Results for 'adversarial attacks'

969 found
Order:
  1. Adversarial Attacks on Image Generation With Made-Up Words.Raphaël Millière - manuscript
    Text-guided image generation models can be prompted to generate images using nonce words adversarially designed to robustly evoke specific visual concepts. Two approaches for such generation are introduced: macaronic prompting, which involves designing cryptic hybrid words by concatenating subword units from different languages; and evocative prompting, which involves designing nonce words whose broad morphological features are similar enough to that of existing words to trigger robust visual associations. The two methods can also be combined to generate images associated with more (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2. Adversary arguments and the logic of personal attacks.Margot Flowers, Rod McGuire & Lawrence Birnbaum - 1982 - In Wendy G. Lehnert & Martin Ringle (eds.), Strategies for Natural Language Processing. Lawrence Erlbaum. pp. 275--294.
  3.  13
    Multi-robot adversarial patrolling: Handling sequential attacks.Efrat Sless Lin, Noa Agmon & Sarit Kraus - 2019 - Artificial Intelligence 274 (C):1-25.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  23
    Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks.Prashanth Rajivan & Cleotilde Gonzalez - 2018 - Frontiers in Psychology 9.
  5.  22
    Rogue people: on adversarial crowdsourcing in the context of cyber security.Mohammad Moradi & Qi Li - 2021 - Journal of Information, Communication and Ethics in Society 19 (1):87-103.
    Purpose Over the past decade, many research works in various disciplines have benefited from the endless ocean of people and their potentials as an effective problem-solving strategy and computational model. But nothing interesting is ever completely one-sided. Therefore, when it comes to leveraging people's power, as the dark side of crowdsourcing, there are some possible threats that have not been considered as should be, such as recruiting black hat crowdworkers for organizing targeted adversarial intentions. The purpose of this paper (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  6. In defence of adversarial philosophy?Terence Rajivan Edward - manuscript
    Adversarial philosophy is under attack (!), but I speculate that it is useful for working out the level of a philosopher and sometimes for increasing the respect awarded to some individuals and groups. There may be no alternative to it when you have an excess of philosophers of around the same level.
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  7
    Robert Orford’s Attack on Giles of Rome.Francis E. Kelley - 1987 - The Thomist 51 (1):70-96.
    In lieu of an abstract, here is a brief excerpt of the content:ROBERT ORFORD'S ATTACK ON GILES OF ROME I N TWO PREVIOUS ARTICLES, I tried to demonstrate how Robert Orford drew upon the thought of Giles of Rome in order to formulate his own explanation of hylomorphism and the so-called real distinction between essence and existence.1 Orford, it will be remembered, was one of the earliest disciples of his colleague St. Thomas Aquinas, and-more important- is the first 'llhomist we (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  81
    It's All Very Well for You to Talk! Situationally Disqualifying Ad Hominem Attacks.Erik C. W. Krabbe & Douglas Walton - 1993 - Informal Logic 15 (2).
    The situationally disqualifying ad hominem attack is an argumentative move in critical dialogue whereby one participant points out certain features in his adversary's personal situation that are claimed to make it inappropriate for this adversary to take a particular point of view, to argue in a particular way, or to launch certain criticisms. In this paper, we discuss some examples of this way of arguing. Other types of ad hominem argumentation are discussed as well and compared with the situationally disqualifying (...)
    Direct download (13 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  9. There's nothing wrong with raw perception: A response to Chakrabarti's attack on nyāya's "nirvikalpaka pratyakṣa".Stephen H. Phillips - 2001 - Philosophy East and West 51 (1):104-113.
