Preface.Feng Yu-Lan - 1978 - Contemporary Chinese Thought 9 (3):3-11.details
In the fall of 1973, the mass Campaign to Criticize Lin Piao and Confucius started to develop. At the beginning, I was very nervous. I said to myself: "Oh no'. Prior to the Great Proletarian Cultural Revolution, I was always revering Confucius. Now that it is time to criticize Lin Piao and Confucius, I will once again become the object of criticism." Later, after further thought, I realized that this was not right; this thinking arose from my old standpoint, [the (...) one which had preceded the standpoint] of the Great Cultural Revolution. I had revered Confucius in the past, but that was because my former standpoint was reactionary and my line was wrong. I had already recognized this during the Cultural Revolution. On the issue of revering Confucius, I had already taken the first step in self-criticism too. Now, on the basis of criticism which I have already established, I will put forth more advanced criticism of Confucius and of my own earlier thinking on revering Confucius. With the revolutionary masses, I will criticize Lin Piao and Confucius. (shrink)
End-of-life decision making frequently occurs in the intensive care unit (ICU). There is a lack of information on how a do-not-resuscitate (DNR) order affects treatments received by critically ill patients in ICUs. The objectives of this study were: (1) to compare the use of life support therapies between patients with a DNR order and those without; (2) to examine life support therapies prior to and after the issuance of a DNR order; and (3) to determine the clinical factors that influence (...) the initiation of a DNR order in ICUs in Taiwan. A prospective, descriptive, and correlational study was conducted. A total of 202 patients comprising 133 (65.8%) who had a DNR order, and 69 (34.1%) who did not, participated in this study. In the last 48 hours of their lives, patients who had a DNR order were less likely to receive life support therapies than those who did not have a DNR order. Older age, being unmarried, the presence of an adult child as a surrogate decision maker, a perceived inability to survive ultimate discharge from the ICU, and longer hospitalization in the ICU were significant predictors of issuing a DNR order for critically ill patients. This study will draw attention to how, when, and by whom, critically ill patients’ preferences about DNR are elicited and honored. (shrink)
On 19 October 2013, the Chinese government issued the Opinions on Further Regulation on Party and Political Leaders and Cadres Working Part-Time in Enterprises, also known as the 18th Decree, to regulate government officials’ employment with businesses. The 18th Decree is widely perceived as having had a significant impact on the use of independent directors with political backgrounds by firms, given the prevalence of this business practice. This paper examines the market reaction to the 18th Decree to ascertain the value (...) effect of political connections in China. We note a negative relationship between the political connections of independent directors and market reaction. We also note that the negative relationship between political connections and market reaction is moderated by ownership type and state of regional development. Specifically, we find that the negative relationship holds only for private firms in less developed regions. These results support our prediction that political connections add value to Chinese firms and that the value effect of political connection is contingent on institutional factors. (shrink)
The purpose of this study is to explore the ethical orientations of Taiwan's school leaders by means of a questionnaire survey of 573 school leaders. A multidimensional ethical framework, including utilitarianism, justice, care, critique, and virtue, was used. The results demonstrate that the most frequent ethical orientation of Taiwan's school leaders is justice. Second, the ethical orientation of Taiwan's school leaders is influenced by Confucian ethics to some degree, especially in terms of virtue ethics. However, the ethical orientation of school (...) leaders significantly varies depending on gender, age, position, years of teaching experience, and educational administration ethics training. (shrink)
The variation of the journal impact factor is affected by many statistical and sociological factors such as the size of citation window and subject difference. In this work, we develop an impact factor dynamics model based on the parallel system, which can be used to analyze the correlation between the impact factor and certain elements. The parallel model aims to simulate the submission and citation behaviors of the papers in journals belonging to a similar subject, in a distributed manner. We (...) perform Monte Carlo simulations to show how the model parameters influence the impact factor dynamics. Through extensive simulations, we reveal the important role that certain statistics elements and behaviors play to affect impact factors. The experimental results and analysis on actual data demonstrate that the value of the JIF is comprehensively influenced by the average review time, average number of references, and aging distribution of citation. (shrink)
