Results for 'Ezra Susser'

383 found
Order:
  1.  81
    Exploring researchers’ experiences of working with a researcher-driven, population-specific community advisory board in a South African schizophrenia genomics study.Megan M. Campbell, Ezra Susser, Jantina de Vries, Adam Baldinger, Goodman Sibeko, Michael M. Mndini, Sibonile G. Mqulwana, Odwa A. Ntola, Raj S. Ramesar & Dan J. Stein - 2015 - BMC Medical Ethics 16 (1):1-9.
    BackgroundCommunity engagement within biomedical research is broadly defined as a collaborative relationship between a research team and a group of individuals targeted for research. A Community Advisory Board is one mechanism of engaging the community. Within genomics research CABs may be particularly relevant due to the potential implications of research findings drawn from individual participants on the larger communities they represent. Within such research, CABs seek to meet instrumental goals such as protecting research participants and their community from research-related risks, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  2.  81
    Predictors of consent to cell line creation and immortalisation in a South African schizophrenia genomics study.Megan M. Campbell, Jantina de Vries, Sibonile G. Mqulwana, Michael M. Mndini, Odwa A. Ntola, Deborah Jonker, Megan Malan, Adele Pretorius, Zukiswa Zingela, Stephanus Van Wyk, Dan J. Stein & Ezra Susser - 2018 - BMC Medical Ethics 19 (1):72.
    Cell line immortalisation is a growing component of African genomics research and biobanking. However, little is known about the factors influencing consent to cell line creation and immortalisation in African research settings. We contribute to addressing this gap by exploring three questions in a sample of Xhosa participants recruited for a South African psychiatric genomics study: First, what proportion of participants consented to cell line storage? Second, what were predictors of this consent? Third, what questions were raised by participants during (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Data and the Good?Daniel Susser - 2022 - Surveillance and Society 20 (3):297-301.
    Surveillance studies scholars and privacy scholars have each developed sophisticated, important critiques of the existing data-driven order. But too few scholars in either tradition have put forward alternative substantive conceptions of a good digital society. This, I argue, is a crucial omission. Unless we construct new “sociotechnical imaginaries,” new understandings of the goals and aspirations digital technologies should aim to achieve, the most surveillance studies and privacy scholars can hope to accomplish is a less unjust version of the technology industry’s (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Chapter four Ibn Ezra, a maimonidean authority: The evidence of the early Ibn Ezra supercommentaries Tamas visi.Ibn Ezra - 2009 - In James T. Robinson, The cultures of Maimonideanism: new approaches to the history of Jewish thought. Boston: Brill. pp. 9--89.
     
    Export citation  
     
    Bookmark  
  5. Two approaches to metaphysical explanation.Ezra Rubenstein - 2024 - Noûs 58 (4):1107-1136.
    Explanatory metaphysics aspires to explain the less fundamental in terms of the more fundamental. But we should recognize two importantly different approaches to this task. According to the generation approach, more basic features of reality generate (or give rise to) less basic features. According to the reduction approach, less perspicuous ways of representing reality reduce to (or collapse into) more perspicuous ways of representing reality. The main goals of this paper are to present the core differences between the two approaches (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  6. Pisul--alumot tahalikhim.Ezra Orion - 1995 - [Israel]: Modan be-shituf Midreshet Śedeh Boḳer.
  7. Brain Data in Context: Are New Rights the Way to Mental and Brain Privacy?Daniel Susser & Laura Y. Cabrera - 2023 - American Journal of Bioethics Neuroscience 15 (2):122-133.
    The potential to collect brain data more directly, with higher resolution, and in greater amounts has heightened worries about mental and brain privacy. In order to manage the risks to individuals posed by these privacy challenges, some have suggested codifying new privacy rights, including a right to “mental privacy.” In this paper, we consider these arguments and conclude that while neurotechnologies do raise significant privacy concerns, such concerns are—at least for now—no different from those raised by other well-understood data collection (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  8. Cohesive proportionality.Ezra Rubenstein - 2024 - Philosophical Studies 181 (1):179-203.
    Proportionality—the idea that causes are neither too general nor too specific for their effects—seems to recommend implausibly disjunctive causes (McGrath, 1998 ; Shapiro & Sober, 2012 ; Franklin-Hall, 2016 ). I argue that this problem should be avoided by appeal to the notion of cohesion. I propose an account of cohesion in terms of the similarity structure of property-spaces, argue that it is not objectionably mysterious, and that alternative approaches—based on naturalness, interventionism, and contrastivism—are inadequate without appeal to it. In (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  9. Online Manipulation: Hidden Influences in a Digital World.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Georgetown Law Technology Review 4:1-45.
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of manipulation that (...)
    Direct download  
     