    In lieu of an abstract, here is a brief excerpt of the content:There's Nothing Wrong with Raw Perception:A Response to Chakrabarti's Attack on Nyāya's Nirvikalpaka PratyakṣaStephen H. PhillipsIn the lead article of the fiftieth anniversary issue of Philosophy East and West (January 2000), Arindam Chakrabarti elaborates seven reasons why Nyāya should jettison "indeterminate perception" and view all perception as determinate, that is to say, as having an entity (a) as qualified by a qualifier (F) as object (Fa). In his notes, (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  10.  22
    Épistémologie déflationniste et théologie universitaire selon Gilles de Rome.Catherine König-Pralong - 2021 - Quaestio 20:73-87.
    This paper addresses the conception of theology developed by Giles of Rome from the Reportatio of his lecture on the second book of the Sentences to his fifth Quodlibet. It demonstrates that, from the beginning of his career, Giles discredited the power of philosophical reason in the realm of theology, a discipline which he conceived as a defensive, rhetorical and exegetical practice. Henry of Ghent was the principal adversary attacked by Giles, who challenged the scientific legitimacy of theology which Henry, (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11.  21
    GenAI Model Security.Ken Huang, Ben Goertzel, Daniel Wu & Anita Xie - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 163-198.
    Safeguarding GenAI models against threats and aligning them with security requirements is imperative yet challenging. This chapter provides an overview of the security landscape for generative models. It begins by elucidating common vulnerabilities and attack vectors, including adversarial attacks, model inversion, backdoors, data extraction, and algorithmic bias. The practical implications of these threats are discussed, spanning domains like finance, healthcare, and content creation. The narrative then shifts to exploring mitigation strategies and innovative security paradigms. Differential privacy, blockchain-based provenance, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  55
    Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.Wolter Pieters, Dina Hadžiosmanović & Francien Dechesne - 2016 - Science and Engineering Ethics 22 (3):831-850.
    Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents may be at least as important when it comes to undesirable effects of deployed technologies. (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  19
    Martial: The World of the Epigram (review).Sven Lorenz - 2008 - American Journal of Philology 129 (3):439-442.
    In lieu of an abstract, here is a brief excerpt of the content:Reviewed by:Martial: The World of the EpigramSven LorenzWilliam Fitzgerald. Martial: The World of the Epigram. Chicago, Ill.: University of Chicago Press, 2007. x + 258 pp.At the beginning of The World of the Epigram, Fitzgerald asks, “How does one read an epigrammatist?” (1). It is the question of how to come to terms with “the paradox of a book that is at the same time a random collection of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  14.  34
    Philosophical Scrutiny of the Strategic ‘Defence’ Initiatives.Jonathan Schonsheck - 2008 - Journal of Applied Philosophy 3 (2):151-166.
    Many people have misgivings about the strategy of nuclear deterrence. Some of those misgivings centre on issues of effectiveness: safety depends entirely upon the dissuasion of an adversary. Other misgivings centre on moral concerns: the essence of deterrence is the threat, and the conditional intention, to kill millions of noncombatants. US President Reagan's Strategic Defence Initiative promised an alternative to deterrence, a strategic posture of interception of an adversary's weapons rather than preclusion of the decision to attack. It is conceived (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  15. Powers: Necessity and Neighborhoods.Neil Williams - 2014 - American Philosophical Quarterly 51 (4):357-372.
    It is commonplace among friends of irreducible causal powers to depict powers as producing their characteristic manifestations as a matter of metaphysical necessity. That is to say that when a power finds itself in those circumstances that stimulate it, it cannot help but be exercised: its effects must occur. The result is a metaphysic that depicts the world not as loose and separate but as united by the strongest glue; this is but one way in which the world as understood (...)
    No categories
     