Previous research has shown that virtuous leader behavior in the form of benevolent leadership has considerable impact on employee creativity. However, little is known as to how and under what conditions these constructs are linked. In the current research, we proposed and tested a moderated mediation model positing leader–member exchange as a mediator, and employee power-distance orientation as a moderator of this relationship. Two studies were conducted to test our hypothesized model. In Study 1, repeated measured data collected from 284 (...) Chinese employees in an information technology company demonstrated that benevolent leadership had a lagged effect on LMX. In Study 2, analyses of multisource and lagged data from 391 Chinese employees in 42 research and development teams, and their direct supervisors indicated that benevolent leadership was positively related to supervisor-rated employee creativity via LMX. In addition, the relationship between benevolent leadership and LMX was stronger for employees high in power-distance orientation. Theoretical implications of benevolent leadership’s research and practical contributions concerning promoting creativity in organizations where benevolent leaders prevail are also discussed. (shrink)
Traffic congestion is a common problem in many countries, especially in big cities. At present, China’s urban road traffic accidents occur frequently, the occurrence frequency is high, the accident causes traffic congestion, and accidents cause traffic congestion and vice versa. The occurrence of traffic accidents usually leads to the reduction of road traffic capacity and the formation of traffic bottlenecks, causing the traffic congestion. In this paper, the formation and propagation of traffic congestion are simulated by using the improved medium (...) traffic model, and the control strategy of congestion dissipation is studied. From the point of view of quantitative traffic congestion, the paper provides the fact that the simulation platform of urban traffic integration is constructed, and a feasible data analysis, learning, and parameter calibration method based on RBF neural network is proposed, which is used to determine the corresponding decision support system. The simulation results prove that the control strategy proposed in this paper is effective and feasible. According to the temporal and spatial evolution of the paper, we can see that the network has been improved on the whole. (shrink)
Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization's systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to both researchers and (...) practitioners. This research addresses the question of whether male computer professionals differ from their female counterparts in their self-regulatory efficacy to protect personal information privacy. A total of 103 male and 65 female subjects surveyed in Taiwan responded to a 10-item questionnaire that includes three measures: protection (protecting privacy information), non-distribution (not distributing privacy information to others), and non-acquisition (not acquiring privacy information). The findings show (1) significant gender differences exist in the subjects' overall self-regulatory efficacy for information privacy, and, in particular, (2) that female subjects in this study exhibited a higher level of self-regulatory efficacy than males for the protection and non-acquisition of personal privacy information. The identification of the factorial structure of the self-regulatory efficacy concerning information privacy may contribute to future research directed to examining the links between privacy efficacy and psychological variables, such as ethical attitude, ethical intention, and self-esteem. Studies can also be extended to investigate how different cultural practices of morality and computer use in men and women may shape the different development patterns of privacy self-efficacy. Understanding the different cultural practices may then shed light on the social sources of privacy competence and the appropriate remedies that can be provided to improve the situation. (shrink)
Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization's systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to both researchers and (...) practitioners. This research addresses the question of whether male computer professionals differ from their female counterparts in their self-regulatory efficacy to protect personal information privacy. A total of 103 male and 65 female subjects surveyed in Taiwan responded to a 10-item questionnaire that includes three measures: protection, non-distribution, and non-acquisition. The findings show significant gender differences exist in the subjects' overall self-regulatory efficacy for information privacy, and, in particular, that female subjects in this study exhibited a higher level of self-regulatory efficacy than males for the protection and non-acquisition of personal privacy information. The identification of the factorial structure of the self-regulatory efficacy concerning information privacy may contribute to future research directed to examining the links between privacy efficacy and psychological variables, such as ethical attitude, ethical intention, and self-esteem. Studies can also be extended to investigate how different cultural practices of morality and computer use in men and women may shape the different development patterns of privacy self-efficacy. Understanding the different cultural practices may then shed light on the social sources of privacy competence and the appropriate remedies that can be provided to improve the situation. (shrink)
