Results for 'classified information'

991 found
Order:
  1.  33
    Why Snowden and not Greenwald? On the Accountability of the Press for Unauthorized Disclosures of Classified Information.Dorota Mokrosinska - 2020 - Law and Philosophy 39 (2):203-238.
    In 2013, following the leaks by Edward Snowden, The Guardian published a number of classified NSA documents. Both leaking and publishing leaks violate the law prohibiting unauthorized disclosures. Accordingly, there are two potential targets for prosecution: the leakers and the press. In practice, however, only the leakers are prosecuted: Snowden is facing a threat of 30 years’ imprisonment; no charges have been made against The Guardian. If both leaking and publishing leaks violate the law, why prosecute only the leakers (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  28
    Knowledge and Information in Global Competition: A New Framework for Classifying and Evaluating Manipulative Communication Techniques.Eldar Sultanow, Sean Cox, Sebastian Homann, Philipp Koch & Olliver Franke - 2016 - International Letters of Social and Humanistic Sciences 72:27-44.
    Source: Author: Eldar Sultanow, Sean Cox, Sebastian Homann, Philipp Koch, Olliver Franke Mass media initiated exhibitions of information and knowledge streams account for a significant factor of opinion-forming in modern digitalized nations and thus influence their country's political development. Within the framework of a globalized environment, this information has the ability to shape worldwide opinion and international policy decisions across geographical boundaries. Similarly, however, information and knowledge that does not flow freely has an impact on the behind (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  3.  27
    A Novel Method for Classifying Driver Mental Workload Under Naturalistic Conditions With Information From Near-Infrared Spectroscopy.Anh Son Le, Hirofumi Aoki, Fumihiko Murase & Kenji Ishida - 2018 - Frontiers in Human Neuroscience 12.
  4. Automatically classifying case texts and predicting outcomes.Kevin D. Ashley & Stefanie Brüninghaus - 2009 - Artificial Intelligence and Law 17 (2):125-165.
    Work on a computer program called SMILE + IBP (SMart Index Learner Plus Issue-Based Prediction) bridges case-based reasoning and extracting information from texts. The program addresses a technologically challenging task that is also very relevant from a legal viewpoint: to extract information from textual descriptions of the facts of decided cases and apply that information to predict the outcomes of new cases. The program attempts to automatically classify textual descriptions of the facts of legal problems in terms (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   26 citations  
  5.  21
    Impulsivity-Compulsivity Axis: Evidence of Its Clinical Validity to Individually Classify Subjects on the Use/Abuse of Information and Communication Technologies.Daniel Cassú-Ponsatí, Eduardo J. Pedrero-Pérez, Sara Morales-Alonso & José María Ruiz-Sánchez de León - 2021 - Frontiers in Psychology 12.
    The compulsive habit model proposed by Everitt and Robbins has accumulated important empirical evidence. One of their proposals is the existence of an axis, on which each a person with a particular addiction can be located depending on the evolutionary moment of his/her addictive process. The objective of the present study is to contribute in addressing the identification of such axis, as few studies related to it have been published to date. To do so, the use/abuse of Information and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  20
    Classified Public Whistleblowing.Eric R. Boot - 2017 - Social Theory and Practice 43 (3):541-567.
    Though whistleblowing is quickly becoming an accepted means of addressing wrongdoing, whistleblower protection laws and the relevant case law are either awkwardly silent, unclear or mutually inconsistent concerning public disclosures of classified government information. I remedy this problem by first arguing that such disclosures constitute a pro tanto wrong as they violate (1) promissory obligations, (2) role obligations and (3) the obligation to respect the democratic allocation of power. However, they may be justified if (1) the information (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  7.  47
    Classifying adults' and children's faces by sex: computational investigations of subcategorical feature encoding.Yi D. Cheng, Alice J. O'Toole & Hervé Abdi - 2001 - Cognitive Science 25 (5):819-838.
    The faces of both adults and children can be classified accurately by sex, even in the absence of sex‐stereotyped social cues such as hair and clothing (Wild et al., 2000). Although much is known from psychological and computational studies about the information that supports sex classification for adults' faces, children's faces have been much less studied. The purpose of the present study was to quantify and compare the information available in adults' versus children's faces for sex classification (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  11
    Classifying adults' and children's faces by sex: computational investigations of subcategorical feature encoding.Yi D. Cheng, Alice J. O'Toole & Hervé Abdi - 2001 - Cognitive Science 25 (5):819-838.
