Results for 'Maarten De Laat'

953 found
Order:
  1. Networked Learning 2020: Proceedings For The Twelfth International Conference On Networked Learning.Maarten De Laat, Thomas Ryberg, Nina Bonderup Dohn, Stig Børsen Hansen & Jens Jørgen Hansen (eds.) - 2020
    No categories
     
    Export citation  
     
    Bookmark  
  2. Trusting virtual trust.Paul B. de Laat - 2005 - Ethics and Information Technology 7 (3):167-180.
    Can trust evolve on the Internet between virtual strangers? Recently, Pettit answered this question in the negative. Focusing on trust in the sense of ‘dynamic, interactive, and trusting’ reliance on other people, he distinguishes between two forms of trust: primary trust rests on the belief that the other is trustworthy, while the more subtle secondary kind of trust is premised on the belief that the other cherishes one’s esteem, and will, therefore, reply to an act of trust in kind (‘trust-responsiveness’). (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  3. Open Source Production of Encyclopedias: Editorial Policies at the Intersection of Organizational and Epistemological Trust.Paul B. de Laat - 2012 - Social Epistemology 26 (1):71-103.
    The ideas behind open source software are currently applied to the production of encyclopedias. A sample of six English text-based, neutral-point-of-view, online encyclopedias of the kind are identified: h2g2, Wikipedia, Scholarpedia, Encyclopedia of Earth, Citizendium and Knol. How do these projects deal with the problem of trusting their participants to behave as competent and loyal encyclopedists? Editorial policies for soliciting and processing content are shown to range from high discretion to low discretion; that is, from granting unlimited trust to limited (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  4. How can contributors to open-source communities be Trusted? On the assumption, inference, and substitution of trust.Paul B. de Laat - 2010 - Ethics and Information Technology 12 (4):327-341.
    Open-source communities that focus on content rely squarely on the contributions of invisible strangers in cyberspace. How do such communities handle the problem of trusting that strangers have good intentions and adequate competence? This question is explored in relation to communities in which such trust is a vital issue: peer production of software (FreeBSD and Mozilla in particular) and encyclopaedia entries (Wikipedia in particular). In the context of open-source software, it is argued that trust was inferred from an underlying ‘hacker (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  5. Algorithmic Decision-Making Based on Machine Learning from Big Data: Can Transparency Restore Accountability?Paul B. de Laat - 2018 - Philosophy and Technology 31 (4):525-541.
    Decision-making assisted by algorithms developed by machine learning is increasingly determining our lives. Unfortunately, full opacity about the process is the norm. Would transparency contribute to restoring accountability for such systems as is often maintained? Several objections to full transparency are examined: the loss of privacy when datasets become public, the perverse effects of disclosure of the very algorithms themselves, the potential loss of companies’ competitive edge, and the limited gains in answerability to be expected since sophisticated algorithms usually are (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   29 citations  
  6. From open-source software to Wikipedia: ‘Backgrounding’ trust by collective monitoring and reputation tracking.Paul B. de Laat - 2014 - Ethics and Information Technology 16 (2):157-169.
    Open-content communities that focus on co-creation without requirements for entry have to face the issue of institutional trust in contributors. This research investigates the various ways in which these communities manage this issue. It is shown that communities of open-source software—continue to—rely mainly on hierarchy (reserving write-access for higher echelons), which substitutes (the need for) trust. Encyclopedic communities, though, largely avoid this solution. In the particular case of Wikipedia, which is confronted with persistent vandalism, another arrangement has been pioneered instead. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  7. Coercion or empowerment? Moderation of content in Wikipedia as 'essentially contested' bureaucratic rules.Paul B. de Laat - 2012 - Ethics and Information Technology 14 (2):123-135.
    In communities of user-generated content, systems for the management of content and/or their contributors are usually accepted without much protest. Not so, however, in the case of Wikipedia, in which the proposal to introduce a system of review for new edits (in order to counter vandalism) led to heated discussions. This debate is analysed, and arguments of both supporters and opponents (of English, German and French tongue) are extracted from Wikipedian archives. In order to better understand this division of the (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  8.  34
    Companies Committed to Responsible AI: From Principles towards Implementation and Regulation?Paul B. de Laat - 2021 - Philosophy and Technology 34 (4):1135-1193.
    The term ‘responsible AI’ has been coined to denote AI that is fair and non-biased, transparent and explainable, secure and safe, privacy-proof, accountable, and to the benefit of mankind. Since 2016, a great many organizations have pledged allegiance to such principles. Amongst them are 24 AI companies that did so by posting a commitment of the kind on their website and/or by joining the ‘Partnership on AI’. By means of a comprehensive web search, two questions are addressed by this study: (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  9. 1999 european summer meeting of the association for symbolic logic logic colloquium'99.Maarten de Rijke Pauly, Frans Snijders & Yde Venema - 2000 - Bulletin of Symbolic Logic 6 (1):103.
  10. Utrecht, The Netherlands, August 1–6, 1999.Maarten de Rijke Pauly, Frans Snijders & Yde Venema - 2000 - Bulletin of Symbolic Logic 6 (1).
     