To many, recent allegations of accounting fraud (or earnings management; EM) at Enron, coupled with similar ones at many other corporations, are a strong indication of a serious decay in business ethics. In academics, this raises the concern between EM and corporate social responsibility (CSR). Since it has neither been documented, nor globally tested whether CSR mitigates or increases the extent of EM, three kinds of EM are studied: earnings smoothing, earnings aggressiveness, and earnings losses and decreases avoidance. The extents (...) to which financial characteristics and institutional variables have an impact on the extent to which companies conduct EM are also tested. Our study investigates whether the CSR-related features of 1,653 corporations in 46 countries had a positive or negative effect on the quality of their publicly released financial information during the 1993-2002 period. There is no question that with a greater commitment to CSR, the extent of earnings smoothing is mitigated, that of earnings losses and decreases avoidance is reduced, but the extent of earnings aggressiveness is increased. (shrink)
BackgroundPlagiarism is common and threatens the integrity of the scientific literature. However, its detection is time consuming and difficult, presenting challenges to editors and publishers who are entrusted with ensuring the integrity of published literature.MethodsIn this study, the extent of plagiarism in manuscripts submitted to a major specialty medical journal was documented. We manually curated submitted manuscripts and deemed an article contained plagiarism if one sentence had 80 % of the words copied from another published paper. Commercial plagiarism detection software (...) was utilized and its use was optimized.ResultsIn 400 consecutively submitted manuscripts, 17 % of submissions contained unacceptable levels of plagiarized material with 82 % of plagiarized manuscripts submitted from countries where English was not an official language. Using the most commonly employed commercial plagiarism detection software, sensitivity and specificity were studied with regard to the generated plagiarism score. The cutoff score maximizing both sensitivity and specificity was 15 %.ConclusionsPlagiarism was a common occurrence among manuscripts submitted for publication to a major American specialty medical journal and most manuscripts with plagiarized material were submitted from countries in which English was not an official language. The use of commercial plagiarism detection software can be optimized by selecting a cutoff score that reflects desired sensitivity and specificity. (shrink)
The Lower Silurian shale-gas formation in the south of Sichuan Basin represents strong VTI feature. Successful characterization of shale-gas formation requires handling the great influence of anisotropy in the seismic wave propagation. Seismic AVO inversion for VTI media using PP-waves only is a difficult issue because more than three parameters need to be estimated and such an inverse problem is highly ill-posed. We have applied an AVO inversion method for VTI media based on a modified approximation of the PP-wave reflection (...) coefficient. This approximation consists of only three model parameters: the acoustic impedance, shear modulus proportional to the anellipticity parameter, and the approximated horizontal P-wave velocity, which can be well-inverted and have great interpretation capability in shale-gas reservoir characterization. A statistical-rock-physics method was then applied to the inverted attributes for quantitative interpretation of shale-gas reservoir. Markov random field is combined with Bayesian rule to improve the continuity and accuracy of the interpretation results. Shales can be successfully discriminated from surrounding formations by using the attribute pair A-C, and the organic-rich gas-bearing shale can be successfully identified by using the attribute pair C-B. Comparison between the prediction results and well logs demonstrates the feasibility of the inversion and quantitative interpretation approaches. (shrink)
The Lower Silurian shale-gas formation in the south of the Sichuan Basin represents a strong transverse isotropy with vertical axis of symmetry feature. Successful characterization of shale-gas formation requires handling the great influence of anisotropy in the seismic wave propagation. Seismic amplitude variation with offset inversion for VTI media using PP-waves only is a difficult issue because more than three parameters need to be estimated and such an inverse problem is highly ill posed. We have applied an AVO inversion method (...) for VTI media based on a modified approximation of the PP-wave reflection coefficient. This approximation consists of only three model parameters: the acoustic impedance, shear modulus proportional to the anellipticity parameter, and the approximated horizontal P-wave velocity, which can be well-inverted and have great interpretation capability in shale-gas reservoir characterization. A statistical-rock-physics method was then applied to the inverted attributes for quantitative interpretation of the shale-gas reservoir. A Markov random field is combined with Bayesian rule to improve the continuity and accuracy of the interpretation results. Shales can be successfully discriminated from surrounding formations by using the attribute pair [Formula: see text]-[Formula: see text], and the organic-rich gas-bearing shale can be successfully identified by using the attribute pair [Formula: see text]-[Formula: see text]. Comparison between the prediction results and well logs demonstrates the feasibility of the inversion and quantitative interpretation approaches. (shrink)
This is an intellectual biography of Feng Youlan [Fung Yu-lan]. It explores Feng’s work and the trajectory of changes in Feng’s philosophical outlook against the social and political contexts of Feng’s life from the 1920s to 1990.
