Results for 'Ezra Susser'

397 found
Order:
  1.  55
    Exploring researchers’ experiences of working with a researcher-driven, population-specific community advisory board in a South African schizophrenia genomics study.Megan M. Campbell, Ezra Susser, Jantina de Vries, Adam Baldinger, Goodman Sibeko, Michael M. Mndini, Sibonile G. Mqulwana, Odwa A. Ntola, Raj S. Ramesar & Dan J. Stein - 2015 - BMC Medical Ethics 16 (1):1-9.
    BackgroundCommunity engagement within biomedical research is broadly defined as a collaborative relationship between a research team and a group of individuals targeted for research. A Community Advisory Board is one mechanism of engaging the community. Within genomics research CABs may be particularly relevant due to the potential implications of research findings drawn from individual participants on the larger communities they represent. Within such research, CABs seek to meet instrumental goals such as protecting research participants and their community from research-related risks, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  2.  57
    Predictors of consent to cell line creation and immortalisation in a South African schizophrenia genomics study.Megan M. Campbell, Jantina de Vries, Sibonile G. Mqulwana, Michael M. Mndini, Odwa A. Ntola, Deborah Jonker, Megan Malan, Adele Pretorius, Zukiswa Zingela, Stephanus Van Wyk, Dan J. Stein & Ezra Susser - 2018 - BMC Medical Ethics 19 (1):72.
    Cell line immortalisation is a growing component of African genomics research and biobanking. However, little is known about the factors influencing consent to cell line creation and immortalisation in African research settings. We contribute to addressing this gap by exploring three questions in a sample of Xhosa participants recruited for a South African psychiatric genomics study: First, what proportion of participants consented to cell line storage? Second, what were predictors of this consent? Third, what questions were raised by participants during (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  27
    Brain Data in Context: Are New Rights the Way to Mental and Brain Privacy?Daniel Susser & Laura Y. Cabrera - 2024 - American Journal of Bioethics Neuroscience 15 (2):122-133.
    The potential to collect brain data more directly, with higher resolution, and in greater amounts has heightened worries about mental and brain privacy. In order to manage the risks to individuals posed by these privacy challenges, some have suggested codifying new privacy rights, including a right to “mental privacy.” In this paper, we consider these arguments and conclude that while neurotechnologies do raise significant privacy concerns, such concerns are—at least for now—no different from those raised by other well-understood data collection (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  4. Brain Data in Context: Are New Rights the Way to Mental and Brain Privacy?Daniel Susser & Laura Y. Cabrera - 2023 - American Journal of Bioethics Neuroscience:1-12.
    The potential to collect brain data more directly, with higher resolution, and in greater amounts has heightened worries about mental and brain privacy. In order to manage the risks to individuals posed by these privacy challenges, some have suggested codifying new privacy rights, including a right to “mental privacy.” In this paper, we consider these arguments and conclude that while neurotechnologies do raise significant privacy concerns, such concerns are—at least for now—no different from those raised by other well-understood data collection (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  5.  95
    Grounding identity in existence.Ezra Rubenstein - 2024 - Philosophy and Phenomenological Research 108 (1):21-41.
    What grounds the facts about what is identical to/distinct from what? A natural answer is: the facts about what exists. Despite its prima facie appeal, this view has received surprisingly little attention in the literature. Moreover, those who have discussed it have been inclined to reject it because of the following important challenge: why should the existence of some individuals ground their identity in some cases and their distinctness in others? (Burgess 2012, Shumener 2020b). This paper offers a sustained defense (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  6. Pandemic surveillance: ethics at the intersection of information, research, and health.Daniel Susser - 2022 - In Margaret Hu (ed.), Pandemic Surveillance: Privacy, Security, and Data Ethics. Cheltenham, UK: Edward Elgar. pp. 187-196.
    This chapter provides a high-level overview of key ethical issues raised by the use of surveillance technologies, such as digital contact tracing, disease surveillance, and vaccine passports, to combat the COVID-19 pandemic. To some extent, these issues are entirely familiar. I argue that they raise old questions in new form and with new urgency, at the intersection of information ethics, research ethics, and public health. Whenever we deal with data-driven technologies, we have to ask how they fare in relation to (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7. Measuring Automated Influence: Between Empirical Evidence and Ethical Values.Daniel Susser & Vincent Grimaldi - forthcoming - Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society.
    Automated influence, delivered by digital targeting technologies such as targeted advertising, digital nudges, and recommender systems, has attracted significant interest from both empirical researchers, on one hand, and critical scholars and policymakers on the other. In this paper, we argue for closer integration of these efforts. Critical scholars and policymakers, who focus primarily on the social, ethical, and political effects of these technologies, need empirical evidence to substantiate and motivate their concerns. However, existing empirical research investigating the effectiveness of these (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. From Procedural Rights to Political Economy: New Horizons for Regulating Online Privacy.Daniel Susser - 2023 - In Sabine Trepte & Philipp K. Masur (eds.), The Routledge Handbook of Privacy and Social Media. Routledge. pp. 281-290.
    The 2010s were a golden age of information privacy research, but its policy accomplishments tell a mixed story. Despite significant progress on the development of privacy theory and compelling demonstrations of the need for privacy in practice, real achievements in privacy law and policy have been, at best, uneven. In this chapter, I outline three broad shifts in the way scholars (and, to some degree, advocates and policy makers) are approaching privacy and social media. First, a change in emphasis from (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  9. Online Manipulation: Hidden Influences in a Digital World.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Georgetown Law Technology Review 4:1-45.
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of manipulation that (...)
    Direct download  
     
