Authenticity and Aspiration

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

‏‎thematization strategies, textual authenticity, and comprehensibility‎‏

‏‎the investigation would certainly offer implications for translation, where the translators mostly adhere to only the ideational meaning of the sl text neglecting its textual meaning, a practice which mostly leads to target language texts which have lower readability(compared with their source language counterparts) due to their displaced thematization strategies.‎‏

Existential Autonomy and Authenticity

Synposis: The goal of this book is to show that key ideas about the nature of selves and responsibility for character in the existential tradition can be reconstructed and defended with the kind of hierarchical theory of personal autonomy proposed by Harry Frankfurt, Gerald Dworkin, and since developed by many others. But to solve the regress problem with hierarchical analyses of autonomy, whil...

متن کامل

Truth, Authenticity, and Rationality

Emotions are Janus-faced. They tell us something about the world, and they tell us something about ourselves. This suggests that we might speak of a truth, or perhaps two kinds of truths of emotions, one of which is about self and the other about conditions in the world. On some views, the latter comes by means of the former. Insofar as emotions manifest our inner life, however, we are more inc...

متن کامل

Authenticity and computer art

Computer art is often seen as inauthentic, even strictly impossible, because it lacks certain essential features of genuine art. For instance, it’s said that computers don’t hav e emotions; that any work of art is a human communication rooted in human experience; that computer art isn’t unique, because a program could churn out its products indefinitely; and that programs can’t generate fundame...

متن کامل

Relaxed Authenticity

In-network data aggregation allows energy-efficient communication within a sensor network. However, such data aggregation introduces new security challenges. As sensor nodes are prone to node-compromise, a fraction of nodes might act maliciously and forge aggregated data. For arbitrary aggregation functions, the verification of authenticity of aggregated data, i.e., its correctness, integrity, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Girlhood Studies

سال: 2018

ISSN: 1938-8209,1938-8322

DOI: 10.3167/ghs.2018.110103