Comment author: Username 17 August 2015 10:35:18AM 2 points [-]

The Puzzle of the Self-torturer talks about transitive and intransitive preferences.

Comment author: Username 17 August 2015 10:13:26AM *  3 points [-]

Bentham’s Fallacies, Then and Now by Peter Singer

Bentham collected examples of fallacies, often from parliamentary debates. By 1811, he had sorted them into nearly 50 different types, with titles like “Attack us, you attack Government,” the “No precedent argument,” and the “Good in theory, bad in practice” fallacy. (One thing on which both Immanuel Kant and Bentham agree is that this last example is a fallacy: If something is bad in practice, there must be a flaw in the theory.)

Bentham was thus a pioneer of an area of science that has made considerable progress in recent years. He would have relished the work of psychologists showing that we have a confirmation bias (we favor and remember information that supports, rather than contradicts, our beliefs); that we systematically overestimate the accuracy of our beliefs (the overconfidence effect); and that we have a propensity to respond to the plight of a single identifiable individual rather than a large number of people about whom we have only statistical information.

1824 edition of the book

Comment author: Username 17 August 2015 10:09:18AM 3 points [-]

The good, the bad, and the ineffective: social programs in America

Do people know which social interventions work just from hearing about them?

To do a test, we made the following game. We've described ten major US social interventions, and you'll have to guess whether they had a positive effect, no effect or negative effect.

The interventions were taken from those reviewed by the Campbell Collaboration, which brings together all the highest-quality research that's available on major social interventions to decide whether they're effective or not. We chose the top ten interventions that were easiest to explain and had the clearest conclusions, so it's clear what the answers are. There's no trick!

Comment author: Username 17 August 2015 10:06:37AM *  1 point [-]

Remote Exploitation of anUnaltered Passenger Vehicle by Dr. Charlie Miller and Chris Valasek

Target – 2014 Jeep Cherokee

The 2014 Jeep Cherokee was chosen because we felt like it would provide us the best opportunity tosuccessfully demonstrate that a remote compromise of a vehicle could result in sending messages thatcould invade a driver’s privacy and perform physical actions on the attacker’s behalf. As pointed out inour previous research [6], this vehicle seemed to present fewer potential obstacles for an attacker. Thisis not to say that other manufacturer’s vehicles are not hackable, or even that they are more secure,only to show that with some research we felt this was our best target. Even more importantly, the Jeepfell within our budgetary constraints when adding all the technological features desired by the authorsof this paper.

Network Architecture

The architecture of the 2014 Jeep Cherokee was very intriguing to us due to the fact that the head unit(Radio) is connected to both CAN buses that are implemented in the vehicle.

We speculated that if the Radio could be compromised, then we would have access to ECUs on both theCAN-IHS and CAN-C networks, meaning that messages could be sent to all ECUs that control physicalattributes of the vehicle. You’ll see later in this paper that our remote compromise of the head unit doesnot directly lead to access to the CAN buses and further exploitation stages were necessary. With thatbeing said, there are no CAN bus architectural restrictions, such as the steering being on a physicallyseparate bus. If we can send messages from the head unit, we should be able to send them to everyECU on the CAN bus

....

Conclusion

This paper was a culmination of three years of research into automotive security. In it, wedemonstrated a remote attack that can be performed against many Fiat-Chrysler vehicles. The numberof vehicles that were vulnerable were in the hundreds of thousands and it forced a 1.4 million vehiclerecall by FCA as well as changes to the Sprint carrier network. This remote attack could be performedagainst vehicles located anywhere in the United States and requires no modifications to the vehicle orphysical interaction by the attacker or driver. As a result of the remote attack, certain physical systems such as steering and braking are affected. We provide this research in the hopes that we can learn tobuild more secure vehicles in the future so that drivers can trust they are safe from a cyber attack whiledriving. This information can be used by manufacturers, suppliers, and security researchers to continuelooking into the Jeep Cherokee and other vehicles in a community effort to secure modern automobiles