    Export citation  
     
    Bookmark   32 citations  
  10. Technology, autonomy, and manipulation.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Internet Policy Review 8 (2).
    Since 2016, when the Facebook/Cambridge Analytica scandal began to emerge, public concern has grown around the threat of “online manipulation”. While these worries are familiar to privacy researchers, this paper aims to make them more salient to policymakers — first, by defining “online manipulation”, thus enabling identification of manipulative practices; and second, by drawing attention to the specific harms online manipulation threatens. We argue that online manipulation is the use of information technology to covertly influence another person’s decision-making, by targeting (...)
    Direct download  
     
    Export citation  
     
    Bookmark   32 citations  
  11. Split intensionality: a new scope theory of de re and de dicto.Ezra Keshet - 2010 - Linguistics and Philosophy 33 (4):251-283.
    The traditional scope theory of intensionality (STI) (see Russell 1905; Montague 1973; Ladusaw 1977; Ogihara 1992, 1996; Stowell 1993) is simple, elegant, and, for the most part, empirically adequate. However, a few quite troubling counterexamples to this theory have lead researchers to propose alternatives, such as positing null situation pronouns (Percus 2000) or actuality operators (Kamp 1971; Cresswell 1990) in the syntax of natural language. These innovative theories do correct the undergeneration of the original scope theory, but at a cost: (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   22 citations  
  12. Pisul--alumot tahalikhim.Ezra Orion - 1995 - [Israel]: Modan be-shituf Midreshet Śedeh Boḳer.
  13. Predictive Policing and the Ethics of Preemption.Daniel Susser - 2021 - In Ben Jones & Eduardo Mendieta (eds.), The Ethics of Policing: New Perspectives on Law Enforcement. New York: NYU Press.
    The American justice system, from police departments to the courts, is increasingly turning to information technology for help identifying potential offenders, determining where, geographically, to allocate enforcement resources, assessing flight risk and the potential for recidivism amongst arrestees, and making other judgments about when, where, and how to manage crime. In particular, there is a focus on machine learning and other data analytics tools, which promise to accurately predict where crime will occur and who will perpetrate it. Activists and academics (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  14. Situation economy.Ezra Keshet - 2010 - Natural Language Semantics 18 (4):385-434.
    Researchers often assume that possible worlds and times are represented in the syntax of natural languages. However, it has been noted that such a system can overgenerate. This paper proposes a constraint on systems where worlds and times are represented as situation pronouns. The Intersective Predicate Generalization, based on and extending work by R. Musan, states that two items composed via Predicate Modification, such as a noun and an intersective modifier, must be evaluated in the same world and time. To (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  15.  42
    Cohesive proportionality.Ezra Rubenstein - 2024 - Philosophical Studies 181 (1):179-203.
    Proportionality—the idea that causes are neither too general nor too specific for their effects—seems to recommend implausibly disjunctive causes (McGrath, 1998 ; Shapiro & Sober, 2012 ; Franklin-Hall, 2016 ). I argue that this problem should be avoided by appeal to the notion of cohesion. I propose an account of cohesion in terms of the similarity structure of property-spaces, argue that it is not objectionably mysterious, and that alternative approaches—based on naturalness, interventionism, and contrastivism—are inadequate without appeal to it. In (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  16. Invisible Influence: Artificial Intelligence and the Ethics of Adaptive Choice Architectures.Daniel Susser - 2019 - Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society 1.
