Results for 'intrusion'

793 found
Order:
  1. Intrusive Uncertainty in Obsessive Compulsive Disorder.Tom Cochrane & Keeley Heaton - 2017 - Mind and Language 32 (2):182-208.
    In this article we examine obsessive compulsive disorder (OCD). We examine and reject two existing models of this disorder: the Dysfunctional Belief Model and the Inference‐Based Approach. Instead, we propose that the main distinctive characteristic of OCD is a hyperactive sub‐personal signal of being in error, experienced by the individual as uncertainty about his or her intentional actions (including mental actions). This signalling interacts with the anxiety sensitivities of the individual to trigger conscious checking processes, including speculations about possible harms. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  2.  24
    Intrusive images in psychological disorders: Characteristics, neural mechanisms, and treatment implications.Chris R. Brewin, James D. Gregory, Michelle Lipton & Neil Burgess - 2010 - Psychological Review 117 (1):210-232.
  3.  15
    Grammatical intrusions in the recall of structured letter pairs: Mediated transfer or position learning?Kirk H. Smith - 1966 - Journal of Experimental Psychology 72 (4):580.
  4.  73
    The Intrusion of Mercy.R. A. Duff - 2007 - Ohio State Journal of Criminal Law 4:361-87.
    On the basis of a communicative theory of criminal punishment, I show how mercy has a significant but limited role to play in the criminal law—in particular (although not only) in criminal sentencing. Mercy involves an intrusion into the realm of criminal law of values and concerns that are not themselves part of the perspective of criminal law: a merciful sentencer acts beyond the limits of her legal role, on the basis of moral considerations that conflict with the demands (...)
    Direct download  
     
    Export citation  
     
    Bookmark   9 citations  
  5.  25
    Unnoticed intrusions: Dissociations of meta-consciousness in thought suppression.Benjamin Baird, Jonathan Smallwood, Daniel Jf Fishman, Michael D. Mrazek & Jonathan W. Schooler - 2013 - Consciousness and Cognition 22 (3):1003-1012.
    The current research investigates the interaction between thought suppression and individuals’ explicit awareness of their thoughts. Participants in three experiments attempted to suppress thoughts of a prior romantic relationship and their success at doing so was measured using a combination of self-catching and experience-sampling. In addition to thoughts that individuals spontaneously noticed, individuals were frequently caught engaging in thoughts of their previous partner at experience-sampling probes. Furthermore, probe-caught thoughts were: associated with stronger decoupling of attention from the environment, more likely (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  6. An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
    This paper offers a general theory of privacy, a theory that takes privacy to consist in being free from certain kinds of intrusions. On this understanding, privacy interests are distinct and distinguishable from those in solitude, anonymity, and property, for example, or from the fact that others possess, with neither consent nor permission, personal information about oneself. Privacy intrusions have both epistemic and psychological components, and can range in value from relatively trivial considerations to those of profound consequence for an (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7.  43
    The Intrusion of Mercy.Antony Duff - unknown
    On the basis of a communicative theory of criminal punishment, I show how mercy has a significant but limited role to play in the criminal law—in particular (although not only) in criminal sentencing. Mercy involves an intrusion into the realm of criminal law of values and concerns that are not themselves part of the perspective of criminal law: a merciful sentencer acts beyond the limits of her legal role, on the basis of moral considerations that conflict with the demands (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  8.  67
    Intrusion of a thematic idea in retention of prose.Rebecca A. Sulin & D. James Dooling - 1974 - Journal of Experimental Psychology 103 (2):255.
  9.  16
    Intrusion Detection Systems in Cloud Computing Paradigm: Analysis and Overview.Pooja Rana, Isha Batra, Arun Malik, Agbotiname Lucky Imoize, Yongsung Kim, Subhendu Kumar Pani, Nitin Goyal, Arun Kumar & Seungmin Rho - 2022 - Complexity 2022:1-14.
    Cloud computing paradigm is growing rapidly, and it allows users to get services via the Internet as pay-per-use and it is convenient for developing, deploying, and accessing mobile applications. Currently, security is a requisite concern owning to the open and distributed nature of the cloud. Copious amounts of data are responsible for alluring hackers. Thus, developing efficacious IDS is an imperative task. This article analyzed four intrusion detection systems for the detection of attacks. Two standard benchmark datasets, namely, NSL-KDD (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  15
    The Intrusive Gloss.George Thomson - 1967 - Classical Quarterly 17 (02):232-.
    In this article I propose to discuss some passages in the Oresteia in order to illustrate the method devised by Heimsoeth and Headlam for the detection of intrusive glosses. Headlam's theory of glosses, which I outlined in a recent article, was based on a systematic study of the ancient lexica and scholia. Further work on the scholia has raised some problems affecting their authenticity, which need to be settled, if they are to be used effectively for the elucidation of the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11.  6
    The Intrusive Gloss.George Thomson - 1967 - Classical Quarterly 17 (2):232-243.
    In this article I propose to discuss some passages in the Oresteia in order to illustrate the method devised by Heimsoeth and Headlam for the detection of intrusive glosses. Headlam's theory of glosses, which I outlined in a recent article, was based on a systematic study of the ancient lexica and scholia. Further work on the scholia has raised some problems affecting their authenticity, which need to be settled, if they are to be used effectively for the elucidation of the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12.  8
    Reproductive Intrusions: Evidence and Ethics.Anne Drapkin Lyerly & Miranda R. Waggoner - 2024 - American Journal of Bioethics 24 (2):31-33.
    Feminist bioethicists have long shed light on the indignities and injustice of reproductive intrusions, be they coerced gestation or forced interventions during pregnancy and birth. Writing about t...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13. Neuroscientific Prediction and the Intrusion of Intuitive Metaphysics.David Rose, Wesley Buckwalter & Shaun Nichols - 2015 - Cognitive Science 39 (7).
    How might advanced neuroscience—in which perfect neuro-predictions are possible—interact with ordinary judgments of free will? We propose that peoples' intuitive ideas about indeterminist free will are both imported into and intrude into their representation of neuroscientific scenarios and present six experiments demonstrating intrusion and importing effects in the context of scenarios depicting perfect neuro-prediction. In light of our findings, we suggest that the intuitive commitment to indeterminist free will may be resilient in the face of scientific evidence against such (...)
    Direct download  
     
