’s “Objectivity” Essay, Research Paper
It is impossible for me to say whether or not I agree completely with Ian Hacking’s work, not having read Kuhn’s work, Foucault’s work or even Hacking’s work in it’s entirety, however by examining Hacking’s claims individually, it may be possible to draw conclusions through the analyzation of his arguments. Ian Hacking’s most prevalent claim seems to be that “we ‘make up people’ in a stronger sense than we ‘make up’ the world.” By proving this, hacking is attempting to show why Kuhn was unsuccessful in historicizing out understanding of natural science. Hacking claims that perhaps it was impossible for Kuhn to succeed. Hacking maintains that in natural sciences, we create new phenomena, but it doesn’t change the way that the world works. The objects of the natural sciences are “created in time”, but are not “constituted historically”. In other words, we create phenomena through the use of experimental apparatus, but the creation of that phenomena, doesn’t change what makes it work, although it could change the understanding of how it works. Hacking seems to be saying that natural sciences are somewhat static, if a new understanding of a phenomenon is created, it doesn’t change the phenomenon, nor does it change the workings of the experimental apparatus. This sounds obvious, since although, thinking about or creating a theory about the way something works may cause the social world to change, there is no way for it to change the physical world. For example, when Bohr created his model of the atom, he decided that the electron was going to travel around the nucleus in a circular orbit, now we feel that although this model may hold for Hydrogen mathematically and experimentally, it does not hold true for atoms with more than one electron. Instead, we must turn to the model of electron clouds and probability densities. Looking at these conclusions, neither theory ever changed the actual way in which the electron orbits the nucleus, it merely changed the way in which we understood it. Hacking felt very differently about the social sciences. Ian Hacking felt that as we create new classifications and categories in the social sciences, we generate new kinds of people and new kinds of actions. Hacking maintains that, in the social sciences, objects are constituted by historical process. The objects he is referring to are people and groups of people. So by creating new groups or classifications, we are making these people into new kinds of people. Hacking is saying that the social sciences are dynamic. He is claiming that the social sciences are changing, as the natural sciences do, but are also creating a change within the field that they are studying, unlike the the natural sciences. This could be considered similar to the Uncertainty Principle, for it implies that we can never know the exact position and velocity of a particle, because by measuring such things we effect them, as studying social sciences effects the society. Hacking sometimes defends Kuhn’s points or perhaps looks at them in a more defendable sort of way. For example, Kuhn’s temptations to say that not only are revolutions changes in world view, but they are also changes in the world. Kuhn arrives at this idealism, by saying that people see the world differently after a revolution and he gives the example of Volta’s electric battery. This suggests that Kuhn is an idealist, because it implies that as people’s views of the world change, then so does the world itself. Hacking doesn’t think that Kuhn is an idealist in this respect, because he says that Kuhn is not among the group of people who challenge the “absolute existence” of scientific phenomena. Hacking is really stretching his method of defending Kuhn and perhaps even stretching Kuhn’s own beliefs a bit, because it seems to me that Kuhn would fall very close to the category of being a idealist. Hacking insists that one of the chief activities of an experimenter is to create phenomena that didn’t exist before. He says, “most of physical science is about phenomena that did not exist until people brought it into being” and he goes on to give the examples of the photoelectric effect, the Zeeman effect, the Compton effect, and the Josephson effect. Hacking believes that the effects are phenomena which do not exist in a pure state in “unpolluted nature”. He also says that the “physical phenomena are resilient to theoretical change” and “the phenomena which we have created will still exist and the inventions will still work” even while our understandings of them change. I think that there is more interpretation to be done about the effects. It seems to me that it is impossible to “create” an effect. How can we create something and not be able to destroy it? How can we do any more than simply discover the way that nature works by reproducing it in a controlled environment? Hacking argues that the creation and study of phenomena is what physics has come to be about, however I say that physics is about purifying and controlling the effects that already exist in nature. Let’s take the photoelectric effect, for example. How can Hacking be sure that a photon from the sun has never hit a piece of iron ore and released and electron? The earth is constantly bombarded with photons, and I’m sure that many of them are of the proper energy to free electrons from the vast amounts of metal on this planet. Therefore, it seems reasonable to me that this phenomenon happens all the time and has been happening for a long time. If Hacking wants to define creation as a discovery through the use of experimental apparatus, then perhaps we create these phenomena but I don’t feel that this is a suitable definition for creation. Thus, I cannot agree completely with Hacking’s argument.
