首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Supernatural Miracles and Religious Inclusiveness   总被引:1,自引:1,他引:0  
Morgan Luck 《Sophia》2007,46(3):287-293
In this paper I shall assess Clarke’s assertion that all definitions of miracles that purport to satisfy the criterion of religious inclusiveness should substitute the term ‘supernatural’ for ‘non-natural’. In addition, I shall attempt to strengthen Clarke’s conception of the supernatural by offering an analysis of what it means for something to be ‘above’ nature. Lastly, I shall offer a new argument as to why Clarke’s intention-based definition of miracles is necessarily less religiously inclusive than Mumford’s causation-based definition.
Morgan LuckEmail:
  相似文献   

2.
This paper develops a Kantian account of the moral assessment of institutions. The problem I address is this: while a deontological theory may find that some legal institutions are required by justice, it is not obvious how such a theory can assess institutions not strictly required (or prohibited) by justice. As a starting-point, I consider intuitions that in some cases it is desirable to attribute non-consequentialist moral value to institutions not required by justice. I will argue that neither consequentialist nor virtue-ethical accounts account for these intuitions, suggesting that a distinctive deontological account is needed. The account I give is drawn from Kant’s Metaphysics of Morals; I distinguish it from Kantian views of institutions developed by Barbara Herman and Onora O’Neill. Throughout, I use marriage as an example.
Elizabeth BrakeEmail:
  相似文献   

3.
Although Kant is often interpreted as an Enlightenment Deist, Kant scholars are increasingly recognizing aspects of his philosophy that are more amenable to theism. If Kant regarded himself as a theist, what kind of theist was he? The theological approach that best fits Kant’s model of God is panentheism, whereby God is viewed as a living being pervading the entire natural world, present ‘in’ every part of nature, yet going beyond the physical world. The purpose of Kant’s restrictions on our knowledge of God is not to cast doubt on God’s existence, but to preserve a mystery in God’s reality so that God is always more than the world as we experience it. The same God who is theoretically unknowable is also an aspect of the moral substratum of the physical world. Kant’s moral Trinity (God as righteous Lawgiver, benevolent Ruler, and just Judge) permeates everything, as the ultimate unifier of reason and nature. This Paper was delivered during the 2007 APA Pacific Mini-Conference on Models of God, together with papers published in Philosophia 35:3–4.  相似文献   

4.
From time to time, the idea that enduring things can change has been challenged. The latest challenge has come in the form of what David Lewis has called a “decisive objection”, which claims to deduce a contradiction from the idea that enduring things change with respect to their temporary intrinsics, when that idea is combined with eternalism. It is my aim in this paper to explain why I think that no argument has yet appeared that deduces a contradiction from a combination of eternalism and the idea that enduring things change with respect to their temporary intrinsics, except ones that do so by committing scope fallacies.
Lawrence B. LombardEmail:
  相似文献   

5.
Anonymous speech plays a fundamental role in America’s political history. However, that long tradition of anonymous communications faces an image problem in today’s age of spam, computer viruses, spyware, denial-of-service attacks on websites, and identity theft. The criminals and hackers who perpetrate these insults on the commercial Internet are, for the most part, anonymous; we simply do not know the identities of these bad guys. Yet, the promise of anonymous communications is vital to the preservation of political liberty across the globe. Therefore, how should we regard anonymity in a digital age? And how should we strike the right balance between security and anonymity online? To begin, we should not consider the outlawing of anonymous communications as the answer to today’s cybersecurity threats. Commercial sector “regulation” of anonymity, so to speak, can play a significant role in combating these problems. Increasingly, online authentication has become important to both personal security and to cybersecurity in general. Some recent proposals toward bolstering security have included greater authentication of the source of emails to deal with spam and the requirement that those who conduct transactions online reveal their identities – seeming violations of online culture. Policymakers also want a say in the matter, and as the process unfolds, they might feel increasingly tempted to intervene whenever issues impacting privacy and authentication emerge in debates over telecommunications, intellectual property, biometrics, cybersecurity, and more. Regardless, government should not strip us of our anonymity online. Cybersecurity concerns may instead call for the marketplace – not regulators – to deal with the fact that many threats stem from that very lack of authentication. The inclusion of greater authentication standards into online services by private vendors will lead to their working in concert in unprecedented ways that may draw attention from regulatory and antitrust authorities. But these private, experimental efforts have no implications for political liberty – nor are they anticompetitive. Private solutions are the only real hope we have for decreasing cybersecurity threats, given that previous government efforts to regulate the Internet – for example, outlawing spam in 2004 – have not lived up to expectations. Political anonymity and commercial anonymity are not the same thing, and the distinction requires better appreciation. Over the coming tumultuous period of dealing with online threats, policymakers should allow the experimentation necessary to cope with today’s lack of online authentication to proceed with minimal interference.  相似文献   