    Export citation  
     
    Bookmark   38 citations  
  10. Split intensionality: a new scope theory of de re and de dicto.Ezra Keshet - 2010 - Linguistics and Philosophy 33 (4):251-283.
    The traditional scope theory of intensionality (STI) (see Russell 1905; Montague 1973; Ladusaw 1977; Ogihara 1992, 1996; Stowell 1993) is simple, elegant, and, for the most part, empirically adequate. However, a few quite troubling counterexamples to this theory have lead researchers to propose alternatives, such as positing null situation pronouns (Percus 2000) or actuality operators (Kamp 1971; Cresswell 1990) in the syntax of natural language. These innovative theories do correct the undergeneration of the original scope theory, but at a cost: (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   23 citations  
  11. Grounding identity in existence.Ezra Rubenstein - 2024 - Philosophy and Phenomenological Research 108 (1):21-41.
    What grounds the facts about what is identical to/distinct from what? A natural answer is: the facts about what exists. Despite its prima facie appeal, this view has received surprisingly little attention in the literature. Moreover, those who have discussed it have been inclined to reject it because of the following important challenge: why should the existence of some individuals ground their identity in some cases and their distinctness in others? (Burgess 2012, Shumener 2020b). This paper offers a sustained defense (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  12. Technology, autonomy, and manipulation.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Internet Policy Review 8 (2).
    Since 2016, when the Facebook/Cambridge Analytica scandal began to emerge, public concern has grown around the threat of “online manipulation”. While these worries are familiar to privacy researchers, this paper aims to make them more salient to policymakers — first, by defining “online manipulation”, thus enabling identification of manipulative practices; and second, by drawing attention to the specific harms online manipulation threatens. We argue that online manipulation is the use of information technology to covertly influence another person’s decision-making, by targeting (...)
    Direct download  
     
    Export citation  
     
    Bookmark   39 citations  
  13. Proportionality in Causation, Part II: Applications and Challenges.Ezra Rubenstein - 2024 - Philosophy Compass 19 (1):e12960.
    In ‘Proportionality in Causation, Part I: Theories’, I presented various ways of understanding the idea that causes which are ‘proportional’ to their effects are in some sense preferable. In this companion article, I discuss the principal applications of the resulting theories of proportionality, and the challenges they face.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  14.  19
    Perceptual organization of materials as a factor influencing ease of learning and degree of retention.Ezra V. Saul & Charles E. Osgood - 1950 - Journal of Experimental Psychology 40 (3):372.
  15. Proportionality in Causation, Part I: Theories.Ezra Rubenstein - 2024 - Philosophy Compass 19 (1):e12957.
    A much-discussed idea in the causation literature is that it is preferable to invoke causes which are proportional to—neither too general nor too specific for—the effect. This article presents various ways of understanding this idea. In what sense are such causal claims ‘preferable’? And what is it for one event to be ‘proportional’ to another? In a companion article, ‘Proportionality in Causation, Part II: Applications and Challenges’, I discuss the principal applications of the resulting theories of proportionality, and the challenges (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Overdetermination and causal connections.Ezra Rubenstein - 2025 - Philosophical Studies 182 (1).
    Some theories are alleged to be implausible because they are committed to systematic ‘overdetermination’. In response, some authors defend ‘compatibilism’: the view that the putative overdetermination is benign, like other unproblematic cases of a single effect having many sufficient causes. The literature has tended to focus on the following question: which relations between sufficient causes of a single effect ensure that problematic overdetermination is avoided? This paper argues that several widely endorsed answers to this question are subject to counterexample. It (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  17. Predictive Policing and the Ethics of Preemption.Daniel Susser - 2021 - In Ben Jones & Eduardo Mendieta, The Ethics of Policing: New Perspectives on Law Enforcement. New York: NYU Press.
    The American justice system, from police departments to the courts, is increasingly turning to information technology for help identifying potential offenders, determining where, geographically, to allocate enforcement resources, assessing flight risk and the potential for recidivism amongst arrestees, and making other judgments about when, where, and how to manage crime. In particular, there is a focus on machine learning and other data analytics tools, which promise to accurately predict where crime will occur and who will perpetrate it. Activists and academics (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  18.  21
    Gender-affirming medical treatment for adolescents: a critical reflection on “effective” treatment outcomes.Ezra D. Oosthoek, Skye Stanwich, Karl Gerritse, David Matthew Doyle & Annelou L. C. de Vries - 2024 - BMC Medical Ethics 25 (1):1-20.
    Background The scrutiny surrounding gender-affirming medical treatment (GAMT) for youth has increased, particularly concerning the limited evidence on long-term treatment outcomes. The Standards of Care 8 by the World Professional Association for Transgender Health addresses this by outlining research evidence suggesting “effective” outcomes of GAMT for adolescents. However, claims concerning what are considered “effective” outcomes of GAMT for adolescents remain implicit, requiring further reflection. Methods Using trans negativity as a theoretical lens, we conducted a theory-informed reflexive thematic analysis of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19. Religious ethics, HIV and AIDS and masculinities in Southern Africa.Ezra Chitando - 2008 - In Ronald Nicolson, Persons in community: African ethics in a global culture. Scottsville, South Africa: University of KwaZulu-Natal Press.
     