    Export citation  
     
    Bookmark   8 citations  
  16. Interpreting the History of Science: A Psychologistic Approach.Alexander T. Levine - 1994 - Dissertation, University of California, San Diego
    The question, how is profound intellectual disagreement possible, even when addressed toward the paradigmatically reasonable activity of scientific communication, has generated a number of puzzling responses. On a response attributed to Thomas S. Kuhn, some episodes in the history of science don't allow for meaningful disagreement. In such situations, the adversaries talk at cross purposes until one side is either "converted" or dies off. ;This skeptical prospect has also been considered by those who study the differences between natural languages, and (...)
    No categories
     
    Export citation  
     
    Bookmark  
  17.  8
    Erneuerung der Transzendentalphilosophie in Anschluss an Kant und Fichte: Reinhard Lauth zum 60. Geburtstag.Klaus Hammacher & Albert Mues (eds.) - 1979 - Stuttgart-Bad Cannstatt: Frommann-Holzboog.
    Child psychologist Mallory James returns to Moonglade, the Australian plantation where she was raised, to care for her beloved uncle Robert, who has had a heart attack. Having left the area years earlier after being betrayed by her fiancâe, Jason Cartwright, Mallory is shocked and dismayed to find that Jason and his decidedly disturbed twin sister, Jessica, have been hired on at her uncle's estate. Her longtime friend and occasional adversary, Blaine Forrester, is also nearby. As Mallory settles back into (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  37
    Xunzi's moral analysis of war and some of its contemporary implications.Aaron Stalnaker - 2012 - Journal of Military Ethics 11 (2):97-113.
    Abstract The early Ru or ?Confucian? figure Xunzi (?Master Xun,? c. 310?c. 220 BCE) gives a sophisticated analysis of war, which he develops on the basis of a larger social and political vision that he works out in considerable detail. This larger vision of human society is thoroughly normative in the sense that Xunzi both argues for the value of his ideal conception of society, and relates these moral arguments for the Confucian Dao or Way to what I take to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  19.  81
    Room for maneuver when raising critical doubt.Jan Albert Van Laar - 2008 - Philosophy and Rhetoric 41 (3):pp. 195-211.
    In lieu of an abstract, here is a brief excerpt of the content:Room for Maneuver When Raising Critical DoubtJan Albert Van Laar1When interlocutors start talking at cross-purposes it becomes less likely that they will be able to resolve their initial difference of opinion (Van Eemeren and Grootendorst 1992, 125). How much room should we give a party for rephrasing or revising her adversary’s standpoint in a manner that suits her individual purposes in the dialogue? Certainly, as textbooks in argumentation and (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  20.  12
    Medical Genetics Casebook: A Clinical Introduction to Medical Ethics Systems Theory.Colleen D. Clements - 1982 - Springer Verlag.
    The Direction of Medical Ethics The direction bioethics, and specifically medical ethics, will take in the next few years will be crucial. It is an emerging specialty that has attempted a great deal, that has many differing agendas, and that has its own identity crisis. Is it a subspecialty of clinical medicine? Is it a medical reform movement? Is it a consumer pro tection movement? Is it a branch of professional ethics? Is it a ra tionale for legal decisions and (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  21
    Exploiting multimodal biometrics for enhancing password security.Konstantinos Karampidis - 2024 - Logic Journal of the IGPL 32 (2):293-305.
    Digitization of every daily procedure requires trustworthy verification schemes. People tend to overlook the security of the passwords they use, i.e. they use the same password on different occasions, they neglect to change them periodically or they often forget them. This raises a major security issue, especially for elderly people who are not familiar with modern technology and its risks and challenges. To overcome these drawbacks, biometric factors were utilized, and nowadays, they have been widely adopted due to their convenience (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  22.  11