    Export citation  
     
    Bookmark  
  11. The use of software tools and autonomous bots against vandalism: eroding Wikipedia’s moral order?Paul B. de Laat - 2015 - Ethics and Information Technology 17 (3):175-188.
    English - language Wikipedia is constantly being plagued by vandalistic contributions on a massive scale. In order to fight them its volunteer contributors deploy an array of software tools and autonomous bots. After an analysis of their functioning and the ‘ coactivity ’ in use between humans and bots, this research ‘ discloses ’ the moral issues that emerge from the combined patrolling by humans and bots. Administrators provide the stronger tools only to trusted users, thereby creating a new hierarchical (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  75
    The disciplinary power of predictive algorithms: a Foucauldian perspective.Paul B. de Laat - 2019 - Ethics and Information Technology 21 (4):319-329.
    Big Data are increasingly used in machine learning in order to create predictive models. How are predictive practices that use such models to be situated? In the field of surveillance studies many of its practitioners assert that “governance by discipline” has given way to “governance by risk”. The individual is dissolved into his/her constituent data and no longer addressed. I argue that, on the contrary, in most of the contexts where predictive modelling is used, it constitutes Foucauldian discipline. Compliance to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  13.  27
    Sahlqvist's Theorem for Boolean Algebras with Operators with an Application to Cylindric Algebras.Maarten De Rijke & Yde Venema - 1995 - Studia Logica 54 (1):61 - 78.
    For an arbitrary similarity type of Boolean Algebras with Operators we define a class of Sahlqvist identities. Sahlqvist identities have two important properties. First, a Sahlqvist identity is valid in a complex algebra if and only if the underlying relational atom structure satisfies a first-order condition which can be effectively read off from the syntactic form of the identity. Second, and as a consequence of the first property, Sahlqvist identities are canonical, that is, their validity is preserved under taking canonical (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  14. Profiling vandalism in Wikipedia: A Schauerian approach to justification.Paul B. de Laat - 2016 - Ethics and Information Technology 18 (2):131-148.
    In order to fight massive vandalism the English- language Wikipedia has developed a system of surveillance which is carried out by humans and bots, supported by various tools. Central to the selection of edits for inspection is the process of using filters or profiles. Can this profiling be justified? On the basis of a careful reading of Frederick Schauer’s books about rules in general (1991) and profiling in particular (2003) I arrive at several conclusions. The effectiveness, efficiency, and risk-aversion of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  15.  25
    1999 european summer meeting of the association for symbolic logic.Maarten de Rijke Pauly, Frans Snijders & Yde Venema - 2000 - Bulletin of Symbolic Logic 6 (1):103-137.
  16.  65
    Emerging roles for third parties in cyberspace.Paul B. de Laat - 2001 - Ethics and Information Technology 3 (4):267-276.
    In `real' space, third partieshave always been useful to facilitatetransactions. With cyberspace opening up, it isto be expected that intermediation will alsodevelop in a virtual fashion. The articlefocuses upon new cyberroles for third partiesthat seem to announce themselves clearly.First, virtualization of the market place haspaved the way for `cybermediaries', who brokerbetween supply and demand of material andinformational goods. Secondly,cybercommunication has created newuncertainties concerning informational securityand privacy. Also, as in real space,transacting supposes some decency with one'spartners. These needs are being addressed (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark  
  17.  34
    Trusting the (ro)botic other.Paul B. de Laat - 2015 - Acm Sigcas Computers and Society 45 (3):255-260.
    How may human agents come to trust artificial agents? At present, since the trust involved is non-normative, this would seem to be a slow process, depending on the outcomes of the transactions. Some more options may soon become available though. As debated in the literature, humans may meet bots as they are embedded in an institution. If they happen to trust the institution, they will also trust them to have tried out and tested the machines in their back corridors; as (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  18.  19
    Algorithmic decision-making employing profiling: will trade secrecy protection render the right to explanation toothless?Paul B. de Laat - 2022 - Ethics and Information Technology 24 (2).
    Algorithmic decision-making based on profiling may significantly affect people’s destinies. As a rule, however, explanations for such decisions are lacking. What are the chances for a “right to explanation” to be realized soon? After an exploration of the regulatory efforts that are currently pushing for such a right it is concluded that, at the moment, the GDPR stands out as the main force to be reckoned with. In cases of profiling, data subjects are granted the right to receive meaningful information (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19. NAVIGATING BETWEEN CHAOS AND BUREAUCRACY: BACKGROUNDING TRUST IN OPEN-CONTENT COMMUNITIES.Paul B. de Laat - 2012 - In Karl Aberer, Andreas Flache, Wander Jager, Ling Liu, Jie Tang & Christophe Guéret (eds.), 4th International Conference, SocInfo 2012, Lausanne, Switzerland, December 5-7, 2012. Proceedings. Springer.
    Many virtual communities that rely on user-generated content (such as social news sites, citizen journals, and encyclopedias in particular) offer unrestricted and immediate ‘write access’ to every contributor. It is argued that these communities do not just assume that the trust granted by that policy is well-placed; they have developed extensive mechanisms that underpin the trust involved (‘backgrounding’). These target contributors (stipulating legal terms of use and developing etiquette, both underscored by sanctions) as well as the contents contributed by them (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  20. Open Source Software: A New Mertonian Ethos?Paul B. de Laat - 2001 - In Anton Vedder (ed.), Ethics and the Internet. Intersentia.
