Poisoned Babies, Shot Fathers, and Ruined Experiments
نویسندگان
چکیده
Abstract Livengood and Sytsma (2020) challenge the compositionality constraint of actual causation (CCAC), according to which each intermediary a causal chain is an effect its predecessor cause successor link. In several studies, they find support for their hypothesis that CCAC not in accordance with ordinary attributions laypeople. We argue there are three interrelated problems studies’ design we call causality-responsibility confusion (CRC), intermediary-ontology (IOC), cause-end questioning (CEQ). Avoiding CRC, IOC, CEQ leads strong empirical CCAC.
منابع مشابه
Shot-noise in transport and beam experiments.
Consider two Fermi gases with the same average currents: a transport gas, as in solid-state experiments where the chemical potentials of terminal 1 is mu+eV and of terminal 2 and 3 is mu, and a beam, i.e., electrons entering only from terminal 1 having energies between mu and mu+eV. By expressing the current noise as a sum over single-particle transitions we show that the temporal current fluct...
متن کاملReviving China's ruined rivers.
Corresponding Author Fax: +506 2920485 E-mail: [email protected] ENVENOMATIONS by the snake Bothrops asper are characterized by prominent local tissue damage (i.e. myonecrosis), blistering, hemorrhage and edema. Various phospholipases A2 and metalloproteinases that induce local pathological alterations have been purified from this venom. Since these toxins induce a conspicuous inflammatory...
متن کاملHow the ELF Ruined Christmas
Throughout the last few decades, computer software has experienced an arms race between exploitation techniques leveraging memory corruption and detection/protection mechanisms. Effective mitigation techniques, such as Address Space Layout Randomization, have significantly increased the difficulty of successfully exploiting a vulnerability. A modern exploit is often two-stage: a first informati...
متن کاملHow the ELF Ruined Christmas
Throughout the last few decades, computer software has experienced an arms race between exploitation techniques leveraging memory corruption and detection/protection mechanisms. Effective mitigation techniques, such as Address Space Layout Randomization, have significantly increased the difficulty of successfully exploiting a vulnerability. A modern exploit is often two-stage: a first informati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Philosophy of Science
سال: 2023
ISSN: ['0031-8248', '1539-767X']
DOI: https://doi.org/10.1017/psa.2023.1