Ths historical legacy inherited by thinkers of the Ch'un-ch'iu period comprised, briefly speaking: a religious world outlook characterized by ancestor worship; the ethical concept of filial piety and brotherliness, which was linked to ancestor worship, or derived therefrom; the concept of a ritual system; the conditions of aristocratic politics and scholar bureaucracy. These were things shaped on the basis of the blood ties in a patriarchal and racial society, and they were passive, from the standpoint of progress, being the obstacle (...) that hindered people from making big strides forward. Next, there were the tendency toward simple materialism and dialectics, which was born from the bowels of religious world outlook; the materialist philosophy of complaint against and hatred and cursing of Heaven; the belief in things and in laws; and Shih Po's doctrine of "Things are produced when matter combines." These were positive things, especially the last three, which emerged at a time when the slave system had begun to collapse, and which formed the premise of their ideological advance. Who among the thinkers of the Ch'un-ch'iu period would inherit and develop these things, what questions would be raised, probed, discussed, or argued on the common basis of their traditional thought, and what specific forms would be used to answer these questions had to be determined by their class stand and by the characteristics of the period in which they lived. (shrink)
The philosophical thought of the Ch'un-ch'iu period was derived and developed from the thought of the Yin dynasty and the Western Chou , there being an inseparable relationship of succession and transformation between them. Thus, in studying the philosophical thought of the Ch'un-ch'iu period, it is necessary to refer back to Yin-Chou thought. The courage and resolve evidenced by an attitude of so-called "cutting off the miscellaneous streams" in order to start with Lao Tzu or Confucius is really a very (...) awkward way of dissecting history. (shrink)
Practically, supply disruption may lead production process to entirely halt or the output to differ in the order size, which makes it more difficult for the retailer to satisfy stochastic market demand. Under the circumstance, the retailer is likely to procure products from two suppliers to effectively alleviate the demand-supply mismatches. Thus, under supply disruption and stochastic demand, this paper develops both backup sourcing and simultaneous sourcing strategies to analyze the retailer’s performance, where backup sourcing includes wholesale price priority and (...) supply reliability priority. Specifically, under WPP, when the selling price is relatively lower, the retailer is suggested to activate the reliable backup supplier after the realization of supply disruption. Under SRP, two scenarios including minor disruption and major disruption can be identified, where the retailer’s order quantity from the reliable supplier under minor disruption scenario is more than that under major. Finally, this paper systematically compares the retailer’s preferences among WPP, SRP, and SS via theoretical results and numerical examples. That is, when the unreliable supplier is more likely to work normally or shortage cost is relatively lower, the retailer prefers SPR regarding the unreliable supplier as backup sourcing due to its lower wholesale price and acceptable supply disruption. Otherwise, the retailer is inclined to WPP regarding the reliable supplier as backup sourcing for ensuring all market demand to be satisfied. In addition, unless the emergency prices of two suppliers are extremely higher, backup sourcing strategies could perform better than simultaneous sourcing strategy. (shrink)
Considering the characteristics of equipment on underground fully mechanized coal mining face, a multirobot system, which takes heavy-duty mobile support robot as the pushing robot and middle trough as the manipulated object, is established. To overcome the problem of unstable communication and potential pressure loss, a memory-pushing fuzzy control strategy is proposed to achieve better practical performance without human-guided operations. The pushing dynamics without communication is derived to proof the convergence of the dynamic system, and the time-based memory-pushing fuzzy model (...) is built for compensating the potential pressure loss. Finally, the proposed control strategy is simulated in virtual environment, which integrates our pushing dynamics, and an industrial experiment is demonstrated as well. Both the simulation and industrial experiments show the efficiency and feasibility of the proposed method. (shrink)
Battery energy storage is the pivotal project of renewable energy systems reform and an effective regulator of energy flow. Parallel battery packs can effectively increase the capacity of battery modules. However, the power loss caused by the uncertainty of parallel battery branch current poses severe challenge to the economy and safety of electric vehicles. Accuracy of battery branch current prediction is needed to improve the parallel connection. This paper proposes a radial basis function neural network model based on the pigeon-inspired (...) optimization method and successfully applies the algorithm to predict the parallel branch current of the battery pack. Numerical results demonstrate the high accuracy of the proposed pigeon-inspired optimized RBF model for parallel battery branch forecasting and provide a useful tool for the prediction of parallel branch currents of battery packs. (shrink)
This paper explores how to explain the applicability of classical mathematics to the physical world in a radically naturalistic and nominalistic philosophy of mathematics. The applicability claim is first formulated as an ordinary scientific assertion about natural regularity in a class of natural phenomena and then turned into a logical problem by some scientific simplification and abstraction. I argue that there are some genuine logical puzzles regarding applicability and no current philosophy of mathematics has resolved these puzzles. Then I introduce (...) a plan for resolving the logical puzzles of applicability. (shrink)
I argue that the distinction between monism and pluralism about well-being should be understood in terms of explanation: the monist affirms (but the pluralist denies) that whenever two particular things are basically good for you, the explanation of their basic goodness for you is the same. I then consider a number of arguments for monism and a number of arguments for pluralism.