    Export citation  
     
    Bookmark   22 citations  
  14.  75
    Neuroscientific Prediction and the Intrusion of Intuitive Metaphysics.David Rose, Wesley Buckwalter & Shaun Nichols - 2017 - Cognitive Science 41 (2):482-502.
    How might advanced neuroscience—in which perfect neuro-predictions are possible—interact with ordinary judgments of free will? We propose that peoples' intuitive ideas about indeterminist free will are both imported into and intrude into their representation of neuroscientific scenarios and present six experiments demonstrating intrusion and importing effects in the context of scenarios depicting perfect neuro-prediction. In light of our findings, we suggest that the intuitive commitment to indeterminist free will may be resilient in the face of scientific evidence against such (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  15.  27
    Intrusión pragmática y valor epistémico.Pascal Engel - 2011 - Areté. Revista de Filosofía 23 (1):25-51.
    “Pragmatic Encroachment and Epistemic Value”. Some philosopherswho defend “pragmatic encroachment” and “sensitive invariantism” argue thatchanges in the importance of being right and signiicant increases of the costsof error in given contexts can alter the standards of knowledge. If this view werecorrect, it could explain to some extent the practical value of knowledge. Thispaper argues that the pragmatic encroachment thesis is wrong. It discusses threepossible sources of encroachment on epistemic notions: on belief, on justiication,and on knowledge, and rejects the idea that (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  16.  10
    Harmonious Intrusion: Mankind and Nature in Statius’ Silvae 1.3.Brian Theng - forthcoming - Classical Quarterly:1-9.
    There are three conventionally held views about the relationship between mankind and nature in the Roman villa: man is master over the natural landscape; villas were positioned at vantage points so that the downward gaze of a dominus reinforced his domination; gardens offered opportunities to bring order upon nature. This article argues to the contrary that Manilius Vopiscus’ villa in Statius’ Siluae 1.3 presents a harmonious relationship between key natural features, the villa architecture and the villa proprietor himself. Nature sometimes (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  12
    Associative intrusions in short-term recall.Wayne A. Wickelgren - 1966 - Journal of Experimental Psychology 72 (6):853.
  18.  34
    Intrusion into Patient Privacy: a moral concern in the home care of persons with chronic mental illness.A. Magnusson & K. Lutzen - 1999 - Nursing Ethics 6 (5):399-410.
    The aim of this study was to identify and analyse ethical decision making in the home care of persons with long-term mental illness. A focus was placed on how health care workers interpret and deal with the principle of autonomy in actual situations. Three focus groups involving mental health nurses who were experienced in the home care of persons with chronic mental illness were conducted in order to stimulate an interactive dialogue on this topic. A constant comparative analysis of the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  19. Natural Compatibilism, Indeterminism, and Intrusive Metaphysics.Thomas Nadelhoffer, David Rose, Wesley Buckwalter & Shaun Nichols - 2020 - Cognitive Science 44 (8):e12873.
    The claim that common sense regards free will and moral responsibility as compatible with determinism has played a central role in both analytic and experimental philosophy. In this paper, we show that evidence in favor of this “natural compatibilism” is undermined by the role that indeterministic metaphysical views play in how people construe deterministic scenarios. To demonstrate this, we re-examine two classic studies that have been used to support natural compatibilism. We find that although people give apparently compatibilist responses, this (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  20.  27
    Beta Hebbian Learning for intrusion detection in networks with MQTT Protocols for IoT devices.Álvaro Michelena, María Teresa García Ordás, José Aveleira-Mata, David Yeregui Marcos del Blanco, Míriam Timiraos Díaz, Francisco Zayas-Gato, Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, Héctor Alaiz-Moretón & José Luis Calvo-Rolle - 2024 - Logic Journal of the IGPL 32 (2):352-365.