    Hacker communities of the 1970s and 1980s developed a quite characteristic work ethos. Its norms are explored and shown to be quite similar to those which Robert Merton suggested govern academic life: communism, universalism, disinterestedness, and organized scepticism. In the 1990s the Internet multiplied the scale of these communities, allowing them to create successful software programs like Linux and Apache. After renaming themselves the `open source software' movement, with an emphasis on software quality, they succeeded in gaining corporate interest. As (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  21.  17
    The Modal Logic of Inequality.Maarten De Rijke - 1992 - Journal of Symbolic Logic 57 (2):566 - 584.
    We consider some modal languages with a modal operator D whose semantics is based on the relation of inequality. Basic logical properties such as definability, expressive power and completeness are studied. Also, some connections with a number of other recent proposals to extend the standard modal language are pointed at.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  22. Copyright or copyleft?: An analysis of property regimes for software development.Paul B. de Laat - 2005 - Research Policy 34 (10):1511-1532.
    Two property regimes for software development may be distinguished. Within corporations, on the one hand, a Private Regime obtains which excludes all outsiders from access to a firm's software assets. It is shown how the protective instruments of secrecy and both copyright and patent have been strengthened considerably during the last two decades. On the other, a Public Regime among hackers may be distinguished, initiated by individuals, organizations or firms, in which source code is freely exchanged. It is argued that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  23. Het 'universele zuur' van de evolutionaire psychologie?Maarten Boudry, Helen De Cruz, Stefaan Blancke & Johan De Smedt - 2011 - Tijdschrift Voor Filosofie 73 (2):287-305.
    In a previous issue of Tijdschrift voor Filosofie, Filip Buekens argues that evolutionary psychology (EP), or some interpretations thereof, have a corrosive impact on our ‘manifest self-image’. Buekens wants to defend and protect the global adequacy of this manifest self-image in the face of what he calls evolutionary revisionism. Although we largely agree with Buekens’ central argument, we criticize his analysis on several accounts, making some constructive proposals to strengthen his case. First, Buekens’ argument fails to target EP, because his (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24. Online diaries: Reflections on trust, privacy, and exhibitionism. [REVIEW]Paul B. de Laat - 2008 - Ethics and Information Technology 10 (1):57-69.
    Trust between transaction partners in cyberspace has come to be considered a distinct possibility. In this article the focus is on the conditions for its creation by way of assuming, not inferring trust. After a survey of its development over the years (in the writings of authors like Luhmann, Baier, Gambetta, and Pettit), this mechanism of trust is explored in a study of personal journal blogs. After a brief presentation of some technicalities of blogging and authors’ motives for writing their (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  25.  43
    Big data and algorithmic decision-making.Paul B. de Laat - 2017 - Acm Sigcas Computers and Society 47 (3):39-53.
    Decision-making assisted by algorithms developed by machine learning is increasingly determining our lives. Unfortunately, full opacity about the process is the norm. Can transparency contribute to restoring accountability for such systems? Several objections are examined: the loss of privacy when data sets become public, the perverse effects of disclosure of the very algorithms themselves, the potential loss of competitive edge, and the limited gains in answerability to be expected since sophisticated algorithms are inherently opaque. It is concluded that transparency is (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26. Internet-Based Commons of Intellectual Resources: An Exploration of their Variety.Paul B. de Laat - 2006 - In Jacques Berleur, Markku I. Nurminen & John Impagliazzo (eds.), IFIP; Social Informatics: An Information Society for All? In Remembrance of Rob Kling Vol 223. Springer.
    During the two last decades, speeded up by the development of the Internet, several types of commons have been opened up for intellectual resources. In this article their variety is being explored as to the kind of resources and the type of regulation involved. The open source software movement initiated the phenomenon, by creating a copyright-based commons of source code that can be labelled `dynamic': allowing both use and modification of resources. Additionally, such a commons may be either protected from (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27. Trusting the (ro)botic other: By assumption?Paul B. de Laat - 2015 - SIGCAS Computers and Society 45 (3):255-260.
    How may human agents come to trust (sophisticated) artificial agents? At present, since the trust involved is non-normative, this would seem to be a slow process, depending on the outcomes of the transactions. Some more options may soon become available though. As debated in the literature, humans may meet (ro)bots as they are embedded in an institution. If they happen to trust the institution, they will also trust them to have tried out and tested the machines in their back corridors; (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  5
    The Ethical and Clinical Importance of Measuring Consciousness in Continuously Sedated Patients.Sigrid Sterckx, Eric Mortier, Martine de Laat & Kasper Raus - 2014 - Journal of Clinical Ethics 25 (3):207-218.
    Continuous sedation at the end of life is a practice that has attracted a great deal of attention. An increasing number of guidelines on the proposed correct performance of the practice have been drafted. All of the guidelines stress the importance of using sedation in proportion to the severity of the patient’s symptoms, thus to reduce the patient’s consciousness no more than is absolutely necessary. As different patients can have different experiences of suffering, the amount of suffering should, ideally, be (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  29. Picture Perfect (?): Ethical Considerations in Visual Representation.Sonya de Laat - 2004 - Nexus 17 (1):5.
     
