Descriptive or normative? Sample Clauses

Descriptive or normative?. The arguments in what follows will not always be clearly on one side of the norm- ative/descriptive divide. In general we will consider what a rational agent ‘ought’ to do (or might be best advised to do, which comes to the same thing); how- ever, given the avowed level of approximation required in the model, it could be somewhat unclear whether the outcomes of the theory are a recommendation for how ideal agents ought to behave, or how we might expect that they probably do behave. The theory we will develop could indeed be used in different ways along the de- scriptive/normative spectrum. At the descriptive end, we can see the theory as helping to explain why our evolution might have produced certain features and behaviours. We will see this most visibly cashed out in explanations of parts of linguistic behaviour and our mental categorisation process in Part II of the thesis. Towards the normative end, the image of rationality developed here is a depiction of optimality-under-constraint, which could (as suggested above) be seen as a yardstick for actual human behaviour. In a different vein, our findings could (in theory) be used to inform the design of an artificial intelligence, helping it to behave in an optimal manner within its computational constraints. To some extent, I am relatively relaxed about the possibilities here. Although the argument will use somewhat normative terminology, my own view of the theory’s predictions lies perhaps somewhere in the middle of the spectrum: it is more justificatory than normative as such. To the extent to which the theory will seem to explain an observable feature of human behaviour, we can potentially understand that behaviour in terms of the theory (descriptively),29 and can potentially view it as at least somewhat rational, with a degree of confidence determined by the level of approximation inherent in the original premises. The above being laid on the table, we will proceed in the next chapter to look at the basic model of memory, designed to fit within the general philosophical approach we wish to sell (that of memory as a rational design problem). The chapter will be as non-mathematical as possible, with the mathematical xxxx being held back until Chapter 4. 29This suggests the interesting question of how realist we can be about the model and its picture of memory as a decision process subject to rational control. Although we certainly do not engage in conscious cost–benefit calculations when encoding items,...
AutoNDA by SimpleDocs

Related to Descriptive or normative?

  • Demographic, Classification and Wage Information XXXXXX agrees to coordinate the accumulation and distribution of demographic, classification and wage data, as specified in the Letter of Understanding dated December 14, 2011, to CUPE on behalf of Boards of Education. The data currently housed in the Employment Data and Analysis Systems (EDAS) will be the source of the requested information.

  • Secure Your Tax Records from Identity Theft Identity theft occurs when someone uses your personal information such as your name, SSN, or other identifying information, without your permission, to commit fraud or other crimes. An identity thief may use your SSN to get a job or may file a tax return using your SSN to receive a refund. To reduce your risk: • Protect your SSN, • Ensure your employer is protecting your SSN, and • Be careful when choosing a tax preparer. If your tax records are affected by identity theft and you receive a notice from the IRS, respond right away to the name and phone number printed on the IRS notice or letter. If your tax records are not currently affected by identity theft but you think you are at risk due to a lost or stolen purse or wallet, questionable credit card activity or credit report, contact the IRS Identity Theft Hotline at 1-800-908-4490 or submit Form 14039. For more information, see Publication 4535, Identity Theft Prevention and Victim Assistance. Victims of identity theft who are experiencing economic harm or a system problem, or are seeking help in resolving tax problems that have not been resolved through normal channels, may be eligible for Taxpayer Advocate Service (TAS) assistance. You can reach TAS by calling the TAS toll-free case intake line at 1-877-777-4778 or TTY/TDD 1-800-829-4059. Protect yourself from suspicious emails or phishing schemes. Phishing is the creation and use of email and websites designed to mimic legitimate business emails and websites. The most common act is sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The IRS does not initiate contacts with taxpayers via emails. Also, the IRS does not request personal detailed information through email or ask taxpayers for the PIN numbers, passwords, or similar secret access information for their credit card, bank, or other financial accounts. If you receive an unsolicited email claiming to be from the IRS, forward this message to xxxxxxxx@xxx.xxx. You may also report misuse of the IRS name, logo, or other IRS property to the Treasury Inspector General for Tax Administration (TIGTA) at 1-800-366-4484. You can forward suspicious emails to the Federal Trade Commission at: xxxx@xxx.xxx or contact them at xxx.xxx.xxx/xxxxxxx or 1-877-IDTHEFT (1-877-438-4338). Visit XXX.xxx to learn more about identity theft and how to reduce your risk.

  • Foreign Terrorists Organizations Contractor represents and warrants that it is not engaged in business with Iran, Sudan, or a foreign terrorist organization, as prohibited by Section 2252.152 of the Texas Government Code.