    How ISIS represented enemies as ineffectual in Dabiq: A multimodal critical discourse analysis.Surinderpal Kaur & Sahar Rasoulikolamaki - 2021 - Discourse and Communication 15 (6):650-671.
    This paper is a multimodal critical discourse study of other-representation in ISIS’s magazine, Dabiq, It focuses on both the micro-level analysis of actor and action representation, and the macro-structure of negative other-depiction in Dabiq from both textual and visual perspectives. Through in-depth examination of linguistic and non-linguistic elements, the study aimed to unfold ISIS’s ideology at the global level, which is to construct its desired reality and eventually to recruit supporters. The analysis was carried out on fifteen issues of Dabiq (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  39
    An Early Account of David Hume.J. C. Hilson - 1975 - Hume Studies 1 (2):78-81.
    In lieu of an abstract, here is a brief excerpt of the content:AN EARLY ACCOUNT OF DAVID HUME In New Letters of David Hume, Professor Klibansky and Mossner lamented the "dearth of information on Hume's early development". Though some new facts and documents have emerged since 1954, the early period of Hume's life, to 1740, remains the most obscure. The account of Hume in 1740 presented below adds nothing to our knowledge of the evolution of Hume's philosophy, but it does (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  24.  16
    Le accuse di Pelagio nel Commentarium in Hieremiam di Girolamo.Giuseppe Caruso - 2017 - Augustinianum 57 (1):107-121.
    In his Commentarium in Hieremiam, as well as in other contemporary works, Jerome accuses Pelagius of conducting a defamatory campaign against him by accusing him of Origenism, contempt for marriage and more generally, of wishing others ill. Did Jerome really seek to discredit his adversary, or were such accusations even circulating? This paper takes into consideration Pelagius’s surviving works and intends to give – within the limits admitted by the sources – an answer to this question, coming to the conclusion (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  14
    Wolność egoisty.Paweł Cielecki - 2008 - Acta Universitatis Lodziensis. Folia Philosophica. Ethica-Aesthetica-Practica 21:145-162.
    The main purpose of this article is to outline the idea of the anarchistic egoism included in Max Stirner's "Ego and His Own". I tried to represent Stirner as an original philosopher who visibly distinguished himself among other thinkers of his days. My aim was also defend him from various attacks of his critics and adversaries who reproached him for being inconsistent or perplexed in the very vulnerable spots of his work. In my opinion 'being awkward' which Camus accuses (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  56
    The body as evidence of the soul in Plato’s Gorgias.Maria Aparecida De Paiva Montenegro & Pedro Henrique Araújo Santiago - 2020 - Archai: Revista de Estudos Sobre as Origens Do Pensamento Ocidental 30:03010-03010.
    We intend to point out that in the Gorgias, dialogue devoted to the critique of rhetoric, Socrates' frequent allusions to the body's complexion, and the recurrent use of corporeal metaphors to refer to what, by analogy, happens to the soul, function as a rhetoric tool in order to oppose Gorgias' own rhetoric. Thus, while drawing attention to the way Plato uses the weapons of the adversary precisely to attack him, we emphasize the indispensable role of the body as evidence of (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  27. The End Times of Philosophy.François Laruelle - 2012 - Continent 2 (3):160-166.
    Translated by Drew S. Burk and Anthony Paul Smith. Excerpted from Struggle and Utopia at the End Times of Philosophy , (Minneapolis: Univocal Publishing, 2012). THE END TIMES OF PHILOSOPHY The phrase “end times of philosophy” is not a new version of the “end of philosophy” or the “end of history,” themes which have become quite vulgar and nourish all hopes of revenge and powerlessness. Moreover, philosophy itself does not stop proclaiming its own death, admitting itself to be half dead (...)
    No categories
     