6.
The Muslimwoman     
In the 6 years that have elapsed since the events of 9/11 Muslims have become the Other and veiled Muslim women have become their visible representatives. Standing in for their communities, they have attracted international media attention. So intertwined are gender and religion that they have become one. I have coined the term the Muslimwoman to describe this erasure of diversity. Some women reject this label. Others use it to empower themselves and even to subvert the identification. In the process they are constructing a new kind of cosmopolitanism. This essay asks how women can derive agency from an ascribed identity that posits their invisibility and silence.
miriam cookeEmail:
  相似文献   

7.
Privacy is one good among other goods and should be weighed as such. The relationship between technology and privacy is best viewed as an arms race between advancements that diminish privacy and those that better protect it, rather than the semi-Luddite view which sees technology as one-sided development enabling those who seek to invade privacy to overrun those who seek to protect it. The merits or defects of particular technologies are not inherent to the technologies, but rather, depend on how they are used and above all, on how closely their use is monitored and accounted for by the parties involved. In order to reassure the public and to ensure accountability and oversight, a civilian review board should be created to monitor the government’s use of surveillance and related technologies. Proper accountability requires multiple layers of oversight, and should not be left solely in the hands of the government.
Amitai EtzioniEmail:
  相似文献   

8.
The mutual best friendships of shy/withdrawn and control children were examined for prevalence, stability, best friend's characteristics, and friendship quality. Using peer nominations of shy/socially withdrawn and aggressive behaviors, two groups of children were identified from a normative sample of fifth-grade children: shy/withdrawn (n = 169) and control (nonaggressive/nonwithdrawn; n = 163). Friendship nominations, teacher reports, and friendship quality data were gathered. Results revealed that shy/withdrawn children were as likely as control children to have mutual stable best friendships. Withdrawn children's friends were more withdrawn and victimized than were the control children's best friends; further, similarities in social withdrawal and peer victimization were revealed for withdrawn children and their friends. Withdrawn children and their friends reported lower friendship quality than did control children. Results highlight the importance of both quantitative and qualitative measures of friendship when considering relationships as risk and/or protective factors.  相似文献   

9.
The concern of this work is how knowledge based on design experience can be developed, disseminated, articulated, and acquired. We propose the notion of inspirational patterns, or i-patterns, which refers to abstractions of core ideas and essential elements from a class of coherent examples, pointing to promising regions in the design space. Most current work on patterns concentrates on proven solutions to recurring problems; i-patterns, on the other hand, are oriented toward the innovative and inspirational. The design domain of interest to us is interaction design, which can be roughly defined as design with digital materials. More specifically, we focus on the intersection of tangible interfaces and social computing that is called embodied interaction. The paper presents nine i-patterns for embodied interaction, including “Virtual information is tied to positions in the material world” and “Heterogeneous virtual information fuses into a few sensory parameters.” Published in Proc. Nordes 2005, submitted for republication in Knowledge, Technology and Policy.  相似文献   

