70 research outputs found

    The semantics of untrustworthiness

    Get PDF
    We offer a formal treatment of the semantics of both complete and incomplete mistrustful or distrustful information transmissions. The semantics of such relations is analysed in view of rules that define the behaviour of a receiving agent. We justify this approach in view of human agent communications and secure system design. We further specify some properties of such relations

    Vernacular Soliloquy, Theatrical Gesture, and Embodied Consciousness in The Marrow of Tradition

    Get PDF
    Charles Chesnutt’s Marrow of Tradition (1901) is overwhelmingly understood as an historical novel. Critics have again and again focused on its journalistic historicity; its ambivalent racial politics; its attitudes towards assimilation, separatism, vengeance, and resistance; and Chesnutt’s alleged biographical identification with various characters. This generalized preoccupation with the explicitly political or historical contours of the novel frequently precludes closer scrutiny of Chesnutt’s formal literary strategies. This paper shirks that tendency by considering The Marrow of Tradition not just as an historical novel, but also as a novel of consciousness. Viewing the novel from the perspective of its representation of consciousness both reframes its historiographical bearing and opens up new ways to understand Chesnutt’s fiction and nineteenth-century African American literature. It argues that the location of black consciousness in the novel is the soliloquy, and demonstrates that the soliloquy should be understood as a form of “embodied consciousness”: a narrative mode endowed with the expressivity of theatrical gesture. It further examines these performative gestures in relation to additional patterns in the novel: first, the destructive circulation of written, material texts; and second, recurring images of corporeality and physical breakdown wherein one’s capacity for speech is endangered. As they are invulnerable to such formal compromise and breakdown, Chesnutt’s soliloquies together produce a counter-archive of vernacular memory and reveal how dramatic form functions in the novel more broadly

    Spreading the Credit: Virtue Reliabilism and Weak Epistemic Anti-Individualism

    Get PDF
    Mainstream epistemologists have recently made a few isolated attempts to demonstrate the particular ways, in which specific types of knowledge are partly social. Two promising cases in point are Lackey’s (Learning from words: testimony as a source of knowledge. Oxford University Press, Oxford, 2008) dualism in the epistemology of testimony and Goldberg’s (Relying on others: an essay in epistemology. Oxford University Press, Oxford, 2010) process reliabilist treatment of testimonial and coverage-support justification. What seems to be missing from the literature, however, is a general approach to knowledge that could reveal the partly social nature of the latter anytime this may be the case. Indicatively, even though Lackey (Synthese 158(3):345–361, 2007) has recently launched an attack against the Credit Account of Knowledge (CAK) on the basis of testimony, she has not classified her view of testimonial knowledge into any of the alternative, general approaches to knowledge. Similarly, even if Goldberg’s attempt to provide a process reliabilist explanation of the social nature of testimonial knowledge is deemed satisfactory, his attempt to do the same in the case of coverage-support justification does not deliver the requisite result. This paper demonstrates that CAK can in fact provide, pace Lackey’s renunciation of the view, a promising account of the social nature of both testimonial and coverage-supported knowledge. Additionally, however, it can display further explanatory power by also revealing the social nature of knowledge produced on the basis of epistemic artifacts. Despite their disparities, all these types of knowledge count as partly social in nature, because in all these cases, according to CAK, the epistemic credit for the individual agent’s true belief must spread between the individual agent and certain parts of her epistemic community. Accordingly, CAK is a promising candidate for providing a unified approach to several and, perhaps all possible, instances of what we may call ‘weak epistemic anti-individualism’ within mainstream epistemology: i.e., the claim that the nature of knowledge can occasionally be both social and individual at the same time

    Crowdsourced science: sociotechnical epistemology in the e-research paradigm

    Get PDF
    Recent years have seen a surge in online collaboration between experts and amateurs on scientific research. In this article, we analyse the epistemological implications of these crowdsourced projects, with a focus on Zooniverse, the world’s largest citizen science web portal. We use quantitative methods to evaluate the platform’s success in producing large volumes of observation statements and high impact scientific discoveries relative to more conventional means of data processing. Through empirical evidence, Bayesian reasoning, and conceptual analysis, we show how information and communication technologies enhance the reliability, scalability, and connectivity of crowdsourced e-research, giving online citizen science projects powerful epistemic advantages over more traditional modes of scientific investigation. These results highlight the essential role played by technologically mediated social interaction in contemporary knowledge production. We conclude by calling for an explicitly sociotechnical turn in the philosophy of science that combines insights from statistics and logic to analyse the latest developments in scientific research

    stradewari – Lernen im Verbund

    No full text

    The Ideal of Autonomy and Its Misuse

    No full text

    Living in an Impossible World : Real-izing the Consequences of Intransitive Trust

    Get PDF
    copyright The Author(s) 2013. This article is published with open access at Springerlink.comMany accounts of online trust are based upon mechanisms for building reputation. Trust is portrayed as desirable, and handing off trust is easier if trust is modelled to be transitive. But in the analysis of cyber-security protocols, trust is usually used as a substitute for certain knowledge: it follows that if there is no residual risk, then there is no need for trust. On this grimmer understanding, the less that users are required to trust, the better. Involuntary transitivity of trust becomes corrosive, because it prevents participants from having control—or even knowledge—of the risks to which their trust assumptions expose them. In this paper, we take the stance that controlling the transitivity of trust requires us to recognise trust as a non-referentially transparent modality, similar to but significantly weaker than the epistemic modalities, and to accept the corollary that imaginary (indeed—even impossible) threats can have real consequences that adversely affect online security. An apparently paradoxical outcome is that the desire of principals to keep their trust assumptions private can actually assist the design of systems to satisfy multiple security agendas. However, this approach requires agents to have the capability to predicate accurately about states of affairs that are logically inconsistent with their beliefs, and consequently, designing systems in this way becomes more akin to diplomacy than engineeringPeer reviewedFinal Published versio
    • 

    corecore