    This paper aims to enhance security in IoT device networks through a visual tool that utilizes three projection techniques, including Beta Hebbian Learning (BHL), t-distributed Stochastic Neighbor Embedding (t-SNE) and ISOMAP, in order to facilitate the identification of network attacks by human experts. This work research begins with the creation of a testing environment with IoT devices and web clients, simulating attacks over Message Queuing Telemetry Transport (MQTT) for recording all relevant traffic information. The unsupervised algorithms chosen provide a set (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  21.  28
    Flashbacks, intrusions, mind-wandering – Instances of an involuntary memory spectrum: A commentary on Takarangi, Strange, and Lindsay.Thomas Meyer, Henry Otgaar & Tom Smeets - 2015 - Consciousness and Cognition 33:24-29.
  22.  5
    Figures de l'intrusion chez Jean-Luc Nancy.Elodie Laügt - 2019 - Paris: L'Harmattan.
    Quel sens donner à l'intrusion quand celle-ci est inséparable d'une mise en danger potentiellement mortelle de ce qui se pense ' un ', mais qu'elle est en même temps nécessaire pour que quelque chose advienne? Quelles perspectives ontologiques, esthétiques et politiques la venue de l'autre ouvre-t-elle alors qu'il peut nous mettre ' hors de nous '? Comment, de fait, l'intrus ne vient-il pas toujours d'ailleurs? La lecture de L'Intrus de Jean-Luc Nancy et des liens qui se tissent entre le (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  14
    Intrusions of a drowsy mind: neural markers of phenomenological unpredictability.Valdas Noreika, Andrés Canales-Johnson, Justin Koh, Mae Taylor, Irving Massey & Tristan A. Bekinschtein - 2015 - Frontiers in Psychology 6.
  24.  4
    La intrusión de Gaia en Un Verdor terrible (2020) de Bejamín Labatut.Aníbal Gabriel Carrasco - 2024 - Valenciana 33:7-31.
    En el presente trabajo analizamos la novela Un verdor terrible (2020) de Benjamín Labatut como un texto que dialoga con las representaciones en torno al Antropoceno. A partir de este contexto geológico y planetario comprendemos la monstruosidad de los científicos y de la ciencia en términos de literatura gótica. La monstruosidad de la ciencia se produce por la ruptura de los marcos de representación, lo que construye una estética anamórfica cercana a las formas en que el arte puede aniquilar al (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25. Belief reports and pragmatic intrusion: the case of null appositives.Alessandro Capone - 2008 - Journal of Pragmatics 40:2019-2040.
    In this paper, I explore Bach’s idea (Bach, 2000) that null appositives, intended as expanded qua-clauses, can resolve the puzzles of belief reports. These puzzles are crucial in understanding the semantics and pragmatics of belief reports and are presented in a section. I propose that Bach’s strategy is not only a way of dealing with puzzles, but also an ideal way of dealing with belief reports. I argue that even simple unproblematic cases of belief reports are cases of pragmatic (...), involving null appositives, or to use the words of Bach, ‘qua-clauses’. The main difference between my pragmatic approach and the one by Salmon (1986) is that this author uses the notion of conversational implicature, whereas I use the notion of pragmatic intrusion and explicature. From my point of view, statements such as ‘‘John believes that Cicero is clever’’ and ‘‘John believes that Tully is clever’’ have got distinct truth-values. In other words, I claim that belief reports in the default case illuminate the hearer on the mental life of the believer, that includes specific modes of presentation of the referents talked about. Furthermore, while in the other pragmatic approaches, it is mysterious how a mode of presentation is assumed to be the main filter of the believer’s mental life, here I provide an explanatory account in terms of relevance, cognitive effects, and processing efforts. The most important part of the paper is devoted to showing that null appositives are required, in the case of belief reports, to explain certain anaphoric effects, which would otherwise be mysterious. My examples show that null appositives are not necessitated at logical form, but only at the level of the explicature, in line with the standard assumptions by Carston and Recanati on pragmatic intrusion. I develop a potentially useful analysis of belief reports by exploiting syntactic and semantic considerations on presuppositional clitics in Romance. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  26. Intrusive God, Disruptive Gospel: Encountering the Divine in the Book of Acts.[author unknown] - 2015
    No categories
     