10.
Greg Janzen 《Philosophia》2008,36(3):355-366
According to reductive intentionalism, the phenomenal character of a conscious experience is constituted by the experience's intentional (or representational) content. In this article I attempt to show that a phenomenon in visual perception called change blindness poses a problem for this doctrine. Specifically, I argue that phenomenal character is not sensitive, as it should be if reductive intentionalism is correct, to fine-grained variations in content. The standard anti-intentionalist strategy is to adduce putative cases in which phenomenal character varies despite sameness of content. This paper explores an alternative antiintentionalist tack, arguing, by way of a specific example involving change blindness, that content can vary despite sameness of phenomenal character.
Greg JanzenEmail:
  相似文献   

11.
This paper examines some of the illustrative features of doing participant observation research with Muslims both in the field and back “home.” It is based on my experiences of conducting research in East Java, Indonesia in the classicalist Islamic boarding schools. My religious subjectivity was important to my research in a number of ways including: (1) the ways in which the community tried to define my subjectivity; (2) the nature of my personal religious subjectivity; and (3) academic interpretations of my role and my subject position vis-à-vis Islam and the profession of anthropology.
Ronald Lukens-BullEmail:
  相似文献   

12.
Two experiments demonstrated that positive affect fosters intrinsic motivation, as reflected by choice of activity in a free-choice situation and by rated amount of enjoyment of a novel and challenging task, but also promotes responsible work behavior in a situation where the work needs to be done. Where there was work that needed to be done, people in the positive-affect condition reduced their time on the enjoyable task, successfully completed the work task, but also spent time on the more enjoyable task. These results indicate that positive affect does foster intrinsic motivation, and enjoyment and performance of enjoyable tasks, but not at the cost of responsible work behavior on an uninteresting task that needs to be done. Implications for the relationship between positive affect and such aspects of self-regulation as forward-looking thinking and self-control are discussed.
Alice M. IsenEmail:
  相似文献   

13.
Philosophers have harbored doubts about the possibility of moral expertise since Plato. I argue that irrespective of whether moral experts exist, identifying who those experts are is insurmountable because of the credentials problem: Moral experts have no need to seek out others’ moral expertise, but moral non-experts lack sufficient knowledge to determine whether the advice provided by a putative moral expert in response to complex moral situations is correct and hence whether an individual is a bone fide expert. Traditional accounts of moral expertise require that moral experts give reliably correct moral advice supported by adequate justification, an account which, I argue, is too lean in allowing for the possibility of a moral expert who is motivationally indifferent to her own moral judgments and advice. Yet even if the proposition that a moral expert is an individual who provides reliably correct moral advice supported by adequate justification and is necessarily motivated by that advice exhausts the necessary and sufficient conditions for moral expertise, this proposition cannot function as an applicable criterion for non-experts to use in appraising would-be experts’ claims to expertise. The credentials problem thus remains unanswered.
Michael CholbiEmail:
  相似文献   

14.
An ethnically diverse sample of 6th-grade students completed peer nomination procedures that were used to create subgroups of students with reputations as victims, aggressors, aggressive victims, and socially adjusted (neither aggressive nor victimized). Self-report data on psychological adjustment, attributions for peer harassment, and perceived school climate were gathered. In addition, homeroom teachers rated participating students on academic engagement and students' grades were collected from school records. Victims reported the most negative self-views, aggressors enjoyed the most positive self-views, and aggressive victims fell between these two groups, although their psychological profile more closely resembled that of victims. However, all three subgroups encountered more school adjustment problems when compared to their socially adjusted classmates. Different pathways to school adjustment problems for aggressors and victims were examined. For victims, characterological self-blame for victimization and psychological maladjustment were the key mediators, whereas for aggressors, the significant pathway was mainly through perceived unfairness of school rules. Analyses by ethnicity revealed that African American boys were most likely to be perceived as aggressive and as aggressive victims and they were doing most poorly in school. Implications for intervention with subgroups of problem behavior youth and the particular vulnerabilities of African American adolescents were discussed.  相似文献   

