Personal Information as Symmetry Breaker in Disagreements

Philosophy ◽  
2021 ◽  
pp. 1-20
Author(s):  
Diego E. Machuca

Abstract When involved in a disagreement, a common reaction is to tell oneself that, given that the information about one's own epistemic standing is clearly superior in both amount and quality to the information about one's opponent's epistemic standing, one is justified in one's confidence that one's view is correct. In line with this natural reaction to disagreement, some contributors to the debate on its epistemic significance have claimed that one can stick to one's guns by relying in part on information about one's first-order evidence and the functioning of one's cognitive capacities. In this article, I argue that such a manoeuvre to settle controversies encounters the problem that both disputants can make use of it, the problem that one may be wrong about one's current conscious experience, and the problem that it is a live possibility that many of one's beliefs are the product of epistemically distorting factors. I also argue that, even if we grant that personal information is reliable, when it comes to real-life rather than idealized disagreements, the extent of the unpossessed information about one's opponent's epistemic standing provides a reason for doubting that personal information can function as a symmetry breaker.

Mathematics ◽  
2021 ◽  
Vol 9 (11) ◽  
pp. 1242
Author(s):  
Ramandeep Behl ◽  
Sonia Bhalla ◽  
Eulalia Martínez ◽  
Majed Aali Alsulami

There is no doubt that the fourth-order King’s family is one of the important ones among its counterparts. However, it has two major problems: the first one is the calculation of the first-order derivative; secondly, it has a linear order of convergence in the case of multiple roots. In order to improve these complications, we suggested a new King’s family of iterative methods. The main features of our scheme are the optimal convergence order, being free from derivatives, and working for multiple roots (m≥2). In addition, we proposed a main theorem that illustrated the fourth order of convergence. It also satisfied the optimal Kung–Traub conjecture of iterative methods without memory. We compared our scheme with the latest iterative methods of the same order of convergence on several real-life problems. In accordance with the computational results, we concluded that our method showed superior behavior compared to the existing methods.


2020 ◽  
Vol 7 (1) ◽  
pp. 29-48 ◽  
Author(s):  
Leonhard Menges

AbstractA standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent is easily available to another person, but not accessed. Critics contend that control accounts have the implausible implication that the privacy of the relevant agent is diminished in threatened loss cases. Recently, threatened loss cases have become important because Edward Snowden’s revelation of how the NSA and GCHQ collected Internet and mobile phone data presents us with a gigantic, real-life threatened loss case. In this paper, I will defend the control account of privacy against the argument that is based on threatened loss cases. I will do so by developing a new version of the control account that implies that the agents’ privacy is not diminished in threatened loss cases.


2021 ◽  
Author(s):  
Sophie Viktoria Binder ◽  
Markus Schott ◽  
Christiane Eichenberg

BACKGROUND Research proves the effectiveness of psychological interventions in online settings. There is some evidence that people disclose more personal information online than in real life, however, the results appear inconsistent. OBJECTIVE The primary aim was to find out whether people in online counseling disclosed more than individuals receiving “face-to-face” counseling, whether there were differences between the two settings in regard to counseling outcome and whether people in online counseling disclosed more about the counseling to confidants. METHODS A survey was carried out in various counseling centers offering both online and “face-to-face” services. The Disclosure to Therapist Inventory-VI was used to assess the amount of self-disclosure in both settings. Clients’ attitudes towards revealing counseling aspects to other people in their lives were assessed using the Disclosure About Therapy Inventory. In total N= 80 respondents completed the survey, 31 participants received online counseling (38.8%), 49 people had “face-to-face“ counseling (61.3%). RESULTS Contradicting the hypothesis, the present study disproved the assumption that self-disclosure is higher in online counseling. Whereas both samples showed similar levels of disclosure on different counseling topics, clients in “face-to-face” situations revealed significantly more about two topics: self-actualization vs. adaptation (P= .010, d= 0.6) and self-doubt/shortcomings (P= .003, r= 0.33). Two treatment characteristics, namely counseling duration and motives affected the degree of disclosure. In regard to the counseling outcome participants were moderately satisfied in both groups. People in “face-to-face” counseling reported significantly better treatment outcome in regard to the increased capacity to relate well to others (P= .026, r= 0.25). The assumption that a higher level of self-disclosure is associated with better treatment outcomes was verified only for online counseling (P= .024, ß= .470). Clients in both settings disclosed moderately about aspects of their counseling to confidants with no significant differences between the two groups. CONCLUSIONS The present study could not prove the online disinhibition effect for the counseling setting. As the number of studies conducted on this topic is relatively small the present study calls for further research on larger samples. Thereby, incongruities on self-disclosure can be clarified, possibly leading to the revision of current theories or the development of new ones.