Comment author: Username 17 August 2015 09:47:26AM 9 points [-]

Fifty psychological and psychiatric terms to avoid: a list of inaccurate, misleading, misused, ambiguous, and logically confused words and phrases by Scott O. Lilienfeld1, Katheryn C. Sauvigné, Steven Jay Lynn, Robin L. Cautin, Robert D. Latzman and Irwin D. Waldman

The goal of this article is to promote clear thinking and clear writing among students and teachers of psychological science by curbing terminological misinformation and confusion. To this end, we present a provisional list of 50 commonly used terms in psychology, psychiatry, and allied fields that should be avoided, or at most used sparingly and with explicit caveats. We provide corrective information for students, instructors, and researchers regarding these terms, which we organize for expository purposes into five categories: inaccurate or misleading terms, frequently misused terms, ambiguous terms, oxymorons, and pleonasms. For each term, we (a) explain why it is problematic, (b) delineate one or more examples of its misuse, and (c) when pertinent, offer recommendations for preferable terms. By being more judicious in their use of terminology, psychologists and psychiatrists can foster clearer thinking in their students and the field at large regarding mental phenomena.

Comment author: Username 15 August 2015 03:59:47PM *  2 points [-]

Murder is basically a victimless crime, because when you murder someone, there is no one left to be a victim. Murderers should be punished only for inconveniences that murder caused to other people who are still living.

Causing extinction of humanity would be a perfect victimless crime.

Comment author: Lumifer 05 August 2015 11:48:38PM 1 point [-]

the nearest thing to aggression on this topic has been VoR ranting

Rants are not aggression but free speech :-) Confusing the two is a common mistake/tactic :-P

neoreaction is above and well here

I think that used to be true, but is no longer true. As far as I can see, VoiceOfRa is the lone neoreactionary actively posting.

Comment author: Username 14 August 2015 10:15:31PM *  2 points [-]

As far as I can see, VoiceOfRa is the lone neoreactionary actively posting.

He isn't. Neoreactionaries are normal people.

Comment author: fubarobfusco 13 August 2015 12:44:55AM 2 points [-]

Metrication of industrial products: clear benefit.

Metrication of road signage: somewhat less clear benefit.

Metrication of kitchen units: no.

Comment author: Username 13 August 2015 11:57:51AM 3 points [-]

Metrication of kitchen units: no.

Why?

Comment author: Username 11 August 2015 04:34:20AM 1 point [-]

If I have an account but want to change my user name, is there a way to do that?

Comment author: Username 13 August 2015 01:00:14AM 0 points [-]

WELP.

Comment author: Username 12 August 2015 07:21:05PM *  1 point [-]

Tacit Knowledge: A Wittgensteinian Approach by Zhenhua Yu

In the ongoing discussion of tacit knowing/knowledge, the Scandinavian Wittgensteinians are a very active force. In close connection with the Swedish Center for Working Life in Stockholm, their work provides us with a wonderful example of the fruitful collaboration between philosophical reflection and empirical research. In the Wittgensteinian approach to the problem of tacit knowing/knowledge, Kell S. Johannessen is the leading figure. In addition, philosophers like Harald Grimen, Bengt Molander and Allan Janik also make contributions to the discussion in their own ways. In this paper, I will try to clarify the main points of their contribution to the discussion of tacit knowing/knowledge.

...

Johannessen observes:

It has in fact been recognized in various camps that propositional knowledge, i.e, knowledge expressible by some kind of linguistic means in a propositional form, is not the only type of knowledge that is scientifically relevant. Some have, therefore, even if somewhat reluctantly, accepted that it might be legitimate to talk about knowledge also in cases where it is not possible to articulate it in full measure by proper linguistic means.

Johannessen, using Polanyi’s terminology, calls the kind of knowledge that cannot be fully articulated by verbal means tacit knowledge.

View more: Prev | Next