75,676 research outputs found

    The Honor of Private Law

    Get PDF
    While combativeness is central to how our culture both experiences and conceptualizes litigation, we generally notice it only as a regrettable cost. This Article offers a less squeamish vision, one that sees in the struggle of people suing one another a morally valuable activity: the vindication of insulted honor. This claim is offered as a normative defense of a civil recourse approach to private law. According to civil recourse theorists, tort and contract law should be seen as empowering plaintiffs to act against defendants, rather than as economically optimal incentives or as a means of enforcing duties of corrective justice. The justification of civil recourse must answer three questions. First, under what circumstances-if any-is one justified in acting or retaliating against a wrongdoer? Second, under what circumstances does the state have reasons for providing a mechanism for such action? Finally, how are the answers to these questions related to the current structure of our private law? This Article offers the vindication of wronged honor as an answer to these three questions. First, I establish the historical connection between honor and litigation by looking at the quintessential honor practice, dueling. Then I argue that the vindication of honor is normatively attractive. I do this by divorcing the idea of honor from unsavory associations with violence and aristocracy, showing how it can be made congruent with certain core modern concerns. In particular, when insulted parties act against wrongdoers, they reestablish the position of respect and equality that the insult upset. I then show how having the state provide plaintiffs with a means of vindicating their honor avoids making the political community complicit in the humiliation of its citizens and provides those citizens with a means of exercising their agency in ways that provide a foundation for self-respect. Finally, I show those areas of private law where honor operates most powerfully as a justification for providing recourse through the courts, while acknowledging that it operates less powerfully as a reason in other areas

    Civil Recourse, Not Corrective Justice

    Get PDF

    Consciousness as Recursive, Spatiotemporal Self-Location

    Get PDF
    At the phenomenal level, consciousness arises in a consistently coherent fashion as a singular, unified field of recursive self-awareness (subjectivity) with explicitly orientational characteristics—that of a subject located both spatially and temporally in an egocentrically-extended domain. Understanding these twin elements of consciousness begins with the recognition that ultimately (and most primitively), cognitive systems serve the biological self-regulatory regime in which they subsist. The psychological structures supporting self-located subjectivity involve an evolutionary elaboration of the two basic elements necessary for extending self-regulation into behavioral interaction with the environment: an orientative reference frame which consistently structures ongoing interaction in terms of controllable spatiotemporal parameters, and processing architecture that relates behavior to homeostatic needs via feedback. Over time, constant evolutionary pressures for energy efficiency have encouraged the emergence of anticipative feedforward processing mechanisms, and the elaboration, at the apex of the sensorimotor processing hierarchy, of self-activating, highly attenuated recursively-feedforward circuitry processing the basic orientational schema independent of external action output. As the primary reference frame of active waking cognition, this recursive self-locational schema processing generates a zone of subjective self-awareness in terms of which it feels like something to be oneself here and now. This is consciousness-as-subjectivity

    An evolutionary complex systems decision-support tool for the management of operations

    Get PDF
    Purpose - The purpose of this is to add both to the development of complex systems thinking in the subject area of operations and production management and to the limited number of applications of computational models and simulations from the science of complex systems. The latter potentially offer helpful decision-support tools for operations and production managers. Design/methodology/approach - A mechanical engineering firm was used as a case study where a combined qualitative and quantitative methodological approach was employed to extract the required data from four senior managers. Company performance measures as well as firm technologies, practices and policies, and their relation and interaction with one another, were elicited. The data were subjected to an evolutionary complex systems (ECS) model resulting in a series of simulations. Findings - The findings highlighted the effects of the diversity in management decision making on the firm's evolutionary trajectory. The CEO appeared to have the most balanced view of the firm, closely followed by the marketing and research and development managers. The manufacturing manager's responses led to the most extreme evolutionary trajectory where the integrity of the entire firm came into question particularly when considering how employees were utilised. Research limitations/implications - By drawing directly from the opinions and views of managers, rather than from logical "if-then" rules and averaged mathematical representations of agents that characterise agent-based and other self-organisational models, this work builds on previous applications by capturing a micro-level description of diversity that has been problematical both in theory and application. Practical implications - This approach can be used as a decision-support tool for operations and other managers providing a forum with which to explore: the strengths, weaknesses and consequences of different decision-making capacities within the firm; the introduction of new manufacturing technologies, practices and policies; and the different evolutionary trajectories that a firm can take. Originality/value - With the inclusion of "micro-diversity", ECS modelling moves beyond the self-organisational models that populate the literature but has not as yet produced a great many practical simulation results. This work is a step in that direction

    Making Reparations Possible: Theorizing Reparative Justice

    Get PDF
    Roll 125a. Quonsets coming down. Image 6 of 26. (11 April, 1954) [PHO 1.125a.6]The Boleslaus Lukaszewski (Father Luke) Photographs contain more than 28,000 images of Saint Louis University people, activities, and events between 1951 and 1970. The photographs were taken by Boleslaus Lukaszewski (Father Luke), a Jesuit priest and member of the University's Philosophy Department faculty

    Making Reparations Possible: Theorizing Reparative Justice

    Get PDF

    The Youth Correction Authority Act

    Get PDF

    The Youth Correction Authority Act

    Get PDF
    Since wireless communication has become a standard feature in the daily life, smartphones and tablets among other things are integrated with the Bluetooth technology. While in some parts of the day wireless communication can be used for searching the internet and share information on social networks without the need of having a secure connection, there are some other parts where the security might become of high importance. When the technology gets integrated in companies the security problem becomes more evident. This is because when the radio signals spread in the medium they can be accessed by anyone that is in reach in the network and the information that was sent may not be intended for everyone. To secure the network from unintended users becomes important when handling fragile information, which companies may deal with daily.  This paper gives an introduction on which security features and techniques that already exist in some personal area networks. From this it has been clear that a security feature could be implemented on the baseband layer of Bluetooth to increase the secrecy during the transmission since at the moment security is only implemented on higher layers using encryption algorithms.  This paper proposes a conceptual idea of improving the secrecy in the network by using a wiretap code that is implemented before the error-correction coding in the Bluetooth's baseband. By disabling the ARQ scheme in Bluetooth one can modulate the channel as a Packet Erasure Channel that will lose packet with a certain probability. By using a nested code structure, the message can then be securely sent by using a higher rate than what the eavesdropper can recover due to the amount of errors the received signal will have. The performance of the concept is evaluated with the secrecy throughput, secrecy outage and the leakage

    Turning to Animals Between Love and Law

    Get PDF
    Publisher has granted permission for the published version of this article to be archived. Publisher's website: http://www.lwbooks.co.ukAs an alternative to Utilitarianism, animal ethics turned to the Continental philosophies of Levinas and Derrida that welcome and revere Otherness. While Utilitarianism relies on a ‘closed’ system of ethical calculations, the Levinasian model remains open-ended. This essay argues for a revised approach to animal ethics that combines Levinasian immeasurability, what Matthew Calarco called ‘ethical agnosticism’, with a closed approach that sees ethics as issuing from particular modes of practice. Highlighting some of the problems inherent in the Levinasian ethics of love as well as Agamben’s biopolitical critique of law, I propose a corrective, ‘between love and law’, that avoids predetermining the limits of moral consideration yet insists on the social and normative dimensions of ethical responsiveness. I take the practice of veganism - broadly conceived beyond the strictly dietary - as the heart of animal ethics and consider some of the philosophical and theological dimensions of veganism as neither naïve nor as utopian but on the contrary, as a worldly mode of engagement that acknowledges the realities of violence
    corecore