    The faces of both adults and children can be classified accurately by sex, even in the absence of sex‐stereotyped social cues such as hair and clothing (Wild et al., 2000). Although much is known from psychological and computational studies about the information that supports sex classification for adults' faces, children's faces have been much less studied. The purpose of the present study was to quantify and compare the information available in adults' versus children's faces for sex classification (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  86
    Classifying and Analyzing Analogies.Bruce N. Waller - 2001 - Informal Logic 21 (3).
    Analogies come in several forms that serve distinct functions. Inductive analogy is a common type of analogical argument, but critical thinking texts sometimes treat all analogies as inductive. Such an analysis ignores figurative analogies, which may elucidate but do not argue; and also neglects a priori arguments by analogy, a type of analogical argument prominent in law and ethics. A priori arguments by analogy are distinctive, but--contrary to the claims of Govier and Sunstein-they are best understood as deductive, rather than (...)
    Direct download (13 more)  
     
    Export citation  
     
    Bookmark   31 citations  
  10.  40
    What is suicide? Classifying self-killings.Suzanne E. Dowie - 2020 - Medicine, Health Care and Philosophy 23 (4):717-733.
    Although the most common understanding of suicide is intentional self-killing, this conception either rules out someone who lacks mental capacity being classed as a suicide or, if acting intentionally is meant to include this sort of case, then what it means to act intentionally is so weak that intention is not a necessary condition of suicide. This has implications in health care, and has a further bearing on issues such as assisted suicide and health insurance. In this paper, I argue (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  11.  24
    Classifying Generalization: Paradigm War or Abuse of Terminology?John N. Williams & Eric W. K. Tsang - 2015 - Journal of Information Technology 30 (1):18-19.
    Lee and Baskerville (2003) attempted to clarify the concept of generalization and classify it into four types. In Tsang and Williams (2012) we objected to their account of generalization as well as their classification and offered repairs. Then we proposed a classification of induction, within which we distinguished five types of generalization. In their (2012) rejoinder, they argue that their classification is compatible with ours, claiming that theirs offers a ‘new language.’ Insofar as we resist this ‘new language’ and insofar (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Two Informational Theories of Memory: a case from Memory-Conjunction Errors.Danilo Fraga Dantas - 2020 - Disputatio 12 (59):395-431.
    The causal and simulation theories are often presented as very distinct views about declarative memory, their major difference lying on the causal condition. The causal theory states that remembering involves an accurate representation causally connected to an earlier experience. In the simulation theory, remembering involves an accurate representation generated by a reliable memory process. I investigate how to construe detailed versions of these theories that correctly classify memory errors as misremembering or confabulation. Neither causalists nor simulationists have paid attention to (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  13. Classifying knowledge.Derek Langridge - 1991 - In A. J. Meadows (ed.), Knowledge and Communication: Essays on the Information Chain. Library Association.
     
    Export citation  
     
    Bookmark  
  14.  19
    A New Robust Classifier on Noise Domains: Bagging of Credal C4.5 Trees.Joaquín Abellán, Javier G. Castellano & Carlos J. Mantas - 2017 - Complexity:1-17.
    The knowledge extraction from data with noise or outliers is a complex problem in the data mining area. Normally, it is not easy to eliminate those problematic instances. To obtain information from this type of data, robust classifiers are the best option to use. One of them is the application of bagging scheme on weak single classifiers. The Credal C4.5 model is a new classification tree procedure based on the classical C4.5 algorithm and imprecise probabilities. It represents a type (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15. Information-based aspects of punctuation.Bilge Say & Varol Akman - 1996 - In Intl. Workshop on Punctuation in Computational Linguistics, Santa Cruz, CA, June 1996. Stroudsburg, PA: Association for Computational Linguistics.
    We offer a preliminary account of the information-based aspects of punctuation marks. We give our initial treatment within the Discourse Representation Theory and its segmented version. We hypothesize that this work will be useful in classifying the informational contributions of punctuation marks and bringing them to bear on the semantic characterization of written discourse.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  16.  48
    From Gesture to Sign Language: Conventionalization of Classifier Constructions by Adult Hearing Learners of British Sign Language.Chloë R. Marshall & Gary Morgan - 2015 - Topics in Cognitive Science 7 (1):61-80.