    Export citation  
     
    Bookmark   1 citation  
  28. Dichotomies and types of debate.Marcelo Dascal - unknown
    Dichotomies are ubiquitous in deliberative thinking, in decision making and in arguing in all spheres of life.[i] Sticking uncompromisingly to a dichotomy may lead to sharp disagreement and paradox, but it can also sharpen the issues at stake and help to find a solution. Dichotomies are particularly in evidence in debates, i.e., in argumentative dialogical exchanges characterized by their agonistic nature. The protagonists in a debate worth its name hold positions that are or that they take to be opposed; they (...)
     
    Export citation  
     
    Bookmark   15 citations  
  29.  25
    The Careless Skeptic: The 'Pamphilian' Ironies in Hume's Dialogues.Robert H. Hurlbutt Iii - 1988 - Hume Studies 14 (2):207-250.
    In lieu of an abstract, here is a brief excerpt of the content:207 THE CARELESS SKEPTIC THE 'PAMPHILIAN' IRONIES IN HUME'S DIALOGUES In "Hume and the Legacy of the Dialogues" E. C. Mossner sets out a widely accepted interpretation of one of Hume's major intentions in that great work. He argues that Hume's main use of irony therein is to dissimulate with respect to his true religious convictions. The purpose is to provide Hume with a defense against the expected negative (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30.  28
    Falling masts, rising Masters: The ethnography of virtue in caesar's account of the veneti.Brice Erickson - 2002 - American Journal of Philology 123 (4):601-622.
    In lieu of an abstract, here is a brief excerpt of the content:American Journal of Philology 123.4 (2002) 601-622 [Access article in PDF] Falling Masts, Rising Masters:The Ethnography of Virtue in Caesar's Account of the Veneti Brice Erickson [Appendix]CAESAR'S ACCOUNT OF THE REVOLT of the Veneti and neighboring tribes along the northwest coast of Gaul (BGall. 3.8-15) contains a clear assertion of Rome's superiority in virtus over her foes. While the account of the Veneti has sparked considerable debate over Caesar's (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  31.  19
    Precedential Ad Hominem in Polemical Exchange: Examples from the Israeli Political Debate.Eithan Orkibi - 2018 - Argumentation 32 (4):485-499.
    This article explores the modalities by which referring to past discursive performance of adversaries within a continuous polemical exchange is used in ad hominem attacks. Our starting point holds that in the context of lengthy debates, participants and third-party listeners share a rhetorical memory, which, dynamic and subjective as it may be, allows for the evaluation of participants’ characters based on their perceived discursive performances. By analysing opinion articles related to the Israeli political debate, this study shows how drawing (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  89
    The significance of Isaiah Berlin’s Counter-Enlightenment.Bernard Yack - 2013 - European Journal of Political Theory 12 (1):49-60.
    This paper takes a close look at Berlin’s claim that the emergence of Counter-Enlightenment pluralism marks a momentous historical watershed. It concludes that Berlin is right to draw our attention to the importance of this event, but that he seriously misinterprets its significance. He has good reason, in particular, to treat Herder as ‘the most formidable adversary of the French philosophes and their German disciples’, but not because Herder put a stop to the ancient creed of monism on which they (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33. Possible Worlds in the Tahafut al-tahafut: Averroes on Plenitude and Possibility.Taneli Kukkonen - 2000 - Journal of the History of Philosophy 38 (3):329-347.
    In lieu of an abstract, here is a brief excerpt of the content:Possible Worlds in the Tahâfut al-tahâfut:Averroes on Plenitude and PossibilityTaneli Kukkonen1.It has become customary to credit John Duns Scotus with having first systematically laid out the basis for treating the modal terms as referring to synchronic alternative states of affairs. This has been viewed as constituting a genuine shift in modal paradigms, as no former model had included the idea of genuine synchronic alternative possibilities. Historians of modal logic (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  34.  32
    Mâtürîdî-Hanefî Aidiyetin Osmanlı’daki İzdüşümleri = Projections of Māturīdite-Ḥanafite Identity on the Ottomans.Mehmet Kalaycı - 2016 - Cumhuriyet İlahiyat Dergisi 20 (2):9-70.
    Māturīdism is an Ottoman identity and this identity was not limited, as is commonly believed, to the last period of the Empire. It maintained its formal existence throughout the Ottoman history. Nevertheless, the context in which the Māturīdism was located or with which it was associated changed in the course of time. In the early period when the eclectic way of thinking was dominant, Māturīdism as a creed was apparent mainly in the jurists whose ascetic identity was prominent and partly (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  35. Preventive war and the killing of the innocent.Jeff McMahan - unknown
    The United Nations Charter prohibits states to use force against other states except in ‘individual or collective self-defence if an armed attack occurs’.1 In the past, it may have seemed reasonable to insist that permissible defence must await the actual occurrence of an armed attack. Because war is usually disastrous for all concerned and to be avoided if at all possible, and because successful defence has often been at least possible against a military attack, it may not be imprudent for (...)
     