    For several years, scholars have (for good reason) been largely preoccupied with worries about the use of artificial intelligence and machine learning (AI/ML) tools to make decisions about us. Only recently has significant attention turned to a potentially more alarming problem: the use of AI/ML to influence our decision-making. The contexts in which we make decisions—what behavioral economists call our choice architectures—are increasingly technologically-laden. Which is to say: algorithms increasingly determine, in a wide variety of contexts, both the sets of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  17. Notice After Notice-and-Consent: Why Privacy Disclosures Are Valuable Even If Consent Frameworks Aren’t.Daniel Susser - 2019 - Journal of Information Policy 9:37-62.
    The dominant legal and regulatory approach to protecting information privacy is a form of mandated disclosure commonly known as “notice-and-consent.” Many have criticized this approach, arguing that privacy decisions are too complicated, and privacy disclosures too convoluted, for individuals to make meaningful consent decisions about privacy choices—decisions that often require us to waive important rights. While I agree with these criticisms, I argue that they only meaningfully call into question the “consent” part of notice-and-consent, and that they say little about (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  18.  20
    Proportionality in Causation, Part II: Applications and Challenges.Ezra Rubenstein - 2024 - Philosophy Compass 19 (1):e12960.
    In ‘Proportionality in Causation, Part I: Theories’, I presented various ways of understanding the idea that causes which are ‘proportional’ to their effects are in some sense preferable. In this companion article, I discuss the principal applications of the resulting theories of proportionality, and the challenges they face.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  19. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  20. Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to govern data-driven systems. In (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  21. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is not the only (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  22.  20
    Proportionality in Causation, Part I: Theories.Ezra Rubenstein - 2024 - Philosophy Compass 19 (1):e12957.
    A much-discussed idea in the causation literature is that it is preferable to invoke causes which are proportional to—neither too general nor too specific for—the effect. This article presents various ways of understanding this idea. In what sense are such causal claims ‘preferable’? And what is it for one event to be ‘proportional’ to another? In a companion article, ‘Proportionality in Causation, Part II: Applications and Challenges’, I discuss the principal applications of the resulting theories of proportionality, and the challenges (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23. Data and the Good?Daniel Susser - 2022 - Surveillance and Society 20 (3):297-301.
    Surveillance studies scholars and privacy scholars have each developed sophisticated, important critiques of the existing data-driven order. But too few scholars in either tradition have put forward alternative substantive conceptions of a good digital society. This, I argue, is a crucial omission. Unless we construct new “sociotechnical imaginaries,” new understandings of the goals and aspirations digital technologies should aim to achieve, the most surveillance studies and privacy scholars can hope to accomplish is a less unjust version of the technology industry’s (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Breaking Through.Ezra Bayda - 2013 - In Melvin McLeod (ed.), The best Buddhist writing 2013. Boston: Shambhala.
     