    Export citation  
     
    Bookmark   1 citation  
  30.  15
    A Note on Graded Modal Logic.Maarten De Rijke - 2000 - Studia Logica 64 (2):271 - 283.
    We introduce a notion of bisimulation for graded modal logic. Using this notion, the model theory of graded modal logic can be developed in a uniform manner. We illustrate this by establishing the finite model property and proving invariance and definability results.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  31.  47
    Setting-up early computer programs: D. H. Lehmer’s ENIAC computation. [REVIEW]Maarten Bullynck & Liesbeth De Mol - 2010 - Archive for Mathematical Logic 49 (2):123-146.
    A complete reconstruction of Lehmer’s ENIAC set-up for computing the exponents of p modulo two is given. This program served as an early test program for the ENIAC (1946). The reconstruction illustrates the difficulties of early programmers to find a way between a man operated and a machine operated computation. These difficulties concern both the content level (the algorithm) and the formal level (the logic of sequencing operations).
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  32. Evolutionary Approaches to Epistemic Justification.Helen de Cruz, Maarten Boudry, Johan de Smedt & Stefaan Blancke - 2011 - Dialectica 65 (4):517-535.
    What are the consequences of evolutionary theory for the epistemic standing of our beliefs? Evolutionary considerations can be used to either justify or debunk a variety of beliefs. This paper argues that evolutionary approaches to human cognition must at least allow for approximately reliable cognitive capacities. Approaches that portray human cognition as so deeply biased and deficient that no knowledge is possible are internally incoherent and self-defeating. As evolutionary theory offers the current best hope for a naturalistic epistemology, evolutionary approaches (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  33.  27
    Assessing climate model projections: state of the art and philosophical reflections.Joel Katzav, Henk Dijkstra & Jos de Laat - 2012 - Studies in History and Philosophy of Science Part B: Studies in History and Philosophy of Modern Physics 43 (4):258-276.
    The present paper draws on climate science and the philosophy of science in order to evaluate climate-model-based approaches to assessing climate projections. We analyze the difficulties that arise in such assessment and outline criteria of adequacy for approaches to it. In addition, we offer a critical overview of the approaches used in the IPCC working group one fourth report, including the confidence building, Bayesian and likelihood approaches. Finally, we consider approaches that do not feature in the IPCC reports, including three (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  39
    Jon Barwise and Jerry Seligman. Information flow. The logic of distributed systems. Cambridge tracts in theoretical computer science, no. 44. Cambridge University Press, Cambridge, New York, and Oakleigh, Victoria, 1997, xv + 274 pp. [REVIEW]Maarten De Rijke - 1999 - Journal of Symbolic Logic 64 (4):1836-1836.
  35.  2
    Editors' Introduction.Patrick Blackburn & Maarten de Rijke - 1996 - Notre Dame Journal of Formal Logic 37 (2):161-166.
  36. Essays dedicated to Johan van Benthem on the occasion of his 50th birthday.Jelle Gerbrandy, Maarten Marx, Maarten de Rijke & Yde Venema (eds.) - 1999 - Amsterdam University Press.
     