The experience machine was traditionally thought to refute hedonism about welfare. In recent years, however, the tide has turned: many philosophers have argued not merely that the experience machine doesn't rule out hedonism, but that it doesn't count against it at all. I argue for a moderate position between those two extremes: although the experience machine doesn't decisively rule out hedonism, it provides us with some reason to reject it. I also argue for a particular way of using the experience (...) machine to argue against hedonism – one that appeals directly to intuitions about the welfare values of experientially identical lives rather than to claims about what we value or claims about whether we would, or should, plug into the machine. The two issues are connected: the conviction that the experience machine leaves hedonism unscathed is partly due to neglect of the best way to use the experience machine. View HTML Send article to KindleTo send this article to your Kindle, first ensure no-reply@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about sending to your Kindle. Find out more about sending to your Kindle. Note you can select to send to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be sent to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply. Find out more about the Kindle Personal Document Service.How to Use the Experience MachineVolume 28, Issue 3EDEN LIN DOI: https://doi.org/10.1017/S0953820815000424Your Kindle email address Please provide your Kindle email.@free.kindle.com@kindle.com Available formats PDF Please select a format to send. By using this service, you agree that you will only keep articles for personal use, and will not openly distribute them via Dropbox, Google Drive or other file sharing services. Please confirm that you accept the terms of use. Cancel Send ×Send article to Dropbox To send this article to your Dropbox account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about sending content to Dropbox. How to Use the Experience MachineVolume 28, Issue 3EDEN LIN DOI: https://doi.org/10.1017/S0953820815000424Available formats PDF Please select a format to send. By using this service, you agree that you will only keep articles for personal use, and will not openly distribute them via Dropbox, Google Drive or other file sharing services. Please confirm that you accept the terms of use. Cancel Send ×Send article to Google Drive To send this article to your Google Drive account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about sending content to Google Drive. How to Use the Experience MachineVolume 28, Issue 3EDEN LIN DOI: https://doi.org/10.1017/S0953820815000424Available formats PDF Please select a format to send. By using this service, you agree that you will only keep articles for personal use, and will not openly distribute them via Dropbox, Google Drive or other file sharing services. Please confirm that you accept the terms of use. Cancel Send ×Export citation Request permission. (shrink)
According to the experience requirement on well-being, differences in subjects’ levels of welfare or well-being require differences in the phenomenology of their experiences. I explain why the two existing arguments for this requirement are not successful. Then, I introduce a more promising argument for it: that unless we accept the requirement, we cannot plausibly explain why only sentient beings are welfare subjects. I argue, however, that because the right kind of theory of well-being can plausibly account for that apparent fact (...) about welfare subjects even if the requirement is false, this argument does not succeed. I tentatively conclude that no compelling case can be made for the requirement. (shrink)
Carbonate reservoirs in the S area of the Tarim Basin are ultra-deep hydrocarbon resources, with low porosity, complex fracture systems and dissolved pores. Micro-fracturing is a key factor of reservoir connectivity and storage space. We have performed measurements on limestone samples, under different confining pressures, and used the self-consistent approximation model and Biot-Rayleigh theory of double-porosity to study the microfractures. We compute the fluid properties as a function of temperature and pressure. Using the dependence of seismic Q on the microfractures, (...) a multi-scale 3-dimensional rock-physics template is built, based on attenuation, P-wave impedance and phase velocity ratio. We estimate the ultrasonic and seismic attenuation with the spectral-ratio method and the improved frequency-shift method, respectively. Then, calibration of the RPTs is performed at ultrasonic and seismic frequencies. We use the RPTs to estimate the total and microfracture porosities. The results indicate that the total porosity is low and the microfracture porosity is relatively high, which is consistent with the well-log data and actual oil production reports. This work presents a method for the identification of deep carbonate reservoirs by using microfracture porosity estimated from the 3-dimensional rock-physics template, which could be exploited in the oil and gas exploration. (shrink)