15.
Academic discussion of pornography is generally restricted to issues arising from the depiction of adults. I argue that child-pornography is a more complex matter, and that generally accepted moral judgements concerning pornography in general have to be revised when children are involved. I look at the question of harm to the children involved, the consumers, and society in general, at the question of blame, and at the possibility of a morally acceptable form of child-pornography. My approach involves an objectivist meta-ethics and a utilitarian view of practical ethics, and I bring out the advantages of these theories to the consideration of moral issues such as this one.
Peter J. KingEmail:
  相似文献   

16.
This study examined patterns of between-generation continuity in substance use from generation 1 (G1) parents to generation 2 (G2) adolescents and from G2 adult substance use and G1 substance use to generation 3 (G3) problem behavior in childhood. Structural equation modeling of prospective, longitudinal data from 808 participants, their parents, and their children showed low levels of G1 to G2 cross-generational continuity in the general tendency to use drugs. This effect was fully mediated by G2 early adolescent behavior problems. Drug-specific residual effects were observed across generations for cigarette smoking. Once established in adolescence, substance use in G2 showed stability over time. G2 substance use at age 27 significantly predicted G3 problem behavior. G1 substance use also was related to G3 problem behavior indirectly. These findings highlight the importance of interrupting intergenerational cycles of substance use and problem behavior.  相似文献   

17.
This article considers the validity and strength of Richard Rorty’s pragmatist theory of interpretation in the light of two ethical issues related to literature and interpretation. Rorty’s theory is rejected on two grounds. First, it is argued that his unrestrained account of interpretation is incompatible with the distinctive moral concerns that have been seen to restrict the scope and nature of valid approaches to artworks. The second part of the paper claims that there is no indispensable relationship between supporting Rorty’s pragmatist theory of interpretation and the important place that is attached to literature in the liberal society outlined by him. A reading of Donald Davidson’s texts on literary language and interpretation implies that an intentionalist theory of interpretation can accommodate those features that Rorty values in literature as well.
Kalle PuolakkaEmail:
  相似文献   

18.
The current study examined whether excessive reassurance seeking serves as a vulnerability factor to depression in a sample of high-risk youth using a multiwave longitudinal design. At Time 1, 140 children (aged 6-14) of affectively disordered parents completed measures assessing reassurance seeking and depressive symptoms. In addition, every 6 weeks during the following year, children and parents completed measures assessing depressive symptoms and the occurrence of hassles. In line with hypotheses, the results of contemporaneous analyses indicated that children with high levels of reassurance seeking reported greater elevations in depressive symptoms following elevations in either hassles or parental depressive symptoms than children with low levels. At the same time, the results of time-lagged analyses indicated that both these relationships were moderated by age with excessive reassurance seeking being associated with greater elevations in depressive symptoms following elevations in either hassles or parental depressive symptoms in older but not younger children.  相似文献   

19.
Comorbidity between antisocial behavior and depression in adolescence is widely recognized. This paper examines whether links with depressed mood differ among three subtypes of antisocial behavior: oppositionality, physical aggression and delinquency. In addition we examine two possible contributors to these links: negative life events that are dependent upon the individual's actions and depressogenic attributional style. Data are drawn from the G1219 large-scale community twin and sibling sample, and include 2409 questionnaire responses from youths aged between 13 and 19 living in the United Kingdom. Depressed mood was independently associated with both oppositionality and delinquency, but not with physical aggression. Dependent negative life events were strongly implicated in the association between delinquency and depressed mood, whereas depressogenic attributional style was implicated in the associations of both oppositionality and delinquency with depressed mood. Oppositionality remained a significant predictor of depressed mood after accounting for attributional style and life events whereas delinquency did not. The pattern of associations was largely similar in boys and girls. We discuss these results in terms of developmental models of the links between antisocial behavior and depressed mood.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号