Defending Diversity

نویسندگان

  • Euan Heit
  • Ulrike Hahn
  • Aidan Feeney
چکیده

Why do some observations lead to broad generalizations whereas other observations do not have as much influence on people's beliefs? One principle of evaluating evidence is the diversity principle, which states that more diverse evidence should lead to stronger inferences than a narrow sample of evidence. For example, if you see someone repeatedly acting aggressively while giving lectures, you might infer that this behavior is simply the person's lecturing style and not draw broad inferences about the person in general. On the other hand, ifyou observe someone acting aggressively in diverse contexts, such as in a lecture, at a restaurant, and at a party, you might infer that this is indeed an aggressive person overall. There are two views on the diversity principle. The first is the normative view. The emphasis in this view is on why people ought to reason in accord with the diversity principle-that is, why it will lead to successful reasoning. The normative view encompasses historical evidence of expert scientific practice following the diversity principle, as well as various arguments and proofs intended to show that the diversity principle leads to useful inferences. The second view is descriptive. The descriptive view emphasizes showing the many situations in which ordinary reasoning does indeed follow the diversity principle. Typically, the descriptive view has relied on experimental evidence investigating various subject populations. This chapter is organized in terms of these views. The first two sections briefly summarize the positive cases for the normative view and the descriptive view. The following two sections describe some of the challenges to these views and offer some responses in defense of the diversity principle.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Independence from obfuscation: A semantic framework

A set of replicas is diverse to the extent that they implement the same functionality but differ in their implementation details. Diverse replicas are less likely to succumb to the same attacks, when attacks depend on memory layout and/or other implementation details. Recent work advocates using mechanical means, such as program rewriting, to create such diversity. A correspondence between the ...

متن کامل

Defending behaviors, bullying roles, and their associations with mental health in junior high school students: a population-based study

BACKGROUND Students should be encouraged to help prevent or stop bullying. However, defending victims of bullying can impact on mental health. It is not only bystanders who may defend victims, but bullies, victims and bully-victims can also have defending behaviors. Nevertheless, most studies of defending behaviors have been limited to an examination of the reactions of bystanders or those not ...

متن کامل

Discordance between morphological and mechanical diversity in the feeding mechanism of centrarchid fishes.

Morphological diversity is routinely used to infer ecological variation among species because differences in form underlie variation in functional performance of ecological tasks like capturing prey, avoiding predators, or defending territories. However, many functions have complex morphological bases that can weaken associations between morphological and functional diversification. We investig...

متن کامل

Chronomorphic Programs: Using Runtime Diversity to Prevent Code Reuse Attacks

Return Oriented Programming (ROP) attacks, in which a cyber attacker crafts an exploit from instruction sequences already contained in a running binary, have become popular and practical. While previous research has investigated software diversity and dynamic binary instrumentation for defending against ROP, many of these approaches incur large performance costs or are susceptible to Blind ROP ...

متن کامل

A Game Theory Based Approach to the Generation of Optimal DDoS Defending Strategy

With the growing threat of DDoS attacks, new attacking mechanisms emerge every day. In order to confront the ever-evolving DDoS attacks, it is insufficient to select defending strategy merely from existing strategy set. In this paper, we propose a method that generates new defending strategies and that selects the optimal one among them, thus increasing the defending ability. The Game Model for...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004