    There has long been interest in why languages are shaped the way they are, and in the relationship between sign language and gesture. In sign languages, entity classifiers are handshapes that encode how objects move, how they are located relative to one another, and how multiple objects of the same type are distributed in space. Previous studies have shown that hearing adults who are asked to use only manual gestures to describe how objects move in space will use gestures that (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  17.  5
    Biological Information.Stefan Artmann - 2008 - In Sahorta Sarkar & Anya Plutynski (eds.), Companion to the Philosophy of Biology. Blackwell. pp. 22–39.
    This chapter contains section titled: Introduction General Scenario for the Transmission of Information and Its Application to Genetics Semiotic Dimensions of Biological Information Syntactic Dimension I: Measuring the Statistical Entropy of Signals and Messages Syntactic Dimension II: Estimating the Algorithmic Complexity of Signals and Messages Semantic Dimension: Classifying the Mutual Complexity of Transmitters and Receivers Acknowledgment References Further Reading.
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  16
    Information-seeking dialogue for explainable artificial intelligence: Modelling and analytics.Ilia Stepin, Katarzyna Budzynska, Alejandro Catala, Martín Pereira-Fariña & Jose M. Alonso-Moral - 2024 - Argument and Computation 15 (1):49-107.
    Explainable artificial intelligence has become a vitally important research field aiming, among other tasks, to justify predictions made by intelligent classifiers automatically learned from data. Importantly, efficiency of automated explanations may be undermined if the end user does not have sufficient domain knowledge or lacks information about the data used for training. To address the issue of effective explanation communication, we propose a novel information-seeking explanatory dialogue game following the most recent requirements to automatically generated explanations. Further, we (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  11
    The Possibility of Classifying the Subjects of Aqīdah with regard to Certainty from the Perspective of Ahl al-Sunnah.Fehmi Soğukoğlu - 2023 - Sakarya Üniversitesi İlahiyat Fakültesi Dergisi 25 (47):183-206.
    Such questions that may it be essential, necessary, recommended, or free to believe in some matters will be addressed in the article. It is concluded that such an approach is possible for Māturīdis and Ash'arīs. In the study, it was thought that the following two problems should be solved first. The first problem is how can a definitive confirmation be made with speculative information (zannī). Second, if it is a contradiction that the ulema of the relevant school construct the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20.  28
    Information’: Praxeological Considerations. [REVIEW]Rod Watson & Andrew P. Carlin - 2012 - Human Studies 35 (2):327-345.
    Harold Garfinkel wrote a series of highly detailed and lengthy 'memos' during his time (1951-53) at Princeton, where remarkable developments in information theory were taking place. These very substantial manuscripts have been edited by Anne Warfield Rawls in Toward a Sociological Theory of Information (Garfinkel 2008). This paper explores some of the implications of these memos, which we suggest are still relevant for the study of 'information' and information theory. Definitional privilege of 'information' as a (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  21. Reasoning about data and information: Abstraction between states and commodities.Patrick Allo - 2009 - Synthese 167 (2):231-249.
    Cognitive states as well as cognitive commodities play central though distinct roles in our epistemological theories. By being attentive to how a difference in their roles affects our way of referring to them, we can undoubtedly accrue our understanding of the structure and functioning of our main epistemological theories. In this paper we propose an analysis of the dichotomy between states and commodities in terms of the method of abstraction, and more specifically by means of infomorphisms between different ways to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  22.  19
    Informed Consent for Comparative Effectiveness Research Should Not Consider the Risks of the Standard Therapies That Are Being Studied as Risks of the Research.John D. Lantos - 2017 - Journal of Law, Medicine and Ethics 45 (3):365-374.
    There is a debate at the highest levels of government about how to classify the risks of research studies that evaluate therapies that are in widespread use. Should the risks of those therapies be considered as risks of research that is designed to evaluate those therapies? Or not? The Common Rule states, “In evaluating risks and benefits, the IRB should consider only those risks and benefits that may result from the research.” ). By contrast, the Office of Human Research Protections, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  26
    Digital tools in the informed consent process: a systematic review.Francesco Gesualdo, Margherita Daverio, Laura Palazzani, Dimitris Dimitriou, Javier Diez-Domingo, Jaime Fons-Martinez, Sally Jackson, Pascal Vignally, Caterina Rizzo & Alberto Eugenio Tozzi - 2021 - BMC Medical Ethics 22 (1):1-10.
