A Trojan Horse for Sociology? Preferences versus Evolution and Morality
نویسنده
چکیده
Herbert Gintis and Dirk Helbing have developed a highly impressive, over-arching theoretical framework, using rational choice theory, general equilibrium theory, and game theory. They extend this to cover “moral, social and other-regarding values,” plus social norms, culture, and institutions. While accepting the value of their contribution, I argue that there is a tension within their work between their depiction of the rational choice framework as a general “expression” of behavior and searching for explanations of, and detailed motivations for, particular phenomena such as punishment, altruism or moral sentiments. There is also a danger of over-generalization where a framework is stretched to cover every possible behavior. Indeed, rational choice theory with “otherregarding” preferences is strictly unfalsifiable. Furthermore, because “other regarding” agents are also depicted as maximizing their own utility, this framework cannot encompass adequate notions of altruism or morality. Instead, we should follow Darwin in seeking to explain the evolution of morality as a distinctly human motivation. The article concludes with a discussion of the implications of the Gintis–Helbing arguments for the future of sociology as a separate discipline.
منابع مشابه
ELT: A Trojan Horse in Disguise?
Many people believe that language teaching is a neutral practice. However, this belief is not without its own opponents. To many scholars, teaching languages cannot be devoid of teaching cultural values of the target language, which tacitly aims at denigrating cultural values of the community of the learners who are learning it. The ultimate purpose of such cultural oppression, according to the...
متن کاملThe Trojan Horse of Time–Risk Preference Representations
Throughout the management sciences, individuals and organizations compare alternatives with consequences that are risky and unfold over time. This tutorial examines representations of preferences that are sensitive to timing and risk. It reviews the logical foundations of the two major contending representations and finds that each of them is self-contradictory. In particular, properties of pre...
متن کاملTransfer Reactions and Trojan Horse Method
It is pointed out that the Trojan-Horse method is a suitable tool to investigate subthreshold resonances. TRANSFER REACTIONS AND TROJAN HORSE METHOD A similarity between cross sections for two-body and closely related three-body reactions under certain kinematical conditions [1] led to the introduction of the Trojan-Horse method [2, 3, 4]. In this indirect approach a two-body reaction
متن کاملOrigin and Evolution of Trojan Asteroids
The regions around the L4 and L5 Lagrangian points of Jupiter are populated by two large swarms of asteroids called the Trojans. They may be as numerous as the main-belt asteroids and their dynamics is peculiar, involving a 1:1 resonance with Jupiter. Their origin probably dates back to the formation of Jupiter: the Trojan precursors were planetesimals orbiting close to the growing planet. Diff...
متن کاملSOC IC Trojan Thwarting by Identification of Trojan
IC Trojan horse is a serious technical problem faced by SOC developers. Most of the SOC developers use third party IP components for their design purpose. So comparing with a Trojan-less counterpart is impossible. Villasenor and Kim proposed bus architecture to detect Trojan activity where, when the circuit realizes the presence of a Trojan, it informs the CPU by an interrupt. In this paper, we...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015