is something to do with genetics or manipulating biological processes in some way. However, the field of biometrics––the measurement of physical characteristics––is also biotechnology and is likely to affect the lives of more people more quickly than any other form. The possibility of social exclusion resulting from the use of biometrics data for such uses as identity cards has not yet been fully explored. Social exclusion is unethical, as it unfairly discriminates against (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  37.  59
    Different countries-different paths extended comparison of the introduction of eIDs in eight European countries.Herbert Kubicek & Torsten Noack - 2010 - Identity in the Information Society 3 (1):235-245.
    A first comparison of the innovation processes of introducing electronic identities on a national level in Austria, Belgium, Germany and Spain, based on extensive expert interviews with key actors, has been amended by four more country reports from Denmark, Finland, Estonia and Sweden in order to check the validity of generalisations derived from the first four cases. The extended comparison with the four additional countries increases the variance between the eID systems in Europe by showing differing technical and (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  38. Persistence and Nonpersistence as Complementary Models of Identical Quantum Particles.Philip Goyal - 2019 - New Journal of Physics 21.
    According to our understanding of the everyday physical world, observable phenomena are underpinned by persistent objects that can be reidentified across time by observation of their distinctive properties. This understanding is reflected in classical mechanics, which posits that matter consists of persistent, reidentifiable particles. However, the mathematical symmetrization procedures used to describe identical particles within the quantum formalism have led to the widespread belief that identical quantum particles lack either persistence or reidentifiability. However, it has proved difficult to reconcile these (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39.  27
    Seeing Double: Shared Identities in Physics, Philosophy, and Literature. [REVIEW]Barry Allen - 2005 - Common Knowledge 11 (3):501-501.
    Pesic writes a nontechnical, agreeably philosophical introduction to the strange world of Quantum Mechanics. He uses the idea of individuality to explain the perplexing difference between the world of experience and what physics sees. Individuals are known by their difference from others. A world without variation is a world without individuality. The living world is never like that. The whole evolution of life from earliest times depends entirely on small differences distinguishing one organism from another. Step from the simplest single-cell (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  40.  61
    Introduction: conceptual framework and research design for a comparative analysis of national eID Management Systems in selected European countries. [REVIEW]Herbert Kubicek - 2010 - Identity in the Information Society 3 (1):5-26.
    This paper introduces the objectives and basic approach of a collaborative comparative research project on the introduction of national electronic Identity Management Systems (eIDMS) in Member States of the European Union. Altogether eight country case studies have been produced in two waves by researchers in the respective countries, which will be presented in the following articles in this special issue. The studies adopt a common conceptual framework and use the same terminology, which will be presented in this introduction, just (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  41.  9
    Neural Materialism, Pain's Badness, and A Posteriori Identities.Irwin Goldstein - 2004 - Canadian Journal of Philosophy, Supplementary Volume 30:260-273.
    Materialists say sensations and other kinds of mental states are physical events. Today, most materialists are neural materialists. They think mental states are neural events or material properties of neural events.Orthodox neural materialists think mental states are neural events or orthodox material properties of neutral events. Orthodox material properties are defining properties of the physical. A defining property of the physical is a type of property that provides a necessary condition for something's being correctly termed ‘physical’ Defining properties of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  20
    How technology impacts communication and identity-creation.Simona Zikic - 2022 - Filozofija I Društvo 33 (2):297-310.
    The basic thesis of this paper is that communication is a fundamental activity of all human practices and that identity is constructed with the help of communication. Defining identity cannot be explained and understood exclusively from the standpoint of philosophy, sociology, political science or psychology. Given that the Latin root of the word communication, communio, refers to community, we can say that communication as a science best covers the relationships that people establish within the community such as schools, families, work (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  25
    From Cradle to Internet. The Social Nature of Personal Identity.Cristina Meini - 2015 - Rivista Internazionale di Filosofia e Psicologia 6 (2):282-297.