    Export citation  
     
    Bookmark  
  27.  6
    Un intrus byzantin dans le Panthéon hellénique: le faux dieu Kyropalatès.Théodore Reinach - 1900 - Byzantinische Zeitschrift 9 (1).
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  41
    Intrusive thoughts, sensation seeking, and drug use in college students.Annie M. Hines & Geraldine A. Shaw - 1993 - Bulletin of the Psychonomic Society 31 (6):541-544.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  29.  2
    The Intrusion of Slavery into the Time of Schmitt and Shakespeare.Sara-Maria Sorentino - 2021 - Telos: Critical Theory of the Contemporary 2021 (194):89-109.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  11
    An Intrusive Hurro-Hittite Myth.E. A. Speiser - 1942 - Journal of the American Oriental Society 62 (2):98-102.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  31. Bulk Collection, Intrusion and Domination.Tom Sorell - 2018 - In Andrew I. Cohen (ed.), Philosophy and Public Policy. Lanham MD: Rowman and Littlefield. pp. 39-61.
    Bulk collection involves the mining of large data sets containing personal data, often for a security purpose. In 2013, Edward Snowden exposed large scale bulk collection on the part of the US National Security Agency as part of a secret counter-terrorism effort. This effort has mainly been criticised for its invasion of privacy. I argue that the right moral argument against it is not so much to do with intrusion, as ineffectiveness for its official purpose and the lack of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  32.  8
    Advanced Visualization of Intrusions in Flows by Means of Beta-Hebbian Learning.Héctor Quintián, Esteban Jove, José-Luis Casteleiro-Roca, Daniel Urda, Ángel Arroyo, José Luis Calvo-Rolle, Álvaro Herrero & Emilio Corchado - 2022 - Logic Journal of the IGPL 30 (6):1056-1073.
    Detecting intrusions in large networks is a highly demanding task. In order to reduce the computation demand of analysing every single packet travelling along one of such networks, some years ago flows were proposed as a way of summarizing traffic information. Very few research works have addressed intrusion detection in flows from a visualizations perspective. In order to bridge this gap, the present paper proposes the application of a novel projection method (Beta Hebbian Learning) under this framework. With the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  11
    Non-intrusive appliance load monitoring with bagging classifiers.O. Kramer, T. Klingenberg, M. Sonnenschein & O. Wilken - 2015 - Logic Journal of the IGPL 23 (3):359-368.
  34.  2
    Enforcement Rights against Non‐Culpable Non‐Just Intrusion.Peter Vallentyne - 2012 - In Brad Hooker (ed.), Developing Deontology. Malden, MA: Wiley. pp. 73–93.
    This chapter contains sections titled: Background on the Problem: Intrusion, Unjust Infringement, and Enforcement Rights Intrusion‐Harm Reduction Sufficient Conditions for Enforcement Rights against Non‐Culpable Non‐Just Intrusions A Defence Conclusion.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  35.  8
    Fewer intrusions after an attentional bias modification training for perceptual reminders of analogue trauma.Johan Verwoerd, Ineke Wessel & Peter J. de Jong - 2012 - Cognition and Emotion 26 (1):153-165.
  36.  39
    Conscious intrusion of threat information via unconscious priming in anxiety.Wen Li, Ken A. Paller & Richard E. Zinbarg - 2008 - Cognition and Emotion 22 (1):44-62.
  37.  15
    "russian Intrusion Into The Guarded Domain": Reflections Of A Qajar Statesman On European Expansion.Abbas Amanat - 1993 - Journal of the American Oriental Society 113 (1):35-56.
  38.  13
    Taming Intrusive Memories.Brian Domino - 2013 - Philosophical Practice: Journal of the American Philosophical Practitioners Association (American Philosophical Practitioners Association) 8 (2).
  39. Another intrusion of privacy.L. B. Mariano - 1997 - Kagaku Tetsugaku 30:123-138.
  40.  1
    Intrusions spiritualistes et impostures intellectuelles en sciences: Actes du colloque, 29 septembre 2000.Jean Dubessy, Guillaume Lecointre & Jacques Bouveresse - 2001 - Editions Syllepse.