    Export citation  
     
    Bookmark   2 citations  
  20. Knowability and Singular Thought.Ezra J. Cook - manuscript
     
    Export citation  
     
    Bookmark  
  21. Invisible Influence: Artificial Intelligence and the Ethics of Adaptive Choice Architectures.Daniel Susser - 2019 - Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society 1.
    For several years, scholars have (for good reason) been largely preoccupied with worries about the use of artificial intelligence and machine learning (AI/ML) tools to make decisions about us. Only recently has significant attention turned to a potentially more alarming problem: the use of AI/ML to influence our decision-making. The contexts in which we make decisions—what behavioral economists call our choice architectures—are increasingly technologically-laden. Which is to say: algorithms increasingly determine, in a wide variety of contexts, both the sets of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  22.  59
    The sociology of knowledge and its enemies.Bernard Susser - 1989 - Inquiry: An Interdisciplinary Journal of Philosophy 32 (3):245 – 260.
    My objective in the following study is to present and analyze the objections to the "classical argument" in the sociology of knowledge raised by Leo Strauss and Karl Popper. Building on this expository account, I will attempt to demonstrate (1) that the opposition of Strauss and Popper is more apparent and polemical than real, (2) that the position taken by Strauss and Popper on the viability of a sociology of knowledge is essentially no different from that taken by the discipline's (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  23.  18
    Philosophy in the ‘house of stone’: a critical review.Ezra Chitando & Fainos Mangena - 2015 - South African Journal of Philosophy 34 (2):226-239.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Notice After Notice-and-Consent: Why Privacy Disclosures Are Valuable Even If Consent Frameworks Aren’t.Daniel Susser - 2019 - Journal of Information Policy 9:37-62.
    The dominant legal and regulatory approach to protecting information privacy is a form of mandated disclosure commonly known as “notice-and-consent.” Many have criticized this approach, arguing that privacy decisions are too complicated, and privacy disclosures too convoluted, for individuals to make meaningful consent decisions about privacy choices—decisions that often require us to waive important rights. While I agree with these criticisms, I argue that they only meaningfully call into question the “consent” part of notice-and-consent, and that they say little about (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  25.  13
    What It Means to Be Human: A Response to Harzheim.Ezra N. S. Lockhart - forthcoming - Cambridge Quarterly of Healthcare Ethics:1-3.
    This response engages critically with Harzheim’s review of Thomas Fuchs’ In Defense of the Human Being: Foundational Questions of an Embodied Anthropology. Fuchs’ work offers a profound exploration of embodied cognition, arguing that human cognition and existence are deeply shaped by our physical interactions. Harzheim’s critique highlights significant aspects of Fuchs’ framework, including his critique of functionalist models, the impact of transhumanist technologies, and ethical concerns in healthcare technology. This paper extends Harzheim’s review by proposing an integration of functionalist and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  20
    The Philosophers’ Paul: A Radically Subversive Thinker.Ezra Delahaye - 2017 - In Antonio Cimino, George Henry van Kooten & Gert Jan van der Heiden, Saint Paul and Philosophy: The Consonance of Ancient and Modern Thought. De Gruyter. pp. 81-94.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  27.  10
    The uncaused being and the criterion of truth.Ezra Z. Derr - 1911 - Boston: Sherman, French & company.
    This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work. This work is in the public domain (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  25
    The Passionate, Personal Plays of Barrie Stavis.Ezra Goldstein - 1990 - Cardozo Studies in Law and Literature 2 (2):279-288.
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  29. Blacks and the language of their biotechnological future.Ezra E. H. Griffith - 2013 - In Michael J. Hyde & James A. Herrick, After the genome: a language for our biotechnological future. Waco, Texas: Baylor University Press.
     