Ian Hacking holds a different view on the social sciences. He believes that the problem with scholastic nominalism is that “it leaves our interactions with, and descriptions of, the world a complete mystery.” Thus, Hacking introduces “dynamic nominalism” to describe the two way interaction occurring when “categories of people come into existence at the same time as kinds of people come into being to fit those categories.” To illustrate this, Hacking gives the examples of how 4000 different motives for murder exist in the nineteenth century, how many new classifications and subdivisions for madness are created, and how, in the decennial census, the categories of people change every ten years. Hacking insists that social change generates new categories of people and people chose to fall into these categories. He gives the example of cases of multiple personalities. He says that no more than one or two cases were reported per year until 1875 when public attention was given to Felida X and Pierre Janet, a distinguished psychiatrist. The number or reported cases jumped. I agree with Hacking in saying that, by creating new categories, we are in fact creating new kinds of people and I think that this works in the reverse as well. As the social world changes and as people change, it is necessary to create new categories to describe them. However, Hacking claims that “only after the doctors had done their work was there this syndrome for a disturbed person to adopt.” I have to point out that earlier he said that there were one or two cases every year and over a long period of time, that number cannot be considered trivial. When hacking concludes, he seems to give in a little on his opinions and ideas. He says, “we remake the world but we make up people.” This doesn’t sound exactly like his argument at the beginning of his work. Despite Hacking’s radical views, he leaves everything that he discusses open to interpretation. Perhaps, I am not well versed in the field of philosophy, or writing about it for that matter, but it seems to me that defending a radical point should contain evidence and a conclusion which leaves very little doubt in ones mind. Hacking leaves his opinions open-ended and this takes away from the solidity and stability of his argument. By stating this, I am not saying that I could have done any better, merely that he could have.
334
Другие работы по теме:
Cyberterrorism
Computer crimes -> , hacking Defined broadly, the term "computer crime" could reasonably include a wide variety of criminal offenses, activities, or issues. The potential scope is even larger when using the frequent companion or substitute term "computer-related crime." Given the pervasiveness of computers in everyday life, even in the lives of those who have never operated a computer, there is almost always some nontrivial nexus between crime and computers.
Crimes With Computers Essay Research Paper Computer
Crimes With Computers Essay, Research Paper Computer Crime Technology experienced a break-through with the invention of computers. With this break-through came a new quest for knowledge and power. Society relies more and more on computers each day and people have found that a quest for knowledge or power on a computer could give them more than they bargained for.
Hacking Essay Research Paper In the following
Hacking Essay, Research Paper In the following file, all references made to the name Unix, may also besubstituted to the Xenix operating system. Brief history: Back in the early sixties, during the development of thirdgeneration computers at MIT, a group of programmers studying the potential ofcomputers, discovered their ability of performing two or more taskssimultaneously.
Misuse Of Computers
– Hackers Essay, Research Paper In every advance that civilization has made there have been the dishonest and the greedy who quickly learn how to take advantage of the new breakthroughs. The new world of computer technology is no exception. As many people see it, alongside the brilliant programmers came hackers.
Teenage Piracy Essay Research Paper How does
Teenage Piracy Essay, Research Paper How does teenage piracy counteract with society? Is it flawless or does our society bring these young minds out of our world and label them as outcasts?
Statutes On Hacking Essay Research Paper Legislative
Statutes On Hacking Essay, Research Paper Legislative attention to computer crimes grew dramatically in the early 1980s, as computers became increasingly central to the conduct of business and politics. Instances of hackers, especially among young people, accessing government computer files for sport were becoming alarmingly frequent.
Hacking Essay Research Paper HackingThe Technology Age
Hacking Essay, Research Paper Hacking The Technology Age, and the Downfall of the U.S. In today’s society, people are always trying to improve technology, but in doing so, are they creating something that can be used to create mass destruction for the United States? Everyday computers get faster, new programs are written, or some scientist finds a way to make a job be done quicker.
School Violence Essay Research Paper I went
School Violence Essay, Research Paper I went up to a college this summer to look around, see if it was where I wanted to go and whatnot. The guide asked me about my interests, and when I
Loophole Or A Conspiracy Essay Research Paper
Loophole Or A Conspiracy? Virus, Hmmm I am sure that you have heard this word before. I am not talking about the living virus like an influenza virus. I am talking about the computer virus. According to the New York Times, Microsoft, Compaq, and Hewlett Packards computers are at a great risk. I wonder why we the consumer, are in this position? I cannot come up with one straight answer.
Hacking To Peaces Essay Research Paper Hacking
Hacking To Peaces Essay, Research Paper Hacking to Peaces The “Information Superhighway” possesses common traits with a regular highway. People travel on it daily and attempt to get to a predetermined
Hacking Essay Research Paper Imagine this you
Hacking Essay, Research Paper Imagine this, you are driving along the road and suddenly you see something spectacular. Now imagine that you are not allowed to deviate from your course to
How To Hack Gameshark Essay Research Paper
How to Hack Gameshark CodesThis “How To” was created by Jerry Bond, one of the gameshark code creators of this site. There may be more coming soon.1. Choosing the kind of hacker to be:There are three kinds of hackers, those who type in anything and hope for agood code (FreeStyle Hackers), those who modify pre-made codes (PlanedHackers) and those who do both (ComboHackers).