    Export citation  
     
    Bookmark  
  37. Models for humanitarian health care ethics.L. Schwartz, M. Hunt, C. Sinding, L. Elit, L. Redwood-Campbell, N. Adelson & S. de Laat - 2012 - Public Health Ethics 5 (1):81-90.
    Humanitarian health care practitioners working outside familiar settings, and without familiar supports, encounter ethical challenges both familiar and distinct. The ethical guidance they rely upon ought to reflect this. Using data from empirical studies, we explore the strengths and weaknesses of two ethical models that could serve as resources for understanding ethical challenges in humanitarian health care: clinical ethics and public health ethics. The qualitative interviews demonstrate the degree to which traditional teaching and values of clinical health ethics seem insufficient (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  38. PDL for ordered trees.Loredana Afanasiev, Patrick Blackburn, Ioanna Dimitriou, Bertrand Gaiffe, Evan Goris, Maarten Marx & Maarten de Rijke - 2005 - Journal of Applied Non-Classical Logics 15 (2):115-135.
    This paper is about a special version of PDL, proposed by Marcus Kracht, for reasoning about sibling ordered trees. It has four basic programs corresponding to the child, parent, left- and right-sibling relations in such trees. The original motivation for this language is rooted in the field of model-theoretic syntax. Motivated by recent developments in the area of semi-structured data, and, especially, in the field of query languages for XML (eXtensible Markup Language) documents, we revisit the language. This renewed interest (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  39. Assessing climate model projections: State of the art and philosophical reflections.Joel Katzav, Henk A. Dijkstra & A. T. J. de Laat - 2012 - Studies in History and Philosophy of Science Part B: Studies in History and Philosophy of Modern Physics 43 (4):258-276.
    The present paper draws on climate science and the philosophy of science in order to evaluate climate-model-based approaches to assessing climate projections. We analyze the difficulties that arise in such assessment and outline criteria of adequacy for approaches to it. In addition, we offer a critical overview of the approaches used in the IPCC working group one fourth report, including the confidence building, Bayesian and likelihood approaches. Finally, we consider approaches that do not feature in the IPCC reports, including three (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  40.  52
    When research seems like clinical care: a qualitative study of the communication of individual cancer genetic research results.Fiona A. Miller, Mita Giacomini, Catherine Ahern, Jason S. Robert & Sonya de Laat - 2008 - BMC Medical Ethics 9 (1):4.
    Research ethicists have recently declared a new ethical imperative: that researchers should communicate the results of research to participants. For some analysts, the obligation is restricted to the communication of the general findings or conclusions of the study. However, other analysts extend the obligation to the disclosure of individual research results, especially where these results are perceived to have clinical relevance. Several scholars have advanced cogent critiques of the putative obligation to disclose individual research results. They question whether ethical goals (...)
    Direct download (14 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  41.  44
    Erratum to: An Eye for an Eye Will Make the Whole World Blind: Conflict Escalation into Workplace Bullying and the Role of Distributive Conflict Behavior.Elfi Baillien, Jeroen Camps, Anja Van den Broeck, Jeroen Stouten, Lode Godderis, Maarten Sercu & Hans De Witte - 2016 - Journal of Business Ethics 137 (2):431-431.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  42.  28
    An Eye for an Eye Will Make the Whole World Blind: Conflict Escalation into Workplace Bullying and the Role of Distributive Conflict Behavior.Elfi Baillien, Jeroen Camps, Anja Van den Broeck, Jeroen Stouten, Lode Godderis, Maarten Sercu & Hans De Witte - 2016 - Journal of Business Ethics 137 (2):415-429.
    The current study investigated how work-related disagreements—coined as conflicts—relate to workplace bullying, from the perspective of the target as well as the perpetrator. We hypothesized a positive indirect association between task conflicts and bullying through relationship conflicts. This process accounted for both for targets and perpetrators of bullying. Targets are distinguished from perpetrators in our assumption that this indirect effect is boosted by distributive conflict behavior, being yielding for targets and forcing for perpetrators. Results in a large representative sample of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  43.  20
    University of Sao Paulo (Sao Paulo), Brazil, July 28–31, 1998.Sergei Artemov, Sam Buss, Edmund Clarke Jr, Heinz Dieter Ebbinghaus, Hans Kamp, Phokion Kolaitis, Maarten de Rijke & Valeria de Paiva - 1999 - Bulletin of Symbolic Logic 5 (3).
    Direct download  
     