    Background Providing understandable information to patients is necessary to achieve the aims of the Informed Consent process: respecting and promoting patients’ autonomy and protecting patients from harm. In recent decades, new, primarily digital technologies have been used to apply and test innovative formats of Informed Consent. We conducted a systematic review to explore the impact of using digital tools for Informed Consent in both clinical research and in clinical practice. Understanding, satisfaction and participation were compared for digital tools versus (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  24.  35
    Barwise's information frames and modal logics.Vladimir V. Rybakov - 2003 - Archive for Mathematical Logic 42 (3):261-277.
    The paper studies Barwise's information frames and answers the John Barwise question: to find axiomatizations for the modal logics generated by information frames. We find axiomatic systems for (i) the modal logic of all complete information frames, (ii) the logic of all sound and complete information frames, (iii) the logic of all hereditary and complete information frames, (iv) the logic of all complete, sound and hereditary information frames, and (v) the logic of all consistent (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25.  18
    Credibility and trust of information privacy at the workplace in Slovakia. The use of intuition.Frithiof Svenson, Eva Ballová Mikušková & Markus A. Launer - 2023 - Journal of Information, Communication and Ethics in Society 21 (3):302-321.
    Purpose Employees may feel overwhelmed with information privacy choices and have difficulties understanding what they are committing to in the digital workplace. This paper aims to analyze the role of different thinking styles for effort reduction, such as the use of intuition, when employees make decisions about the credibility and trustworthiness of workplace information privacy issues in Slovakia. While the General Data Protection Regulation sets precise requirements for valid consent, organizations are classified as data controllers and are (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26.  14
    A Deep Evolutionary Approach to Bioinspired Classifier Optimisation for Brain-Machine Interaction.Jordan J. Bird, Diego R. Faria, Luis J. Manso, Anikó Ekárt & Christopher D. Buckingham - 2019 - Complexity 2019:1-14.
    This study suggests a new approach to EEG data classification by exploring the idea of using evolutionary computation to both select useful discriminative EEG features and optimise the topology of Artificial Neural Networks. An evolutionary algorithm is applied to select the most informative features from an initial set of 2550 EEG statistical features. Optimisation of a Multilayer Perceptron is performed with an evolutionary approach before classification to estimate the best hyperparameters of the network. Deep learning and tuning with Long Short-Term (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  20
    On the Logic of Information Flow.Jon Barwise, Dov Gabby & Chrysafis Hartonas - 1995 - Logic Journal of the IGPL 3 (1):7-50.
    This paper is an investigation into the logic of information flow. The basic perspective is that logic flows in virtue of constraints and that constraints classify channels connecting particulars In this paper we explore some logics intended to model reasoning in the case of idealized information flow, that is, where the constraints involved are exceptionless. We look at this as a step toward the far more challenging task of understanding the logic of imperfect information flow, that is (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  28.  16
    A Logic for Trial and Error Classifiers.Martin Kaså - 2015 - Journal of Logic, Language and Information 24 (3):307-322.
    Trial and error classifiers, corresponding to concepts which change their extensions over time, are introduced and briefly philosophically motivated. A fragment of the language of classical first-order logic is given a new semantics, using \-sequences of classical models, in order to interpret the basic predicates as classifiers of this kind. It turns out that we can use a natural deduction proof system which differs from classical logic only in the conditions for application of existential elimination. Soundness and completeness theorems are (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29. Four Rules for Classifying Social Entities.Ludger Jansen - forthcoming - In Ruth Hagengruber (ed.), Philosophy’s Relevance for Information Science.
     
    Export citation  
     
    Bookmark  
  30.  13
    Shannon-inspired information in the clinical use of neural signals concerning post-comatose patients.Hyungrae Noh - 2022 - Zagadnienia Filozoficzne W Nauce 73:121-145.
