Loose Constitutivity and Armchair Philosophy
نویسندگان
چکیده
منابع مشابه
Armchair Philosophy , Metaphysical Modality and Counterfactual Thinking
A striking feature of the traditional armchair method of philosophy is the use of imaginary examples: for instance, of Gettier cases as counterexamples to the justified true belief analysis of knowledge. The use of such examples is often thought to involve some sort of a priori rational intuition, which crude rationalists regard as a virtue and crude empiricists as a vice. It is argued here tha...
متن کاملThe view from the armchair: a defense of traditional philosophy
Traditional philosophy has been under attack from several quarters in recent years. The traditional philosopher views philosophy as an armchair discipline relying, for the most part, on reason and reflection. Some philosophers doubt the legitimacy of this type of inquiry. Their arguments usually occur along two dimensions. Some argue that the primary data source for the armchair philosopher—int...
متن کاملEvidence and armchair access
In this paper, I shall discuss a problem that arises when you try to combine an attractive account of what constitutes evidence with an independently plausible account of the kind of access we have to our evidence. According to E=K, our evidence consists of what we know. According to the principle of armchair access, we can know from the armchair what our evidence is. Combined, these claims ent...
متن کاملExternalism and Armchair Knowledge*
1. Kylie’s Puzzle On summer afternoons in Canberra, the baking sun reflects off Lake Burley Griffin, and the water shimmers. Up behind the university, in the botanical gardens, a cascading stream of water helps to maintain the humidity of the rainforest gully. These are just a couple of Kylie’s thoughts on the subject of water, her water thoughts. Amongst Kylie’s many other thoughts that involv...
متن کاملArmchair authentication
Alphanumeric authentication, by means of a secret, is not only a powerful mechanism, in theory, but prevails over all its competitors in practice. However, it is clearly inadequate in a world where increasing numbers of systems and services require people to authenticate in a shared space, while being actively observed. This new reality places pressure on a password mechanism never intended for...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Studia Philosophica Estonica
سال: 2010
ISSN: 1736-5899,2228-110X
DOI: 10.12697/spe.2009.2.2.10