Title: " D7.14b: Idem-identity and Ipse-identity in Profiling Practices " Author: Wp7 Copyright Notice Members of the Fidis Consortium Versions Version Date Description (editor)

نویسنده

  • Jozef Vyskoc
چکیده

Deliverables 7.14a and 7.14b seek to detect in which way the new type of profiling that is the subject of FIDIS work package 7 – machine profiling based on data mining techniques – is different from previous ways of profiling, and how this relates to the construction of our identity. The concepts of idem and ipse, coined by the French philosopher Ricoeur, are used to look into the issue of human identity as something that emerges between a person and her environment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

FIDIS Future of Identity in the Information

Copyright © 2004-09 by the FIDIS consortium EC Contract No. 507512 The FIDIS NoE receives research funding from the Community’s Sixth Framework Program Title: “D17.4: Trust and Identification in the Light of Virtual Persons” Author: WP17 Editors: David-Olivier Jaquet-Chiffelle (VIP, Switzerland) Hans Buitelaar (TILT, Netherlands) Reviewers: James Backhouse (LSE, England) Sandra Steinbrecher (TU...

متن کامل

FIDIS Future of Identity in the Information Society

Title: “D13.6: Privacy modelling and identity” Author: WP13 Editors: Marek Kumpošt (MU, Czech Republic) Vashek Matyáš (MU, Czech Republic) Stefan Berthold (TU Dresden, Germany) Reviewers: Hans Buitelaar (Tilburg U., Netherlands) Claudia Diaz (COSIC, KU Leuven) Identifier: D13.6 Type: [Deliverable-Report] Version: 1.0 Date: Thursday, 22 November 2007 Status: [Final] Class: [Public] File: fidis-w...

متن کامل

مقایسه تطبیقی تصویرسازی علمی نسخه الحشایش آستان قدس رضوی با نسخه های الحشایش پیش از آن

Alhashaysh is a perdurable opus written by the Greek famous medicine man, and one the main resources of zoology and phytology. Most Islamic scientists and medicine men exploited this book of interest as a reliable resource in their publications. The book has been frequently translated and copied in the Islamic civilization. The most important translation was that by M. Ben Mansour, the governor...

متن کامل

A Firewall Configuration Strategy for the Protection of Computer Networked Labs in a College Setting*

*Copyright © 2001 by the Consortium for Computing in Small Colleges. Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the CCSC copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Consortium for Computing in Small ...

متن کامل

Embedded Systems Programming

*Copyright © 2001 by the Consortium for Computing in Small Colleges. Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the CCSC copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Consortium for Computing in Small ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009