    Post-comatose patients are classified as being in a minimally conscious state when they have executive functions. Because traditional behavioral assessments may not capture signs of executive functions in post-comatose patients, clinicians look to localized brain activities in response to task instructions, such as imagining wiggling toes, to diagnose minimal consciousness. This paper critically assesses the assumption underlying such alternative methods: that brain activities are neural signals conveying information about minimal consciousness. Based on a Shannon-inspired idea of information, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  13
    Joining metadata and textual features to advise administrative courts decisions: a cascading classifier approach.Hugo Mentzingen, Nuno Antonio & Victor Lobo - 2023 - Artificial Intelligence and Law 32 (1):201-230.
    Decisions of regulatory government bodies and courts affect many aspects of citizens’ lives. These organizations and courts are expected to provide timely and coherent decisions, although they struggle to keep up with the increasing demand. The ability of machine learning (ML) models to predict such decisions based on past cases under similar circumstances was assessed in some recent works. The dominant conclusion is that the prediction goal is achievable with high accuracy. Nevertheless, most of those works do not consider important (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32.  14
    How Do Artificial Neural Networks Classify Musical Triads? A Case Study in Eluding Bonini's Paradox.Arturo Perez, Helen L. Ma, Stephanie Zawaduk & Michael R. W. Dawson - 2023 - Cognitive Science 47 (1):e13233.
    How might artificial neural networks (ANNs) inform cognitive science? Often cognitive scientists use ANNs but do not examine their internal structures. In this paper, we use ANNs to explore how cognition might represent musical properties. We train ANNs to classify musical chords, and we interpret network structure to determine what representations ANNs discover and use. We find connection weights between input units and hidden units can be described using Fourier phase spaces, a representation studied in musical set theory. We find (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33. Using Aristotle’s theory of friendship to classify online friendships: a critical counterview.Sofia Kaliarnta - 2016 - Ethics and Information Technology 18 (2):65-79.
    In a special issue of “Ethics and Information Technology” (September 2012), various philosophers have discussed the notion of online friendship. The preferred framework of analysis was Aristotle’s theory of friendship: it was argued that online friendships face many obstacles that hinder them from ever reaching the highest form of Aristotelian friendship. In this article I aim to offer a different perspective by critically analyzing the arguments these philosophers use against online friendship. I begin by isolating the most common arguments (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  34.  27
    Challenging “Early Competence”: A Process Oriented Analysis of Children's Classifying.Stephanie Thornton - 1982 - Cognitive Science 6 (1):77-100.
    In some circumstances, children of 5 produce identical classifications to 10 year olds when asked to sort a collection of objects. This has been interpreted as meaning that the process of constructing classifications is very similar at 5 and 10 years. But this conclusion rests on a comparison of the product of children's sortings, rather than on a study of their activity in producing sortings. The present paper argues that the process of classifying is in fact very different for 5 (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  35.  59
    Informational humidity model: explanation of dual modes of community for social intelligence design. [REVIEW]Shintaro Azechi - 2005 - AI and Society 19 (1):110-122.
    The informational humidity model (IHM) classifies a message into two modes, and describes communication and community in a novel aspect. At first, a flame message, dry information vs. wet information, is introduced. Dry information is the message content itself, whereas wet information is the attributes of the message sender. Second, the characteristics of communities are defined by two factors: the message sender’s personal specifications, and personal identification. These factors affect the humidity of the community, which corresponds (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  12
    Non-doxastic Attitude Reports, Information Structure, and Semantic-Pragmatic Interface.Wojciech Rostworowski, Katarzyna Kuś & Bartosz Maćkiewicz - forthcoming - Review of Philosophy and Psychology:1-48.
    Truth conditions of sentences ascribing non-doxastic propositional attitudes seem to depend on the information structure of the embedded clause. In this paper, we argue that this kind of sensitivity is a semantic phenomenon rather than a pragmatic one. We report four questionnaire studies which explore the impact of the information structure on the truth conditions of non-doxastic attitude ascriptions from different perspectives. The results of the first two studies show that the acceptability of those ascriptions can be affected (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  8
    The Impact of Ignoring a Crossed Factor in Cross-Classified Multilevel Modeling.Soyoung Kim, Yoonhwa Jeong & Sehee Hong - 2021 - Frontiers in Psychology 12.