    Export citation  
     
    Bookmark  
  25.  11
    Congee for the Soul.Ezra Gabbay, Joseph J. Fins, John Banja & Taylor Evans - 2021 - Hastings Center Report 51 (1):10-12.
    Provision of adequate nutrition to elderly patients who develop dysphagia after a stroke can be quite challenging, often leading to the placement of a percutaneous entero‐gastrostomy (PEG) tube for nutritional support. This hypothetical case describes the additional challenge of cross‐cultural belief that leads a daughter to provide oral feeding to her mother, an act that the medical team believes is dangerous and the daughter sees as salubrious. In this case, what is the proper balance between patient safety and deference to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26.  94
    Grounded Shadows, Groundless Ghosts.Ezra Rubenstein - 2022 - British Journal for the Philosophy of Science 73 (3):723-750.
    According to a radical account of quantum metaphysics that I label ‘high-dimensionalism’, ordinary objects are the ‘shadows’ of high-dimensional fundamental ontology. Critics—especially Maudlin —allege that high-dimensionalism cannot provide a satisfactory explanation of the manifest image. In this paper, I examine the two main ideas behind these criticisms: that high-dimensionalist connections between fundamental and non-fundamental are 1) inscrutable, and 2) arbitrary. In response to the first, I argue that there is no metaphysically significant contrast regarding the scrutability of low- and high-dimensionalist (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Privacy, Autonomy, and the Dissolution of Markets.Kiel Brennan-Marquez & Daniel Susser - 2022 - Knight First Amendment Institute.
    Throughout the 20th century, market capitalism was defended on parallel grounds. First, it promotes freedom by enabling individuals to exploit their own property and labor-power; second, it facilitates an efficient allocation and use of resources. Recently, however, both defenses have begun to unravel—as capitalism has moved into its “platform” phase. Today, the pursuit of allocative efficiency, bolstered by pervasive data surveillance, often undermines individual freedom rather than promoting it. And more fundamentally, the very idea that markets are necessary to achieve (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  32
    Vaccine Passports and Political Legitimacy: A Public Reason Framework for Policymakers.Anne Barnhill, Matteo Bonotti & Daniel Susser - 2023 - Ethical Theory and Moral Practice 26 (5):667-687.
    As the COVID-19 pandemic continues to evolve, taking its toll on people’s lives around the world, vaccine passports remain a contentious topic of debate in most liberal democracies. While a small literature on vaccine passports has sprung up over the past few years that considers their ethical pros and cons, in this paper we focus on the question of when vaccine passports are politically legitimate. Specifically, we put forward a ‘public reason ethics framework’ for resolving ethical disputes and use the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  29. Transparent Media and the Development of Digital Habits.Daniel Susser - 2017 - In Van den Eede Yoni, Irwin Stacy O'Neal & Wellner Galit (eds.), Postphenomenology and Media: Essays on Human-Media-World Relations. Lexington Books. pp. 27-44.
    Our lives are guided by habits. Most of the activities we engage in throughout the day are initiated and carried out not by rational thought and deliberation, but through an ingrained set of dispositions or patterns of action—what Aristotle calls a hexis. We develop these dispositions over time, by acting and gauging how the world responds. I tilt the steering wheel too far and the car’s lurch teaches me how much force is needed to steady it. I come too close (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  30.  43
    Religion that strengthens democracy: An analysis of religious political strategies in Israel.Ezra Kopelowitz & Matthew Diamond - 1998 - Theory and Society 27 (5):671-708.
  31.  15
    Confucius: The Great Digest and Unwobbling Pivot.Ezra Pound - 1954 - Philosophy East and West 3 (4):371-373.
  32.  11
    10. Guido's Relations.Ezra Pound - 2012 - In John Biguenet & Rainer Schulte (eds.), Theories of Translation: An Anthology of Essays From Dryden to Derrida. University of Chicago Press. pp. 83-92.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  16
    Letter to Mrs. Wilbur, June 26, 1997.Ezra F. Vogel - 1999 - Chinese Studies in History 33 (1):85-85.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  34. Paradigm lost : the rise, fall and eventual recovery of paradigms in archaeology.Ezra B. W. Zubrow - 2015 - In Kristian Kristiansen, Ladislav Šmejda, Jan Turek & Evžen Neustupný (eds.), Paradigm found: archaeological theory present, past and future: essays in honour of Evžen Neustupný. Oxford: Oxbow Books.
     
    Export citation  
     
    Bookmark  
  35. Sefer Ḥosen yeshuʻot: ʻal Pirḳe Avot: ḥibur nifla..ʻEzra ben Yeḳutiʼel Zusman - 1811 - Bruḳlin: Aḥim Goldenberg.
     
    Export citation  
     
    Bookmark  
  36.  24
    Re-enacting Paul. On the theological background of Heidegger's philosophical reading of the letters of Paul.Ezra Delahaye - 2013 - International Journal of Philosophy and Theology 74 (1):2-17.
    In 1920/1921 Martin Heidegger lectured on religion. In these lectures he turned to the letters of Paul, which had – until that point – exclusively been studied by theologians. Because of this, Heidegger's reading of Paul has to be understood against the background of early twentieth century theology. Heidegger approaches these letters phenomenologically, which leads him to discover eschatology as the core. By confronting Heidegger's interpretation of eschatology with the history of eschatology can the true novelty of his approach be (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  10
    Effect of Medicare home health care payment on informal care.Ezra Golberstein, David C. Grabowski, Kenneth M. Langa & Michael E. Chernew - 2009 - Inquiry: The Journal of Health Care Organization, Provision, and Financing 46 (1):58-71.
  38.  12
    The Passionate, Personal Plays of Barrie Stavis.Ezra Goldstein - 1990 - Cardozo Studies in Law and Literature 2 (2):279-288.
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  39. Blacks and the language of their biotechnological future.Ezra E. H. Griffith - 2013 - In Michael J. Hyde & James A. Herrick (eds.), After the genome: a language for our biotechnological future. Waco, Texas: Baylor University Press.
     