Carbonate reservoirs in the S area of the Tarim Basin are ultradeep hydrocarbon resources, with low porosity, complex fracture systems, and dissolved pores. Microfracturing is a key factor of reservoir connectivity and storage space. We have performed measurements on limestone samples, under different confining pressures, and we used the self-consistent approximation model and the Biot-Rayleigh theory of double porosity to study the microfractures. We have computed the fluid properties as a function of temperature and pressure. Using the dependence of seismic (...) [Formula: see text] on the microfractures, a multiscale 3D rock-physics template is built, based on the attenuation, P-wave impedance, and phase velocity ratio. We estimate the ultrasonic and seismic attenuation with the spectral-ratio method and the improved frequency-shift method, respectively. Then, calibration of the RPTs is performed at ultrasonic and seismic frequencies. We use the RPTs to estimate the total and microfracture porosities. The results indicate that the total porosity is low and the microfracture porosity is relatively high, which is consistent with the well log data and actual oil production reports. This work presents a method for identification of deep carbonate reservoirs by using the microfracture porosity estimated from the 3D RPT, which could be exploited in oil and gas exploration. (shrink)
This essay argues that the idea of name-rectification ( zheng ming 正名) in the Xunzi can be properly reconstructed as revealing a normative pragmatic semantic theme that linguistic contents embody, and are embedded in, the normative, justificatory network, or pattern, of dao li 道理 (proper routes/patterns of norm) which, in turn, is constituted and manifested by social inferential justificatory practices of bian shuo 辯說 (dialectical justification/explanation).
The dissertation studies the mathematical strength of strict constructivism, a finitistic fragment of Bishop's constructivism, and explores its implications in the philosophy of mathematics. ;It consists of two chapters and four appendixes. Chapter 1 presents strict constructivism, shows that it is within the spirit of finitism, and explains how to represent sets, functions and elementary calculus in strict constructivism. Appendix A proves that the essentials of Bishop and Bridges' book Constructive Analysis can be developed within strict constructivism. Appendix B further (...) develops, within strict constructivism, the essentials of the functional analysis applied in quantum mechanics, including the spectral theorem, Stone's theorem, and the self-adjointness of some common quantum mechanical operators. Some comparisons with other related work, in particular, a comparison with S. Simpson's partial realization of Hilbert's program, and a discussion of the relevance of M. B. Pour-El and J. I. Richards' negative results in recursive analysis are given in Appendix C. ;Chapter 2 explores the possible philosophical implications of these technical results. It first suggests a fictionalistic account for the ontology of pure mathematics. This leaves a puzzle about how truths about fictional mathematical entities are applicable to science. The chapter then explains that for those applications of mathematics that can be reduced to applications of strict constructivism, fictional entities can be eliminated in the applications and the puzzle of applicability can be resolved. Therefore, if strict constructivism were essentially sufficient for all scientific applications, the applicability of mathematics of mathematics in science would be accountable. The chapter then argues that the reduction of mathematics to strict constructivism also reduces the epistemological question about mathematics to that about elementary arithmetic. The dissertation ends with a suggestion that a proper epistemological basis for arithmetic is perhaps a mixture of Mill's empiricism and the Kantian views. (shrink)
Subjectivism about welfare is the view that something is basically good for you if and only if, and to the extent that, you have the right kind of favorable attitude toward it under the right conditions. I make a presumptive case for the falsity of subjectivism by arguing against nearly every extant version of the view. My arguments share a common theme: theories of welfare should be tested for what they imply about newborn infants. Even if a theory is intended (...) to apply only to adults, the fact that it is false of newborns may give us sufficient reason to reject it. (shrink)
This article attempts to motivate a new approach to anti-realism (or nominalism) in the philosophy of mathematics. I will explore the strongest challenges to anti-realism, based on sympathetic interpretations of our intuitions that appear to support realism. I will argue that the current anti-realistic philosophies have not yet met these challenges, and that is why they cannot convince realists. Then, I will introduce a research project for a new, truly naturalistic, and completely scientific approach to philosophy of mathematics. It belongs (...) to anti-realism, but can meet those challenges and can perhaps convince some realists, at least those who are also naturalists. (shrink)
