| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910275054003321 |
|
|
Autore |
David Sylvain <1972-> |
|
|
Titolo |
Cioran : un héroïsme à rebours / / Sylvain David |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Presses de l’Université de Montréal, 2006 |
|
Montréal, Quebec : , : Presses de l'Université de Montréal, , 2006 |
|
©2006 |
|
|
|
|
|
|
|
|
|
ISBN |
|
2-7606-3007-2 |
979-1-03-650201-9 |
2-7606-2445-5 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (343 p.) |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Présenté à l'origine comme thèse (de doctorat de l'auteur--Université du Québec à Montréal), 2005 sous le titre: De l'inconvénient d'être moderne. |
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Sommario/riassunto |
|
On a souvent dit que Cioran, dans son œuvre en français, reprend les mêmes thèmes, qu'il tend au désistement, au repli sur soi et à l'exploration de sa propre intériorité. Pourtant, le présent essai révèle une subtile inflexion de la pensée du philosophe, d'un recueil à l'autre, et affirme que l'abstention est en fait une prise de position, dont il s'agit de déchiffrer les causes et les modalités. Partant du principe que l'art se définit comme autonomie et fait social, ne prenant forme qu'en opposition à la société, tout en tirant sa substance de celle-ci, Sylvain David avance que Cioran a développé son point de vue de l'univers moderne tout au long de son œuvre fragmentaire, structurant ainsi son écriture même. À la fois lecture diachronique et étude thématique des écrits de Cioran, cet ouvrage démontre, au-delà de l'apparent éclatement des fragments, l'organisation d'un imaginaire où un va-et-vient entre l'être et le monde s'opère, où la distance que le sujet tente d'instaurer entre ses semblables et lui doit être constamment renégociée, où le marginal ne peut se définir que par rapport à la collectivité, qu'en fonction du groupe dont il choisit de s'exclure. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNISA996546831203316 |
|
|
Autore |
Huang Linan |
|
|
Titolo |
Cognitive Security [[electronic resource] ] : A System-Scientific Approach / / by Linan Huang, Quanyan Zhu |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2023.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (117 pages) |
|
|
|
|
|
|
Collana |
|
SpringerBriefs in Computer Science, , 2191-5776 |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection—Law and legislation |
Artificial intelligence |
Privacy |
Artificial Intelligence |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Chapter. 1. Introduction -- Chapter. 2. System-Scientific Methods -- Chapter. 3. Cognitive Capacities for Designing, Operating, Supervising, and Securing Complex Systems -- Chapter. 4. Review of System-Scientific Perspectives for Analysis, Exploitation, and Mitigation of Cognitive Vulnerabilities -- Chapter. 5. ADVERT: Defending against Reactive Attention Attacks -- Chapter. 6. RADAMS: Defending against Proactive Attention Attacks -- Chapter. 7. Summary and Conclusions. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book presents the latest research in cognitive security, a rapidly emerging field that addresses the vulnerabilities in human behavior and cognition that can lead to Cyber-Physical Systems (CPS) compromise. This book demonstrates that as adversaries increasingly use manipulative and deceptive information to disrupt human cognitive processes, including sensation, attention, memory, and mental operations, humans are misled into fallacious reasoning and manipulated decisions that can lead to system-level meltdown. Cognitive security aims to protect humans from the exploitation of cognitive vulnerabilities, help them make informed decisions that are free from manipulation and undue influence, and mitigate the aggravating risk in the ensuing steps of the attacker’s kill chain. This book offers solutions that work across different fields, such as |
|
|
|
|
|
|
|
|
|
|
psychology, neuroscience, data science, social science, and game theory, to deal with cognitive threats. It guides the reader through the core ideas with figures, real-life examples, and case studies. Moreover, it formally defines all research questions, presents the results using mathematical theorems and proofs, and obtains insights through numerical validation. This book provides a self-contained and brief overview of essential system-scientific tools for modeling, analyzing, and mitigating cognitive vulnerabilities. The concepts of human cognitive capacities and cognitive vulnerabilities are formally discussed, followed by two case studies in the scenarios of reactive and proactive attention vulnerabilities. This book provides insights and applications on this transdisciplinary topic, with the goal of motivating future research in this emerging area and pushing the frontier of human-technology convergence. This book is a valuable reference for researchers and advanced-level students studying or working in cognitive security and related fields. It is also useful for decision-makers, managers, and professionals working within these related fields. |
|
|
|
|
|
| |