1) La descarga del recurso depende de la página de origen
2) Para poder descargar el recurso, es necesario ser usuario registrado en Universia

Opción 1: Descargar recurso

Detalles del recurso


Edna Ullmann-Margalit introduced the notion of an invisible hand explanation (I-H explanation) to the philosophical literature in 1978, and made a distinction between "aggregate" and "functional-evolutionary" (F-E) forms of I-H explanations. The present paper produces a substantially refined analysis of the forms and functions of I-H explanations. Sections (1) and (2) introduce the ideas of I-H and aggregate I-H explanation, respectively. Section (J) argues that no one form of explanation can serve the explanatory functions Ullmanri-Margalit attributes to aggregate explanations, and divides those explanatory functions between genetic and "systematic-dispositional" explanations. Section (4) identifies difficulties with the idea of F-E explanation in the social realm, and shows that any I-H explanations fitting the F-E mold would constitute simply a special class of "aggregate" explanation.

Pertenece a

Caltech Authors  


Curren, Randall R. - 

Id.: 70084289

Versión: 1.0

Estado: Final

Tipo:  application/pdf - 

Tipo de recurso: Report or Paper  -  PeerReviewed  - 

Tipo de Interactividad: Expositivo

Nivel de Interactividad: muy bajo

Audiencia: Estudiante  -  Profesor  -  Autor  - 

Estructura: Atomic

Coste: no

Copyright: sí

Formatos:  application/pdf - 

Requerimientos técnicos:  Browser: Any - 

Relación: [References] http://resolver.caltech.edu/CaltechAUTHORS:20170912-135330205
[References] https://authors.library.caltech.edu/81369/

Fecha de contribución: 01-dic-2017


* Curren, Randall R. (1987) Invisible-Hand Explanations Reconsidered. Social Science Working Paper, 621. California Institute of Technology , Pasadena, CA. (Unpublished) http://resolver.caltech.edu/CaltechAUTHORS:20170912-135330205

Otros recursos que te pueden interesar

  1. Explanations of Unsupervised Learning Clustering applied to Data Security Analysis Network security tests should be periodically conducted to detect vulnerabilities before they are ex...
  2. Abduction, Bayesianism and Best Explanations in Physics This article claims the validity of abductive reasoning, or inference to the best explanation, as a ...
  3. Teaching categories to human learners with visual explanations We study the problem of computer-assisted teaching with explanations. Conventional approaches for ma...
  4. Reseña de Steinmann, P. Sykora and U. Weising (eds), Altruism Reconsidered, Exploring New Approaches to Property in Human Tissue, Surrey, Ashgate, 2010.
  5. Patty Hearst Reconsidered: Personal Identity in the Criminal Law

Otros recursos de la mismacolección

  1. An efficient streaming algorithm for spectral proper orthogonal decomposition A streaming algorithm to compute the spectral proper orthogonal decomposition (SPOD) of stationary r...
  2. First Dark Matter Constraints from SuperCDMS Single-Charge Sensitive Detectors We present the first limits on inelastic electron-scattering dark matter and dark photon absorption ...
  3. Spectral analysis of jet turbulence Informed by LES data and resolvent analysis of the mean flow, we examine the structure of turbulence...
  4. On the Typical Size and Cancelations Among the Coefficients of Some Modular Forms We obtain a nontrivial upper bound for almost all elements of the sequences of real numbers which ar...
  5. Limitations to mollifying ζ(s) We establish limitations to how well one can mollify the Riemann zeta-function on the critical line ...

Aviso de cookies: Usamos cookies propias y de terceros para mejorar nuestros servicios, para análisis estadístico y para mostrarle publicidad. Si continua navegando consideramos que acepta su uso en los términos establecidos en la Política de cookies.