Author(s):  
Yu Niu ◽  
Ji-Jiang Yang ◽  
Qing Wang

With the pervasive using of Electronic Medical Records (EMR) and telemedicine technologies, more and more digital healthcare data are accumulated from multiple sources. As healthcare data is valuable for both commercial and scientific research, the demand of sharing healthcare data has been growing rapidly. Nevertheless, health care data normally contains a large amount of personal information, and sharing them directly would bring huge threaten to the patient privacy. This paper proposes a privacy preserving framework for medical data sharing with the view of practical application. The framework focuses on three key issues of privacy protection during the data sharing, which are privacy definition/detection, privacy policy management, and privacy preserving data publishing. A case study for Chinese Electronic Medical Record (ERM) publishing with privacy preserving is implemented based on the proposed framework. Specific Chinese free text EMR segmentation, Protected Health Information (PHI) extraction, and K-anonymity PHI anonymous algorithms are proposed in each component. The real-life data from hospitals are used to evaluate the performance of the proposed framework and system.


Symmetry ◽  
2019 ◽  
Vol 11 (2) ◽  
pp. 246 ◽  
Author(s):  
Nizam Ghawadri ◽  
Norazak Senu ◽  
Firas Fawzi ◽  
Fudziah Ismail ◽  
Zarina Ibrahim

The primary contribution of this work is to develop direct processes of explicit Runge-Kutta type (RKT) as solutions for any fourth-order ordinary differential equation (ODEs) of the structure u ( 4 ) = f ( x , u , u ′ , u ′ ′ ) and denoted as RKTF method. We presented the associated B-series and quad-colored tree theory with the aim of deriving the prerequisites of the said order. Depending on the order conditions, the method with algebraic order four with a three-stage and order five with a four-stage denoted as RKTF4 and RKTF5 are discussed, respectively. Numerical outcomes are offered to interpret the accuracy and efficacy of the new techniques via comparisons with various currently available RK techniques after converting the problems into a system of first-order ODE systems. Application of the new methods in real-life problems in ship dynamics is discussed.


2021 ◽  
Author(s):  
Elena Zaborova

The paper aims to analyze positive and negative characteristics of Internet information, consider the peculiarities of social and historical change of knowledge, and identify the specifics of the phenomenon of human academic literacy. In the modern information and digital age, the role and importance of information is increasing at a rate that has allowed scientists to describe the situation as the information explosion. The dramatic increase in the volume of information was made possible by the fact that a wide range of users with their personal information materials have gained access to the Internet. The speed of obtaining information has also increased; it is transmitted in real-life mode. These and many other characteristics of modern information flows can undoubtedly be assessed as positive trends, but the negative aspects of information processes are also increasing. The abundance of information gives rise to its excess and the problem of its selection. The availability of information does not guarantee its reliability; there is a lot of false, distorted information in the Internet. Analyzing whether the wide access and abundance of Internet information implies increasing academic literacy, the author concludes that people tend to become much more informed, but the path to academic literacy is becoming longer. Academic literacy is what a person learned in the course of education and what became the basis for his/her daily life and self-awareness. The excess of information creates a problem of qualitative selection, which requires additional time. The abundance of unreliable, fake information requires its careful verification. Public morals are the most important element of academic literacy, but there are virtually no filters in the Internet that block immoral information, cruelty, Internet trolling. As a result, learning by processing Internet information makes the process of creating academic literacy much more challenging and complex. Keywords: information age, information, digital technologies, academic literacy