    Export citation  
     
    Bookmark  
  44. Modal Logic: Graph. Darst.Patrick Blackburn, Maarten de Rijke & Yde Venema - 2001 - New York: Cambridge University Press. Edited by Maarten de Rijke & Yde Venema.
    This modern, advanced textbook reviews modal logic, a field which caught the attention of computer scientists in the late 1970's.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   295 citations  
  45.  11
    Philosophy of Earth Science.Maarten G. Kleinhans, Chris J. J. Buskes & Henk W. de Regt - 2010-01-04 - In Fritz Allhoff (ed.), Philosophies of the Sciences. Wiley‐Blackwell. pp. 213–236.
    This chapter contains sections titled: Introduction Object and Aims of Earth Science The Autonomy of Earth Science Explanation in Earth Science Conclusion Acknowledgment References.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  46. The modal logic of inequality.Maarten de Rijke - 1992 - Journal of Symbolic Logic 57 (2):566-584.
    We consider some modal languages with a modal operator $D$ whose semantics is based on the relation of inequality. Basic logical properties such as definability, expressive power and completeness are studied. Also, some connections with a number of other recent proposals to extend the standard modal language are pointed at.
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   40 citations  
  47.  91
    Terra incognita: Explanation and reduction in earth science.Maarten G. Kleinhans, Chris J. J. Buskes & Henk W. de Regt - 2005 - International Studies in the Philosophy of Science 19 (3):289 – 317.
    The present paper presents a philosophical analysis of earth science, a discipline that has received relatively little attention from philosophers of science. We focus on the question of whether earth science can be reduced to allegedly more fundamental sciences, such as chemistry or physics. In order to answer this question, we investigate the aims and methods of earth science, the laws and theories used by earth scientists, and the nature of earth-scientific explanation. Our analysis leads to the tentative conclusion that (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  48.  15
    Evolutionary Approaches to Epistemic Justification.Maarten Boudry Helen De Cruz - 2011 - Dialectica 65 (4):517-535.
    What are the consequences of evolutionary theory for the epistemic standing of our beliefs? Evolutionary considerations can be used to either justify or debunk a variety of beliefs. This paper argues that evolutionary approaches to human cognition must at least allow for approximately reliable cognitive capacities. Approaches that portray human cognition as so deeply biased and deficient that no knowledge is possible are internally incoherent and self‐defeating. As evolutionary theory offers the current best hope for a naturalistic epistemology, evolutionary approaches (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  91
    Sahlqvist's theorem for Boolean algebras with operators with an application to cylindric algebras.Maarten de Rijke & Yde Venema - 1995 - Studia Logica 54 (1):61-78.
    For an arbitrary similarity type of Boolean Algebras with Operators we define a class ofSahlqvist identities. Sahlqvist identities have two important properties. First, a Sahlqvist identity is valid in a complex algebra if and only if the underlying relational atom structure satisfies a first-order condition which can be effectively read off from the syntactic form of the identity. Second, and as a consequence of the first property, Sahlqvist identities arecanonical, that is, their validity is preserved under taking canonical embedding algebras. (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  50.  9
    Unpacking Constructs: A Network Approach for Studying War Exposure, Daily Stressors and Post-Traumatic Stress Disorder.Maarten De Schryver, Sofie Vindevogel, Andrew E. Rasmussen & Angélique O. J. Cramer - 2015 - Frontiers in Psychology 6.
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   9 citations  
1 — 50 / 953