The True Hacker A Distortion Of Reality
Essay, Research Paper Over the years, to this date, the media has distorted the definition of a hacker. It has been morphed and demonized to someone who terrorizes cyberspace. However, the true hacker is someone who seeks knowledge and information. When hackers hack into systems or networks, it is to explore an operating system that is foreign to them.
What Really Is A Hacker Essay Research
Paper What Really is a Hacker? Dan Parks Julie Jackson – Instructor CIS 101 11-18-96 There is a common misconception among the general public about what constitutes a hacker and what hacking is. Hacking is defined as “gaining
Computer Hacking Essay Research Paper As the
Computer Hacking Essay, Research Paper As the world becomes more and more reliant on computers the computer hacking industry is greatly rising. With people such as Kevin Mitnick, who is known as a “computer
Hackers Essay Research Paper The popular definition
Hackers Essay, Research Paper The popular definition of a hacker has a negative connotation in today’s society, but computer hackers aren’t criminals by their definition of the word. Their definition deals with how someone
Information Technlogy And Hack Essay Research Paper
Hacking has become a major issue in today s world of technology. Even software giant Microsoft has been affected. Recently hackers broke into Microsoft s computer system. The hacker or hackers created new accounts so that they could gain access to parts of the software giant s computer network. Some accounts were being created that did not match or normal audit logs, Mr.
Hackers Essay Research Paper In the article
Hackers Essay, Research Paper In the article that I read was about Hackers. It talked about the aspects of how the youths of today commit this crime. Hacking overall requires the utmost intelligent. These people that become Hackers have special knowledge and skills in computer programming, Internet use, overwhelmingly bright in mathematics and other important factors.
Essay On Hacking Essay Research Paper Essay
Essay On Hacking Essay, Research Paper Essay On Hacking by Philip Smith A topic that i know very well is computers and computer hacking. Computers seem very complicated and very hard to learn, but, if given time a
Landscaping Essay Research Paper Computer Hacking BasicsComputer
Landscaping Essay, Research Paper Computer Hacking Basics Computer hacking is very popular. With every thing on the Internet having to cost something. Someone will try to hack that database and retrieve free information. As every on knows but doesn?t take very seriously is that hacking is illegal. Hacking is anywhere from hacking in to the school data base and change your grades to make a stop light change with a special clicker.
Hacking Essay Research Paper Hacking has been
Hacking Essay, Research Paper Hacking has been developed over the years to be unstoppable. Newcomers to the hacking community learn the rules by associating with established hackers. Hackers like to hack in order to impress each other.
A History Of Hacking Essay Research Paper
A history of hacking Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country’s brand new phone system by enraged authorities. Here’s a peek at
Hacking Essay Research Paper There are two
Hacking Essay, Research Paper There are two different worlds of computer enthusiasts, that of hacking and of cracking. Hacking is the pursuit to further one s knowledge of a system, usually a computer. Hackers (see appendix) are generally much smarter then your average person and try to further the limits of a system through their understanding.
Computer Hacking Essay Research Paper Computer hacking
Computer Hacking Essay, Research Paper Computer hacking is a very major crime in today’s world. It takes a large amount of intelligence and dedication to be a hacker. Not just anyone can store thousands of commands and codes in their head. Because these hackers are so intelligent it makes them even more dangerous.
Computer Crime 3 Essay Research Paper Ever
Computer Crime 3 Essay, Research Paper Ever since I got my first computer. I have enjoyed working on them. I have learned a tremendous amount of trouble shooting. With my recent computer I have come across computer crime. I got interested in hacking, prhreaking, and salami slicing. But before I go to far, I need to learn more about it like the consequences? One question in mind is what crimes are their and what kind of things you can do with them? I would like to find out why people do thesis things? I would also like to learn the laws against all computer crime?
Evil Dead Vs Evil Dead 2 Essay
, Research Paper Evil Dead in respect to Evil Dead 2 Main Character Personality Differences From the Original to the Remake Evil Dead and Evil Dead 2 are both late 80 s horror movies starring Bruce Campbell as Ash, a quiet guy in his early 20 s that ends up hacking to death his demon posessed friends to avoid death.
Creative Writing The Big Scoop Essay Research
Paper Creative Writing: The Big Scoop Hello, my name is Jack Williams. I am a reporter you have been hearing a lot about and this is how I gathered my information for my article on “Computers,
Argumentative Essay Research Paper Computer HackersWhat is
Argumentative Essay, Research Paper Computer Hackers What is a computer hacker? A hacker is a computer aficionado, a modern day Robin Hood, or an educated thug who breaks in to corporate and government computer systems using their home computer and a telephone modem. Despite this flurry of attention, their everyday life and social world remains largely unknown.