¶ … fallacies and it is important to detect fallacious arguments and then form decisions. Below is an analysis of three such fallacies which have been described and examples are described to show why it is important to detect them.
FALLACIES
Ad Ignorantiam
This fallacy is on the principle that in the case there is a lack of evidence to prove it to be true, it is considered naturally to be false. An atheist might claim that as a creationist cannot prove that God exists therefore God does not exist. Similarly a creationist can say that because the atheist cannot prove that God does not exist, hence God exists. Basically this fallacy deals with the burden of proof and in the absence of any proof it labels the opposite to be absolutely true. This fallacy is used in the judicial systems that are based on the principle of "innocent until proven guilty." Hence the burden of proof is not on the defendant but on the prosecutor to prove him to be guilty. If he fails to submit sufficient evidence then the defendant is assumed to be innocent and released. This type of fallacy compromises critical thinking because the absence of proof does not necessarily mean the opposite to be true. Disregarding every other argument because sufficient evidence was not put forward is certainly not critical thinking. It is important to detect such a fallacy and remove it from an argument that provides a conclusion based on the appeal to ignorance.
Senator Joe McCarthy used this type of fallacy to support his claim:
'I am only giving the Senate, cases in which it is clear there is a definite Communist connection ... persons whom I consider to be Communists in the State Department .... I do not have much information on this except the general statement of the agency ... that there is nothing in the files...
Because fallacies like the ones presented above can cause such problems in all forms of research and decision making, it is useful to have some tools to analyze a given statement. Known as "analytical tools," some examples are the "Devils Advocate," a method in which one argues against the stated conclusion to determine its validity (even though one may not agree with the position), "Lateral Thinking," or Edward de Bono's
(Eljamal; Stark; Arnold; Sharp, 1999) To conclude, it be said that if we will not be able to master imparting the capability to think in a developed form, our profession, as well as perhaps our world, would be influenced and taken over by someone who would be able to outsmart us to find it out. We would in that case not only remain thinking as to what happened but would
Prenatal genetic testing can prove useful to many expectant mothers under certain conditions. For example, those with inherited illnesses, those with children born with severe defects, those who are high risk of delivering a still born, and women over the age of 34 all present as likely candidates for prenatal genetic testing. It can help them identify what may be wrong with the fetus and what steps to take if
HLS-355: CRITICAL THINKING FOR HOMELAND SECURITY Final Project The fight against Hurricane Katrina in a political environment set on fighting terrorism Improving security can be a particularly challenging mission and this makes a critical thinking technique particularly useful for a person or a community to effectively strengthen their position and legislations. One of the first things that someone dealing with the concept needs to consider is the fact that security can never
" Monitoring and enforcing a [CO.sub.2] treaty would be very difficult, if not impossible. Reductions in [CO.sub.2] emissions by rich countries could be negated by increased [CO.sub.2] emissions in fast-growing developing countries (Udall, 1990)." One of the issues facing the global warming crisis is the debate about who is most responsible for its creation and who should be financially responsible for its curbing. According to recently gathered data Americans are causing a much
policy makers underestimate internet independence? YouTube independence of positing video content The internet moderated terrorism Regulating the internet for anti-terrorism Freedom and Terrorism on the Internet The purpose of the study is to explore the use of internet by terrorist organizations and the degree of independence that terrorist enjoy while conducting and coordinating their terrorism activities from the cyberspace. The topic is an area of interest for the researcher as it is significantly relevant
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now