    Depuis plusieurs années, on constate que les sciences suscitent une tenace convoitise de la part de mouvements qu'on peut qualifier du terme générique de " spiritualistes ". Notre environnement culturel est en grande partie technoscientifique ; il leur faut donc investir cet espace pour diffuser encore et toujours des thèses pourtant éculées : l'existence d'un Plan cosmique ou divin, l'ordonnancement du monde par une intelligence transcendante, la fin du darwinisme, le principe anthropique fort... Ces mouvements, aux contours très divers, présentent (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  41.  3
    Intrusions?John William Dunne - 1955 - London,: Faber & Faber.
  42.  37
    Evolving intrusion detection rules on mobile ad hoc networks.Sevil Şen & John A. Clark - 2008 - In Tu-Bao Ho & Zhi-Hua Zhou (eds.), Pricai 2008: Trends in Artificial Intelligence. Springer. pp. 1053--1058.
  43.  33
    Intrusion of the Real: Interview with Sophie Fiennes, Director, The Pervert's Guide to Cinema.Marty Fairbairn - 2006 - Film-Philosophy 10 (3):38-49.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  44.  11
    Rethinking Intrusiveness: Exploring the Sequential Organization in Interactions Between Infants and Mothers.Valentina Fantasia, Laura Galbusera, Corinna Reck & Alessandra Fasulo - 2019 - Frontiers in Psychology 10.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  12
    La intrusión del estar. Análisis hermenéutico de la significación del espacio para la noción levinasiana de instante.Ángel E. Garrido-Maturano - 2017 - Eidos: Revista de Filosofía de la Universidad Del Norte 27:224-250.
    RESUMEN Este artículo realiza un análisis hermenéutico-critico de la noción de instante como autoafirmación del yo en el joven Lévinas y como relación diacrónica con el otro en sus obras de madurez. Primero elucida la significación esencial del espacio en la constitución del instante. Luego explicita por qué la espacialidad del fenómeno implica la relación con la alteridad como condición de toda forma del instante, incluso del instante de autoafirmación del yo. Finalmente describe el paso del instante de identificación del (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  46. Knowing how and pragmatic intrusion.Alessandro Capone - 2011 - Intercultural Pragmatics 8 (4):543-570.
  47.  8
    On the Relative Intrusiveness of Physical and Chemical Restraints.Gabriel De Marco, Thomas Douglas, Lisa Forsberg & Julian Savulescu - 2024 - American Journal of Bioethics Neuroscience 15 (1):26-28.
    Crutchfield and Redinger argue that consciousness-altering chemical restraints are less “liberty-intrusive” (or as we will sometimes put it, just less “intrusive”) than physical restraints. Physica...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  19
    Vulgar Intrusions.Daryn Green - 2013 - Philosophy Now 94:52-54.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  20
    Post-event spontaneous intrusive recollections and strength of memory for emotional events in men and women.Nikole K. Ferree & Larry Cahill - 2009 - Consciousness and Cognition 18 (1):126-134.
    Spontaneous intrusive recollections follow traumatic events in clinical and non-clinical populations. To determine whether any relationship exists between SIRs and enhanced memory for emotional events, participants viewed emotional or neutral films, had their memory for the films tested two days later, and estimated the number of SIRs they experienced for each film. SIR frequency related positively to memory strength, an effect more pronounced in the emotional condition. These findings represent the first demonstration of a relationship between SIRs occurring after an (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  50. External intrusion, internal tragedy : environmental pollution and multinational corporations in sub-Saharan Africa.Evans S. Osabuohien, Uchenna R. Efobi & Ciliaka M. W. Gitau - 2013 - In Liam Leonard & Maria-Alejandra Gonzalez-Perez (eds.), Principles and strategies to balance ethical, social and environmental concerns with corporate requirements. Bingley, UK: Emerald Group Publishing.
     
    Export citation  
     
    Bookmark  
1 — 50 / 793