    Export citation  
     
    Bookmark  
  40.  8
    Perceptual organization of materials as a factor influencing ease of learning and degree of retention.Ezra V. Saul & Charles E. Osgood - 1950 - Journal of Experimental Psychology 40 (3):372.
  41.  11
    Time-frequency signatures evoked by single-pulse deep brain stimulation to the subcallosal cingulate.Ezra E. Smith, Ki Sueng Choi, Ashan Veerakumar, Mosadoluwa Obatusin, Bryan Howell, Andrew H. Smith, Vineet Tiruvadi, Andrea L. Crowell, Patricio Riva-Posse, Sankaraleengam Alagapan, Christopher J. Rozell, Helen S. Mayberg & Allison C. Waters - 2022 - Frontiers in Human Neuroscience 16.
    Precision targeting of specific white matter bundles that traverse the subcallosal cingulate has been linked to efficacy of deep brain stimulation for treatment resistant depression. Methods to confirm optimal target engagement in this heterogenous region are now critical to establish an objective treatment protocol. As yet unexamined are the time-frequency features of the SCC evoked potential, including spectral power and phase-clustering. We examined these spectral features—evoked power and phase clustering—in a sample of TRD patients with implanted SCC stimulators. Electroencephalogram was (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  28
    A Life of Rabban Yohanan Ben Zakkai Ca. 1-80 C. E.Ezra Spicehandler & Jacob Neusner - 1963 - Journal of the American Oriental Society 83 (3):363.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  12
    Iranian Jewry during the Afghan Invasion: The Kitāb-i Sar Guzasht-i Kāshān of Bābāī b. Farhād; Text, Edition and CommentaryIranian Jewry during the Afghan Invasion: The Kitab-i Sar Guzasht-i Kashan of Babai b. Farhad; Text, Edition and Commentary.Ezra Spicehandler & Vera Basch Moreen - 1992 - Journal of the American Oriental Society 112 (2):311.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  44.  42
    Hope, hopelessness, and violence.Ezra Stotland - forthcoming - Humanitas.
    Suggests that the form of violence, its direction and purpose, and the conditions that start and end it, are determined mainly by the degree of hope or hopelessness giving rise to it. Violence is defined as an action whose intent is to harm another person. "Emotional violence" is an effort to reduce anxiety, which if successful arouses hope. "Instrumental violence" is directed at a specific goal in a more dispassionate manner. Societies should find moral equivalents to these 2 forms of (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  45.  15
    Anxious mood narrows attention in feature space.Ezra Wegbreit, Steven Franconeri & Mark Beeman - 2015 - Cognition and Emotion 29 (4):668-677.
  46.  11
    On science literacy.Ezra Shahn - 1988 - Educational Philosophy and Theory 20 (2):42–52.
  47.  17
    Jacob Talmon between “good” and “bad” nationalism.Ezra Mendelsohn - 2008 - History of European Ideas 34 (2):197-205.
    Jacob Talmon was a believer in nationalism, and in Jewish nationalism of the Zionist variety in particular. He was convinced of the moral right of Jews to establish their own state in Palestine/eretz Yisrael. On the other hand, he was aware of the dangers inherent in nationalism, of its tendency toward chauvinism, intolerance toward “the other,” and violence. In the case of Zionism he contrasted the pre-1967 movement, which he believed was characterized by moderation in the spirit of his hero, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  12
    Adolescent Connectedness: A Scoping Review of Available Measures and Their Psychometric Properties.Ezra K. Too, Esther Chongwo, Adam Mabrouk & Amina Abubakar - 2022 - Frontiers in Psychology 13.
    IntroductionAdolescent connectedness, a key component of positive youth development, is associated with various positive health outcomes. Several measures have been developed to assess this construct. However, no study has summarized data on the existing measures of adolescent connectedness. We conducted this scoping review to fill this gap. We specifically aimed to: identify the existing measures of adolescent connectedness, determine the most frequently used measures among the identified measures, and summarize the psychometric properties of these measures with a keen interest in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49. A critical anthropology for the present.Jeff Maskovsky & Ida Susser - 2016 - In James G. Carrier (ed.), After the crisis: anthropological thought, neoliberalism and the aftermath. New York, NY: Routledge.
     
    Export citation  
     
    Bookmark  
  50.  30
    Paul Oskar Kristeller. Sascha & Ezra Talmor - 1999 - The European Legacy 4 (3):4-4.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 397