  • Iran, Sudan and Foreign Terrorist Organizations The Dissemination Agent and the Administrator represent that neither the Dissemination Agent, the Administrator nor any parent company, wholly- or majority-owned subsidiaries, and other affiliates of the Dissemination Agent or the Administrator is a company identified on a list prepared and maintained by the Texas Comptroller of Public Accounts under Section 2252.153 or Section 2270.0201, Texas Government Code, and posted on any of the following pages of such officer’s internet website: xxxxx://xxxxxxxxxxx.xxxxx.xxx/purchasing/docs/sudan-list.pdf, xxxxx://xxxxxxxxxxx.xxxxx.xxx/purchasing/docs/iran-list.pdf, or xxxxx://xxxxxxxxxxx.xxxxx.xxx/purchasing/docs/fto-list.pdf. The foregoing representation is made solely to enable the Issuer to comply with Section 2252.152, Texas Government Code, and to the extent such Section does not contravene applicable Federal or State law and excludes the Dissemination Agent, the Administrator and each parent company, wholly- or majority-owned subsidiaries, and other affiliates of the Dissemination Agent or the Administrator, if any, that the United States government has affirmatively declared to be excluded from its federal sanctions regime relating to Sudan or Iran or any federal sanctions regime relating to a foreign terrorist organization.

  • Executive Orders This Contract is subject to the provisions of Executive Order No. Three of Governor Xxxxxx X. Xxxxxxx, promulgated June 16, 1971, concerning labor employment practices, Executive Order No. Seventeen of Governor Xxxxxx X. Xxxxxxx, promulgated February 15, 1973, concerning the listing of employment openings and Executive Order No. Sixteen of Governor Xxxx X. Xxxxxxx promulgated August 4, 1999, concerning violence in the workplace, all of which are incorporated into and are made a part of the Contract as if they had been fully set forth in it. The Contract may also be subject to Executive Order No. 14 of Governor M. Xxxx Xxxx, promulgated April 17, 2006, concerning procurement of cleaning products and services, Executive Order No. 61 of Governor Xxxxxx X. Xxxxxx promulgated December 13, 2017 concerning the Policy for the Management of State Information Technology Projects, as issued by the Office of Policy and Management, Policy ID IT-SDLC-17-04, and Executive Order No. 49 of Governor Xxxxxx X. Xxxxxx, promulgated May 22, 2015, mandating disclosure of certain gifts to public employees and contributions to certain candidates for office in accordance with their respective terms and conditions. If Executive Orders 14, 61 or 49 are applicable, it is deemed to be incorporated into and are made a part of the Contract as if it had been fully set forth in it. At the Contractor’s request, the State shall provide a copy of these orders to the Contractor.

  • OFAC Neither the Company nor, to the knowledge of the Company, any director, officer, agent, employee, affiliate or person acting on behalf of the Company is currently subject to any U.S. sanctions administered by the Office of Foreign Assets Control of the U.S. Treasury Department (“OFAC”); and the Company will not directly or indirectly use the proceeds of the offering, or lend, contribute or otherwise make available such proceeds to any subsidiary, joint venture partner or other person or entity, for the purpose of financing the activities of any person currently subject to any U.S. sanctions administered by OFAC.

  • Foreign Terrorist Organizations Contractor represents and warrants that it is not engaged in business with Iran, Sudan, or a foreign terrorist organization, as prohibited by Section 2252.152 of the Texas Government Code.

  • Public Entity Crimes A person or affiliate who has been placed on the convicted vendor list following a conviction of a public entity crime may not be awarded or perform work as a contractor, supplier, subcontractor, or consultant under a contract with any public entity in excess of the threshold amount provided in Florida Statutes, Section 287.017 for Category Two for a period of thirty-six (36) months from the date of being placed on the convicted vendor list.

  • Export Control Regulations Buyer understands that Seller and the Goods are subject to the United States Export Administration Act, the Trading with the Enemy Act, the International Traffic in Arms Regulations (in the case of Goods that are considered defense articles), and other laws and regulations of the United States of America (collectively, the “Regulations”), which Regulations are enforced, inter alia, by the United States Departments of Commerce, State and Treasury. The Regulations, in part, prohibit export or diversion of the Goods to certain countries. Xxxxx agrees to abide by all Regulations, including those concerning the resale and disposition of the Goods. Buyer warrants that it will not sell, transfer or support, directly or indirectly, or assist in any sale or transfer of any products or product technology in countries or to users concerning which such sale, transfer or support is not permitted under applicable Regulations. Buyer shall defend, hold harmless and indemnify Seller for any damages resulting to Seller from a breach of this paragraph by Xxxxx.

  • Accessibility of Web-Based Information and Applications For State Agency Authorized User Acquisitions: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08-005, Accessibility of Web-Based Information and Applications as follows: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08- 005, Accessibility of Web-Based Information and Applications as such policy may be amended, modified or superseded, which requires that state agency web-based information and applications are accessible to persons with disabilities. Web-based information and applications must conform to New York State Enterprise IT Policy NYS-P08-005 as determined by quality assurance testing. Such quality assurance testing will be conducted by the State Agency Authorized User and the results of such testing must be satisfactory to the Authorized User before web-based information and applications will be considered a qualified deliverable under the contract or procurement.

Time is Money Join Law Insider Premium to draft better contracts faster.