The problem of mining sequential patterns from medical data has received a lot of attention as it aims to discover the causal relationship between different diseases or symptoms that are present in the patient’s body. Medical data contains the records pertaining to the information of the diseases or the symptoms of the patients besides the patients’ personal information. The records are ordered in accordance with the time and date of the patients’ visit in the hospital. Such data may offer precious information related to the cause and effect of a disease on the human body. Although, the date and time gives us chronological ordering of the occurrence of the diseases in the human body, it does not provide the information about the time intervals within which the successive diseases may occur. If the time gap of cause and effect is found to be too large, the concerned sequential pattern would be un-realistic. Considering, the time attributes of medical data, we try to address the above-mentioned problem on the sequential patterns. In this paper, we propose a method of extracting sequential patterns from medical dataset, with time-restrictions. The method extracts all sequences of diseases which occur within user-specified time intervals. The efficacy of our method is established with an experiment conducted on real life medical datasets


2020 ◽  
Author(s):  
Xiaoyang Yu

The first-order change is the change of the state of a physical object (or pattern) which is governed by the physical laws (or rules). The second-order change is the change of the state of a physical object (or pattern) which breaks the physical laws (or rules), so it is impossible in real world. In Conway’s Game of Life, within a pattern (pattern-A), a deterministic algorithm (algorithm-A) is used to solve a problem of the real world. (Actually, this problem will be automatically solved by the first-order change.) Inside algorithm-A, a model (model-AW) is created to represent the real world, and a second-order change can be applied to model-AW. If algorithm-A realized itself to be a deterministic algorithm inside a pattern, and realized that a second-order change is impossible to the real world, while a second-order change is possible to its model of the real world (model-AW), then algorithm-A can distinguish the real world and its model (model-AW) conceptually through this difference. The physical interactions among any number of elementary particles are governed by physical laws. If the time in our universe is discrete, our universe is a stochastic cellular automaton, and each generation is computed out based on the precedent generation and updating rules; let us call this computation the first-order computation. Conscious experience and the feeling of free will, are the results of the first-order computation; they have no impact to the first-order computation. Due to the completely subjective nature of the conscious experience, it’s impossible to reach any agreement on the nature of the conscious experience between any two individuals.


Author(s):  
Muhammad Junaid Mughal ◽  
Nasser Karimian

The paper seeks to explore the hidden assumptions that are imbedded in a modern, atheistic, naturalistic philosophical outlook, and the conclusions of which are often overlooked. Particularly, the authors highlight that a philosophically naturalistic outlook leads to untenable conclusions regarding human morality, volition, and subjective conscious experience. The analysis finds that a modern approach, if taken to its logical conclusion, would leave humanity bereft of meaning. The authors argue that the naturalistic approach requires leaps of faith regarding human cognitive capacities, as it assumes sound reasoning without justification to such a premise. The authors conclude that religious grounding, specifically an Islamic conceptual framework, is necessary to account for consciousness, logic, and morality, while the abandonment of this tradition along with the metaphysical foundation it provides leaves the modern man struggling to justify rationality, moral arguments, and even basic articulation with which he rejects faith in God. Thus, the authors conclude that modernity, while commended for its advancements in the sciences, must not lose the metaphysical underpinnings upon which it is founded.


2019 ◽  
Vol 17 (05) ◽  
pp. 1940017
Author(s):  
Ali Saleh Alshomrani ◽  
Ioannis K. Argyros ◽  
Ramandeep Behl

Our principle aim in this paper is to present a new reconstruction of classical Chebyshev–Halley schemes having optimal fourth and eighth-order of convergence for all parameters [Formula: see text] unlike in the earlier studies. In addition, we analyze the local convergence of them by using hypotheses requiring the first-order derivative of the involved function [Formula: see text] and the Lipschitz conditions. In addition, we also formulate their theoretical radius of convergence. Several numerical examples originated from real life problems demonstrate that they are applicable to a broad range of scalar equations, where previous studies cannot be used. Finally, a dynamical study of them also demonstrates that bigger and more promising basins of attractions are obtained.


Sign in / Sign up

Export Citation Format

Share Document