    Export citation  
     
    Bookmark  
  30.  21
    Time-frequency signatures evoked by single-pulse deep brain stimulation to the subcallosal cingulate.Ezra E. Smith, Ki Sueng Choi, Ashan Veerakumar, Mosadoluwa Obatusin, Bryan Howell, Andrew H. Smith, Vineet Tiruvadi, Andrea L. Crowell, Patricio Riva-Posse, Sankaraleengam Alagapan, Christopher J. Rozell, Helen S. Mayberg & Allison C. Waters - 2022 - Frontiers in Human Neuroscience 16.
    Precision targeting of specific white matter bundles that traverse the subcallosal cingulate has been linked to efficacy of deep brain stimulation for treatment resistant depression. Methods to confirm optimal target engagement in this heterogenous region are now critical to establish an objective treatment protocol. As yet unexamined are the time-frequency features of the SCC evoked potential, including spectral power and phase-clustering. We examined these spectral features—evoked power and phase clustering—in a sample of TRD patients with implanted SCC stimulators. Electroencephalogram was (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  24
    Iranian Jewry during the Afghan Invasion: The Kitāb-i Sar Guzasht-i Kāshān of Bābāī b. Farhād; Text, Edition and CommentaryIranian Jewry during the Afghan Invasion: The Kitab-i Sar Guzasht-i Kashan of Babai b. Farhad; Text, Edition and Commentary.Ezra Spicehandler & Vera Basch Moreen - 1992 - Journal of the American Oriental Society 112 (2):311.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32. Exploitation in the Platform Age.Daniel Susser - forthcoming - In Beate Roessler & Valerie Steeves, Being Human in the Digital World. Cambridge University Press.
    In this chapter I consider a common refrain among critics of digital platforms: big tech "exploits" us. It gives voice to a shared sense that technology firms are somehow mistreating people—taking advantage of us, extracting from us—in a way that other data-driven harms, such as surveillance and algorithmic bias, fail to capture. Exploring several targets of this charge—gig work, algorithmic pricing, and surveillance advertising—I ask: What does exploitation entail, exactly, and how do platforms perpetrate it? Is exploitation in the platform (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  39
    Generalism Without Generation in advance.Ezra Rubenstein - forthcoming - Journal of Philosophy.
    According to generalism, the world is fundamentally general –– ultimately, there are no individuals. I distinguish two versions of this view. ‘Permissive generalism’ holds that facts involving individuals are non-basic: they are generated by purely general basic facts. I argue that permissive generalists will struggle to provide suitably systematic and non-arbitrary explanations for facts involving individuals. These problems are avoided by switching to ‘strict generalism’: the view that truths about individuals are non-perspicuous, and reduce to purely general perspicuous truths. I (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34. Measuring Automated Influence: Between Empirical Evidence and Ethical Values.Daniel Susser & Vincent Grimaldi - forthcoming - Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society.
    Automated influence, delivered by digital targeting technologies such as targeted advertising, digital nudges, and recommender systems, has attracted significant interest from both empirical researchers, on one hand, and critical scholars and policymakers on the other. In this paper, we argue for closer integration of these efforts. Critical scholars and policymakers, who focus primarily on the social, ethical, and political effects of these technologies, need empirical evidence to substantiate and motivate their concerns. However, existing empirical research investigating the effectiveness of these (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  35. Decision Time: Normative Dimensions of Algorithmic Speed.Daniel Susser - forthcoming - ACM Conference on Fairness, Accountability, and Transparency (FAccT '22).
    Existing discussions about automated decision-making focus primarily on its inputs and outputs, raising questions about data collection and privacy on one hand and accuracy and fairness on the other. Less attention has been devoted to critically examining the temporality of decision-making processes—the speed at which automated decisions are reached. In this paper, I identify four dimensions of algorithmic speed that merit closer analysis. Duration (how much time it takes to reach a judgment), timing (when automated systems intervene in the activity (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  36. Situation economy.Ezra Keshet - 2010 - Natural Language Semantics 18 (4):385-434.
    Researchers often assume that possible worlds and times are represented in the syntax of natural languages. However, it has been noted that such a system can overgenerate. This paper proposes a constraint on systems where worlds and times are represented as situation pronouns. The Intersective Predicate Generalization, based on and extending work by R. Musan, states that two items composed via Predicate Modification, such as a noun and an intersective modifier, must be evaluated in the same world and time. To (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  37. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is not the only (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  38.  54
    Religion that strengthens democracy: An analysis of religious political strategies in Israel.Ezra Kopelowitz & Matthew Diamond - 1998 - Theory and Society 27 (5):671-708.
  39.  23
    Existence and Utopia: The Social and Political Thought of Martin Buber.Bernard Susser & Professor of Religion and Political Science Bernard Susser - 1981
    The only complete study of Buber as a political thinker. Shed new light upon Buber's I Thou, while also attempting to understand Buber's Zionist thought and activity in a new and fresh manner.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  49
    Ideological Multivalence.Bernard Susser - 1977 - Political Theory 5 (1):75-96.
  41. Philosophy in epidemiology.Mervyn Susser - 1991 - Theoretical Medicine and Bioethics 12 (3):271-273.
  42.  10
    The grammar of modern ideology.Bernard Susser - 1988 - New York: Routledge.
    Play and the Artist’s Creative Process explores a continuity between childhood play and adult creativity. The volume examines how an understanding of play can shed new light on processes that recur in the work of Philip Guston and Eduardo Paolozzi. Both artists’ distinctive engagement with popular culture is seen as connected to the play materials available in the landscapes of their individual childhoods. Animating or toying with material to produce the unforeseen outcome is explored as the central force at work (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  27
    Letter to Mrs. Wilbur, June 26, 1997.Ezra F. Vogel - 1999 - Chinese Studies in History 33 (1):85-85.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  44.  24
    Anxious mood narrows attention in feature space.Ezra Wegbreit, Steven Franconeri & Mark Beeman - 2015 - Cognition and Emotion 29 (4):668-677.
  45. Paradigm lost : the rise, fall and eventual recovery of paradigms in archaeology.Ezra B. W. Zubrow - 2015 - In Kristian Kristiansen, Ladislav Šmejda, Jan Turek & Evžen Neustupný, Paradigm found: archaeological theory present, past and future: essays in honour of Evžen Neustupný. Oxford: Oxbow Books.
     