    The present study investigated estimate biases in cross-classified random effect modeling and hierarchical linear modeling when ignoring a crossed factor in CCREM considering the impact of the feeder and the magnitude of coefficients. There were six simulation factors: the magnitude of coefficient, the correlation between the level 2 residuals, the number of groups, the average number of individuals sampled from each group, the intra-unit correlation coefficient, and the number of feeders. The targeted interests of the coefficients were four fixed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  23
    Social Trait Information in Deep Convolutional Neural Networks Trained for Face Identification.Connor J. Parde, Ying Hu, Carlos Castillo, Swami Sankaranarayanan & Alice J. O'Toole - 2019 - Cognitive Science 43 (6):e12729.
    Faces provide information about a person's identity, as well as their sex, age, and ethnicity. People also infer social and personality traits from the face — judgments that can have important societal and personal consequences. In recent years, deep convolutional neural networks (DCNNs) have proven adept at representing the identity of a face from images that vary widely in viewpoint, illumination, expression, and appearance. These algorithms are modeled on the primate visual cortex and consist of multiple processing layers of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  41
    Explicit and Emergent Mechanisms of Information Status.Jennifer E. Arnold - 2016 - Topics in Cognitive Science 8 (4):737-760.
    It is well established that language production and comprehension are influenced by information status, for example, whether information is given, new, topical, or predictable, and many scholars suggest that an important component of information status is keeping track of what information is in common ground, and what is not. Information status affects both speakers' choices and how listeners interpret the speaker's meaning. Although there is a wealth of scholarly work on information status, there is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  40.  8
    Network Pseudohealth Information Recognition Model: An Integrated Architecture of Latent Dirichlet Allocation and Data Block Update.Jie Zhang, Pingping Sun, Feng Zhao, Qianru Guo & Yue Zou - 2020 - Complexity 2020:1-12.
    The wanton dissemination of network pseudohealth information has brought great harm to people’s health, life, and property. It is important to detect and identify network pseudohealth information. Based on this, this paper defines the concepts of pseudohealth information, data block, and data block integration, designs an architecture that combines the latent Dirichlet allocation algorithm and data block update integration, and proposes the combination algorithm model. In addition, crawler technology is used to crawl the pseudohealth information transmitted (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  28
    Egg distributions and the information a solitary parasitoid has and uses for its oviposition decisions.Lia Hemerik, Nelly van der Hoeven & Jacques J. M. van Alphen - 2002 - Acta Biotheoretica 50 (3):167-188.
    Approximately three decades ago the question was first answered whether parasitoids are able to assess the number or origin of eggs in a host for a solitary parasitoid, Leptopilina heterotoma, by fitting theoretically derived distributions to empirical ones. We extend the set of different theoretically postulated distributions of eggs among hosts by combining searching modes and abilities in assessing host quality. In the models, parasitoids search either randomly (Poisson) (1) or by vibrotaxis (Negative Binomial) (2). Parasitoids are: (a) assumed to (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  42.  65
    Conscious awareness is necessary for processing race and gender information from faces.Ido Amihai, Leon Deouell & Shlomo Bentin - 2011 - Consciousness and Cognition 20 (2):269-279.
    Previous studies suggested that emotions can be correctly interpreted from facial expressions in the absence of conscious awareness of the face. Our goal was to explore whether subordinate information about a face’s gender and race could also become available without awareness of the face. Participants classified the race or the gender of unfamiliar faces that were ambiguous with regard to these dimensions. The ambiguous faces were preceded by face-images that unequivocally represented gender and race, rendered consciously invisible by (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  43.  5
    Evaluation of an Information Flow Gain Algorithm for Microsensor Information Flow in Limber Motor Rehabilitation.Naiqiao Ning & Yong Tang - 2021 - Complexity 2021:1-11.
    This paper conducts an evaluative study on the rehabilitation of limb motor function by using a microsensor information flow gain algorithm and investigates the surface electromyography signals of the upper limb during rehabilitation training. The surface EMG signals contain a large amount of limb movement information. By analysing and processing the surface EMG signals, we can grasp the human muscle movement state and identify the human upper limb movement intention. The EMG signals were processed by the trap and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44. The history and philosophy of taxonomy as an information science.Catherine Kendig & Joeri Witteveen - 2020 - History and Philosophy of the Life Sciences 42 (3):1-9.