    Export citation  
     
    Bookmark   2 citations  
  36.  32
    Milton and Political Correctness.Mary Ann McGrail - 1997 - Diacritics 27 (2):98-105.
    In lieu of an abstract, here is a brief excerpt of the content:Milton and Political CorrectnessMary Ann McGrail (bio)In the opening of the title essay of Persecution and the Art of Writing, Leo Strauss speculates:We can easily imagine that a historian living in a totalitarian country, a generally respected and unsuspected member of the only party in existence, might be led by his investigations to doubt the soundness of the government-sponsored interpretation of the history of religion. Nobody would prevent him (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  37.  18
    Hobbes and the Artifice of Eternity.Christopher Scott McClure - 2016 - New York, NY: Cambridge University Press.
    Thomas Hobbes argues that the fear of violent death is the most reliable passion on which to found political society. His role in shaping the contemporary view of religion and honor in the West is pivotal, yet his ideas are famously riddled with contradictions. In this breakthrough study, McClure finds evidence that Hobbes' apparent inconsistencies are intentional, part of a sophisticated rhetorical strategy meant to make man more afraid of death than he naturally is. Hobbes subtly undermined two of the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  39
    From Vilification to Accommodation: Making a Common Cause Movement.Lyle Munro - 1999 - Cambridge Quarterly of Healthcare Ethics 8 (1):46-57.
    The history of the vivisection debate is a case study in the use of vilification not unlike its rhetorical use by adversaries in the pro-life/pro-choice controversy. According to Vanderford, vilification in that debate serves a number of functions: to identify adversaries as ; to cast opponents in an exclusively negative light; to attribute diabolical motives to one's adversaries; and to magnify the opposition's power as an enemy capable of doing great evil. In the vivisection debate, both sides have attempted to (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  39.  24
    Towards a Cognitive Theory of Cyber Deception.Edward A. Cranford, Cleotilde Gonzalez, Palvi Aggarwal, Milind Tambe, Sarah Cooney & Christian Lebiere - 2021 - Cognitive Science 45 (7):e13013.
    This work is an initial step toward developing a cognitive theory of cyber deception. While widely studied, the psychology of deception has largely focused on physical cues of deception. Given that present‐day communication among humans is largely electronic, we focus on the cyber domain where physical cues are unavailable and for which there is less psychological research. To improve cyber defense, researchers have used signaling theory to extended algorithms developed for the optimal allocation of limited defense resources by using deceptive (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  64
    Just and Unjust Nuclear Deterrence.Scott D. Sagan - 2023 - Ethics and International Affairs 37 (1):19-28.
    In this essay, I propose five principles to make U.S. nuclear deterrence policy more just and effective in the future: sever the link between the mass killing of innocent civilians and nuclear deterrence by focusing targeting on adversaries’ military power and senior political leadership, not their population; never use or plan to use a nuclear weapon against any target that could be destroyed or neutralized by conventional weapons; reject “belligerent reprisal” threats against civilians even in response to enemy attacks (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  33
    L'accusa di magia e i cristiani nella tarda antichità. [REVIEW]Gabriele Marasco - 2011 - Augustinianum 51 (2):367-421.
    It is generally held that in late antiquity the accusation of magic was used by Christians to attack the pagans. However, there is quite ample documentationto show that Christians themselves resorted to this, in doctrinal disputes, to strike at their respective adversaries, in particular the bishops and their principal collaborators. With such a charge, they not only aroused the fears of the masses, but also provoked the intervention of the imperial authorities, bringing about the removal and the exile of those (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  42.  48
    Cross-Examining Socrates: A Defense of the Interlocutors in Plato's Early Dialogues (review).Carol S. Gould - 2001 - Philosophy and Literature 25 (1):166-169.
    In lieu of an abstract, here is a brief excerpt of the content:Philosophy and Literature 25.1 (2001) 166-169 [Access article in PDF] Book Review Cross-Examining Socrates: A Defense of the Interlocutors in Plato's Early Dialogues Cross-Examining Socrates: A Defense of the Interlocutors in Plato's Early Dialogues, by John Beversluis; xii & 416 pp. Cambridge: Cambridge University Press, 2000, $69.95. This book is more than a cross-examination of Socrates: it is a carefully wrought indictment. Beversluis, unlike Socrates' historical adversaries Anytus and (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  43.  19
    Horace, Epode 6.16.S. J. Harrison - 1987 - Classical Quarterly 37 (02):523-.
    Here Horace gives warning to an adversary of his powers of literary attack, comparing himself with the great iambists Archilochus and Hipponax . The general sense of the last two lines seems clear: ‘If someone attacks me , shall I weep like a mere boy?’, i.e. ‘Am I not to take revenge?’.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  44.  24
    Arezzo nell'antichità. [REVIEW]Gabriele Marasco - 2011 - Augustinianum 51 (2):559-562.
    It is generally held that in late antiquity the accusation of magic was used by Christians to attack the pagans. However, there is quite ample documentationto show that Christians themselves resorted to this, in doctrinal disputes, to strike at their respective adversaries, in particular the bishops and their principal collaborators. With such a charge, they not only aroused the fears of the masses, but also provoked the intervention of the imperial authorities, bringing about the removal and the exile of those (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  45. Milton F. lunch.Professions Under Attack - 1983 - In James Hamilton Schaub, Karl Pavlovic & M. D. Morris (eds.), Engineering professionalism and ethics. Malabar, Fla.: Krieger Pub. Co..
    No categories
     