    Export citation  
     
    Bookmark  
  46. Sefer Ḥosen yeshuʻot: ʻal Pirḳe Avot: ḥibur nifla..ʻEzra ben Yeḳutiʼel Zusman - 1811 - Bruḳlin: Aḥim Goldenberg.
     
    Export citation  
     
    Bookmark  
  47. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Grounded Shadows, Groundless Ghosts.Ezra Rubenstein - 2022 - British Journal for the Philosophy of Science 73 (3):723-750.
    According to a radical account of quantum metaphysics that I label ‘high-dimensionalism’, ordinary objects are the ‘shadows’ of high-dimensional fundamental ontology. Critics—especially Maudlin —allege that high-dimensionalism cannot provide a satisfactory explanation of the manifest image. In this paper, I examine the two main ideas behind these criticisms: that high-dimensionalist connections between fundamental and non-fundamental are 1) inscrutable, and 2) arbitrary. In response to the first, I argue that there is no metaphysically significant contrast regarding the scrutability of low- and high-dimensionalist (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  21
    Congee for the Soul.Ezra Gabbay, Joseph J. Fins, John Banja & Taylor Evans - 2021 - Hastings Center Report 51 (1):10-12.
    Provision of adequate nutrition to elderly patients who develop dysphagia after a stroke can be quite challenging, often leading to the placement of a percutaneous entero‐gastrostomy (PEG) tube for nutritional support. This hypothetical case describes the additional challenge of cross‐cultural belief that leads a daughter to provide oral feeding to her mother, an act that the medical team believes is dangerous and the daughter sees as salubrious. In this case, what is the proper balance between patient safety and deference to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50. Breaking Through.Ezra Bayda - 2013 - In Melvin McLeod, The best Buddhist writing 2013. Boston: Shambhala.
     
    Export citation  
     
    Bookmark  
1 — 50 / 383