    We undeniably live in an information age—as, indeed, did those who lived before us. After all, as the cultural historian Robert Darnton pointed out: ‘every age was an age of information, each in its own way’ (Darnton 2000: 1). Darnton was referring to the news media, but his insight surely also applies to the sciences. The practices of acquiring, storing, labeling, organizing, retrieving, mobilizing, and integrating data about the natural world has always been an enabling aspect of scientific (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  45.  26
    Communicating environmental information: Are marketing claims on packaging misleading? [REVIEW]Michael Jay Polonsky, Judith Bailey, Helen Baker, Christopher Basche, Carl Jepson & Lenore Neath - 1998 - Journal of Business Ethics 17 (3):281-294.
    The increased usage of questionable environmental marketing claims has become an issue of concern for academics, policy makers and consumers. Much of the research to date, has focused on the accuracy of environmental claims in advertisements, with the information on product packaging being largely ignored. This study uses a content analysis to examine the environmental information on packaging. More specifically it examines the packaging of the population of dishwashing liquid bottles available in grocery stores in a large city (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  46.  22
    Internal Perception: The Role of Bodily Information in Concepts and Word Mastery.Luigi Pastore & Sara Dellantonio - 2017 - Berlin, Heidelberg: Springer Berlin Heidelberg. Edited by Luigi Pastore.
    Chapter 1 First Person Access to Mental States. Mind Science and Subjective Qualities -/- Abstract. The philosophy of mind as we know it today starts with Ryle. What defines and at the same time differentiates it from the previous tradition of study on mind is the persuasion that any rigorous approach to mental phenomena must conform to the criteria of scientificity applied by the natural sciences, i.e. its investigations and results must be intersubjectively and publicly controllable. In Ryle’s view, philosophy (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  47.  31
    The development of guidelines for implementing information technology to promote food security.Stephen E. Gareau - 2004 - Agriculture and Human Values 21 (4):273-285.
    Food insecurity, and its extreme form, hunger, occur whenever the accessibility to an adequate supply of nutritional and safe foods becomes restricted or unpredictable. They are recurring problems in certain regions of the US, as well as in many parts of the world. According to nation-wide surveys conducted by the US Bureau of the Census, between 1996 and 1998 an estimated 9.7% of US households were classified as food insecure (6.2% being food insecure without evidence of hunger, and 3.5% (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  9
    Improving the efficiency of intrusion detection in information systems.Bouderah Brahim, Nacer Eddine Yousfi, Bourenane Malika & Lounis Ouarda - 2022 - Journal of Intelligent Systems 31 (1):835-854.
    Policy Interaction Graph Analysis is a Host-based Intrusion Detection tool that uses Linux MAC Mandatory access control policy to build the licit information flow graph and uses a detection policy defined by the administrator to extract illicit behaviour from the graph. The main limitation of this tool is the generation of a huge signature base of illicit behaviours; hence, this leads to the use of huge memory space to store it. Our primary goal in this article is to reduce (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  49.  17
    Old Challenges or New Issues? Genetic Health Professionals’ Experiences Obtaining Informed Consent in Diagnostic Genomic Sequencing.Danya F. Vears, Pascal Borry, Julian Savulescu & Julian J. Koplin - 2021 - AJOB Empirical Bioethics 12 (1):12-23.
    Background While integrating genomic sequencing into clinical care carries clear medical benefits, it also raises difficult ethical questions. Compared to traditional sequencing technologies, genomic sequencing and analysis is more likely to identify unsolicited findings (UF) and variants that cannot be classified as benign or disease-causing (variants of uncertain significance; VUS). UF and VUS pose new challenges for genetic health professionals (GHPs) who are obtaining informed consent for genomic sequencing from patients.Methods We conducted semi-structured interviews with 31 GHPs across Europe, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  19
    Old Challenges or New Issues? Genetic Health Professionals’ Experiences Obtaining Informed Consent in Diagnostic Genomic Sequencing.Danya F. Vears, Pascal Borry, Julian Savulescu & Julian J. Koplin - 2021 - AJOB Empirical Bioethics 12 (1):12-23.
    Background While integrating genomic sequencing into clinical care carries clear medical benefits, it also raises difficult ethical questions. Compared to traditional sequencing technologies, genomic sequencing and analysis is more likely to identify unsolicited findings (UF) and variants that cannot be classified as benign or disease-causing (variants of uncertain significance; VUS). UF and VUS pose new challenges for genetic health professionals (GHPs) who are obtaining informed consent for genomic sequencing from patients.Methods We conducted semi-structured interviews with 31 GHPs across Europe, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 991