    Contrary to what Descartes argued many centuries ago, the self seems far from being a simple and indivisible entity, easily accessible to personal scrutiny. In this paper I will endorse an anti-cartesian attitude, starting from two different perspectives. On the one hand, I will consider clinical and developmental studies showing how strongly interpersonal relations modulate the quality of introspective access. In this section, I will take into account Neisser's theory of self knowledge and Gergely and Watson's constructivist approach. On the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44. Conscious Experience and Quantum Consciousness Theory: Theories, Causation, and Identity.Mika Suojanen - 2019 - E-Logos Electronic Journal for Philosophy 26 (2):14-34.
    Generally speaking, the existence of experience is accepted, but more challenging has been to say what experience is and how it occurs. Moreover, philosophers and scholars have been talking about mind and mental activity in connection with experience as opposed to physical processes. Yet, the fact is that quantum physics has replaced classical Newtonian physics in natural sciences, but the scholars in humanities and social sciences still operate under the obsolete Newtonian model. There is already a little research in which (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  45.  7
    Is Human Identity an Artifact?Joanne Baldine - 1997 - Society for Philosophy and Technology Quarterly Electronic Journal 3 (2):75-81.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  46.  57
    A new e-ID card and online authentication in Spain.Alexander Heichlinger & Patricia Gallego - 2010 - Identity in the Information Society 3 (1):43-64.
    This paper describes the introduction of a new electronic identity card including an electronic identity (EID) for local physical and online authentication in 2006. The most significant difference to any European country is the decentralized issuing at 256 police stations employing an automatic printing machine. This is the most visible element in a high degree continuation, as the previous paper based ID cards were also personalized and issued at the police stations. Similarly the attributes defining the identity and (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  47.  17
    Preconditions for Legal Regulation of Personal Identification in Cyberspace.Darius Štitilis, Paulius Pakutinskas, Inga Dauparaitė & Marius Laurinaitis - 2011 - Jurisprudencija: Mokslo darbu žurnalas 18 (2):703-724.
    The article analyses legal preconditions for personal identification in physical and electronic space (hereinafter – cyberspace). Analysis of legal governing of identification in physical space is followed by the analysis of the same in cyberspace. Compulsory elements of identification in physical space and compulsory and non-compulsory elements of identification in cyberspace are provided which leads to conclusions about problem aspects concerning personal identification in cyberspace and related legal governing. This scientific article consists of four main chapters. The first chapter (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  36
    Minimal credential disclosure in trust negotiations.Federica Paci, David Bauer, Elisa Bertino, Douglas M. Blough, Anna Squicciarini & Aditi Gupta - 2009 - Identity in the Information Society 2 (3):221-239.
    The secure release of identity attributes is a key enabler for electronic business interactions. Users should have the maximum control possible over the release of their identity attributes and should state under which conditions these attributes can be disclosed. Moreover, users should disclose only the identity attributes that are actually required for the transactions at hand. In this paper we present an approach for the controlled release of identity attributes that addresses such requirements. The approach is based on the (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49. How Classical Particles Emerge From the Quantum World.Dennis Dieks & Andrea Lubberdink - 2011 - Foundations of Physics 41 (6):1051-1064.
    The symmetrization postulates of quantum mechanics (symmetry for bosons, antisymmetry for fermions) are usually taken to entail that quantum particles of the same kind (e.g., electrons) are all in exactly the same state and therefore indistinguishable in the strongest possible sense. These symmetrization postulates possess a general validity that survives the classical limit, and the conclusion seems therefore unavoidable that even classical particles of the same kind must all be in the same state—in clear conflict with what we know about (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   35 citations  
  50. Becoming a Self: The past, present and future of selfhood.David L. Thompson - forthcoming - Altona, MB, Canada: FriesenPress.
    What makes us persons? Is it our bodies, our minds, or our consciousness? For centuries, philosophers have sought to answer these questions. While some believe humans are physical or biological, others claim we have an immaterial soul. This book proposes a new alternative. Selves were formed in evolution through connections and commitments to others when early hominins lived in tribal groups and developed languages. As humans learned to fulfill these commitments, they not only cultivated relationships but also created their personal (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000