    Export citation  
     
    Bookmark  
  46. USC Football Notebook: Robey, McDonald Secondary Stalwarts.White House Confirms Cyber Attack - forthcoming - Hermes.
     
    Export citation  
     
    Bookmark  
  47.  61
    Adversariality and Argumentation.John Casey - 2020 - Informal Logic 40 (1):77-108.
    The concept of adversariality, like that of argument, admits of significant variation. As a consequence, I argue, the question of adversarial argument has not been well understood. After defining adversariality, I argue that if we take argument to be about beliefs, rather than commitments, then two considerations show that adversariality is an essential part of it. First, beliefs are not under our direct voluntary control. Second, beliefs are costly both for the psychological states they provoke and for the fact (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  48. An Adversarial Ethic for Business: or When Sun-Tzu Met the Stakeholder.Joseph Heath - 2007 - Journal of Business Ethics 72 (4):359-374.
    In the economic literature on the firm, especially in the transaction–cost tradition, a sharp distinction is drawn between so-called “market transactions” and “administered transactions.” This distinction is of enormous importance for business ethics, since market transactions are governed by the competitive logic of the market, whereas administered transactions are subject to the cooperative norms that govern collective action in a bureaucracy. The widespread failure to distinguish between these two types of transactions, and thus to distinguish between adversarial and non- (...) relations, has led many business ethicists to develop a “uniform” moral code. Yet in market transactions, the checks and balances built into the system of commercial exchange are such as to permit more instrumental forms of behavior. In administered transactions, by contrast, these checks and balances are absent, and thus the institutional context calls for much greater exercise of moral restraint. In this paper, I begin the task of developing an adversarial ethic for business. According to this view, the competitive environment licenses a greater range of “self-interested” behavior, but also imposes its own constraints on the strategies that firms may adopt in the pursuit of their interests. (shrink)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   66 citations  
  49. Philosophy, Adversarial Argumentation, and Embattled Reason.Phyllis Rooney - 2010 - Informal Logic 30 (3):203-234.
    Philosophy’s adversarial argumentation style is often noted as a factor contributing to the low numbers of women in philosophy. I argue that there is a level of adversariality peculiar to philosophy that merits specific feminist examination, yet doesn’t assume controversial gender differences claims. The dominance of the argument-as-war metaphor is not warranted, since this metaphor misconstrues the epistemic role of good argument as a tool of rational persuasion. This metaphor is entangled with the persisting narrative of embattled reason, which, (...)
    Direct download (13 more)  
     
    Export citation  
     
    Bookmark   66 citations  
  50.  71
    Argumentation, Adversariality, and Social Norms.Audrey Yap - 2020 - Metaphilosophy 51 (5):747-765.
    Janice Moulton's “The Adversary Method: A Philosophical Paradigm” articulated several criticisms of the popular idea of philosophy as adversarial debate. Moulton criticizes it on epistemic grounds, arguing that philosophy's overreliance on adversarial debate is to the detriment of its goals. Some, notably Trudy Govier, have argued in favor of at least a minimal adversariality, governed by norms of respectful argumentation. This paper suggests that Govier's faith in these norms is misplaced, because it neglects the social circumstances of the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 969