It is commonly thought that subjectivists about welfare must claim that the favorable attitudes whose satisfaction is relevant to your well-being are those that you would have in idealized conditions (e.g. ones in which you are fully informed and rational). I argue that this is false. I introduce a non-idealizing subjectivist view, Same World Subjectivism, that accommodates the two main rationales for idealizing: those given by Peter Railton and David Sobel. I also explain why a recent argument from Dale Dorsey (...) fails to show that subjectivists must idealize. Because Same World Subjectivism is a plausible non-idealizing view, subjectivists about welfare needn't idealize. (shrink)
Every episodic memory entails a sense of identity, which allows us to mentally travel through time. There is a special way by which the subject who is remembering comes into contact with the self that is embedded in the episodic simulation of memory: we can directly and robustly experience the protagonist in memory as ourselves. This paper explores what constitutes such experience in memory. On the face of it, the issue may seem trivial: of course, we are able to entertain (...) a sense of identity—the experience of our recollection structurally resembles our perception of the original event. However, given the phenomenon of observer memory, in which our visual perspective is decoupled from our embodied dimension, it is unclear whether it is the observing or the embodied one that is identified. This phenomenon is important not only in illustrating the complexity of identification but also in assessing how best to address it. In this paper, the issue is analyzed through concepts introduced from the literature on bodily self-consciousness. The potential approaches to addressing the issue of identification are examined, including the inheritance view, according to which the identification relies on the inheritance of mnemonic content from the original experience. I propose and argue for the self-simulation view, which suggests that what results in the experience of “I am this” in memory is the observing and the embodied dimensions as well as the relation between them, which enable different ways of projecting oneself into an episodic simulation. (shrink)
On phenomenological theories of pleasure, what makes an experience a pleasure is the way it feels. On attitudinal theories, what makes an experience a pleasure is its relationship to the favorable attitudes of the subject who is having it. I advance the debate between these theories in two ways. First, I argue that the main objection to phenomenological theories, the heterogeneity problem, is not compelling. While others have argued for this before, I identify an especially serious version of this problem (...) that resists existing solutions, and I explain why even this version of the problem does not undermine phenomenological theories. Second, I argue that a grand reconciliation can be effected between the two types of theory: it can be true both that pleasures are pleasures in virtue of the way they feel and that they are pleasures in virtue of how they are related to their subjects’ favorable attitudes, so long as the attitudes that are constitutively related to pleasures are ones that feel a certain way. Hybrid views of this sort have significant advantages over pure attitudinal or phenomenological views. (shrink)
Invariabilism is the view that the same theory of welfare is true of every welfare subject. Variabilism is the view that invariabilism is false. In light of how many welfare subjects there are and how greatly they differ in their natures and capacities, it is natural to suppose that variabilism is true. I argue that these considerations do not support variabilism and, indeed, that we should accept invariabilism. This has important implications: it eliminates many of the going theories of welfare (...) while making some of the remaining ones more attractive. (shrink)
Many believe that normative reasons for action are necessarily connected with the promotion of certain states of affairs: on Humean views, for example, there is a reason for you to do something if and only if it would promote the object of one of your desires. But although promotion is widely invoked in discussions of reasons, its nature is a matter of controversy. I propose a simple account: to promote a state of affairs is to make it more likely to (...) obtain than it previously was. I argue that this view has been unfairly neglected, that it avoids serious problems faced by many other views, and that it is a contender for the correct theory of promotion. (shrink)
A subjective list theory of well-being is one that accepts both pluralism (the view that there is more than one basic good) and subjectivism (the view, roughly, that every basic good involves our favourable attitudes). Such theories have been neglected in discussions of welfare. I argue that this is a mistake. I introduce a subjective list theory called disjunctive desire satisfactionism, and I argue that it is superior to two prominent monistic subjectivist views: desire satisfactionism and subjective desire satisfactionism. In (...) the course of making this argument, I introduce a problem for desire satisfactionism: it cannot accommodate the fact that whenever someone experiences an attitudinal pleasure, his welfare is (other things equal) higher during the pleasure. Finally, I argue that any subjectivist about welfare should find disjunctive desire satisfactionism highly attractive. (shrink)