LEADER 03120nam 2200685Ia 450 001 9910454987803321 005 20200520144314.0 010 $a1-282-40914-X 010 $a9786612409141 010 $a0-313-05955-1 035 $a(CKB)1000000000806989 035 $a(EBL)497564 035 $a(OCoLC)61145275 035 $a(SSID)ssj0000367031 035 $a(PQKBManifestationID)11250873 035 $a(PQKBTitleCode)TC0000367031 035 $a(PQKBWorkID)10419078 035 $a(PQKB)10321801 035 $a(MiAaPQ)EBC497564 035 $a(Au-PeEL)EBL497564 035 $a(CaPaEBR)ebr10349950 035 $a(CaONFJC)MIL240914 035 $a(EXLCZ)991000000000806989 100 $a20030319d2003 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aTurning the world upside down$b[electronic resource] $ethe War of American Independence and the problem of empire /$fNeil Longley York 210 $aWestport, Conn. $cPraeger$d2003 215 $a1 online resource (209 p.) 225 1 $aStudies in military history and international affairs 300 $aDescription based upon print version of record. 311 $a0-275-97693-9 320 $aIncludes bibliographical references and index. 327 $aContents; Acknowledgments; Preface; 1 Imperial Competition and the Rise of British America; 2 Revolt Without Revolution; 3 Revolution Embraced, Independence Declared; 4 The War as Great Power Conflict; 5 New Nation, New Empire; Suggested Reading; Index 330 $aYork illustrates how Revolutionary Americans founded an empire as well as a nation, and how they saw the two as inseparable. While they had rejected Britain and denounced power politics, they would engage in realpolitik and mimic Britain as they built their empire of liberty. England had become Great Britain as an imperial nation, and Britons believed that their empire promised much to all fortunate enough to be part of it. Colonial Americans shared that belief and sense of pride. But as clashing interests and changing identities put them at odds with the prevailing view in London, dissident c 410 0$aStudies in military history and international affairs. 606 $aBalance of power$xHistory$y18th century 606 $aImperialism$xHistory$y18th century 606 $aNational characteristics, American 606 $aPolitical messianism$zUnited States 607 $aUnited States$xHistory$yRevolution, 1775-1783$xInfluence 607 $aUnited States$xPolitics and government$y1775-1783$xPhilosophy 607 $aUnited States$xTerritorial expansion 608 $aElectronic books. 615 0$aBalance of power$xHistory 615 0$aImperialism$xHistory 615 0$aNational characteristics, American. 615 0$aPolitical messianism 676 $a973.3/11 700 $aYork$b Neil Longley$0868225 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910454987803321 996 $aTurning the world upside down$91938131 997 $aUNINA LEADER 04310nam 22005655 450 001 996546831203316 005 20230602165019.0 010 $a3-031-30709-7 024 7 $a10.1007/978-3-031-30709-6 035 $a(MiAaPQ)EBC30564822 035 $a(Au-PeEL)EBL30564822 035 $a(OCoLC)1381478913 035 $a(DE-He213)978-3-031-30709-6 035 $a(BIP)089626299 035 $a(PPN)272263257 035 $a(EXLCZ)9926821639000041 100 $a20230602d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCognitive Security$b[electronic resource] $eA System-Scientific Approach /$fby Linan Huang, Quanyan Zhu 205 $a1st ed. 2023. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2023. 215 $a1 online resource (117 pages) 225 1 $aSpringerBriefs in Computer Science,$x2191-5776 311 08$aPrint version: Huang, Linan Cognitive Security Cham : Springer International Publishing AG,c2023 9783031307089 327 $aChapter. 1. Introduction -- Chapter. 2. System-Scientific Methods -- Chapter. 3. Cognitive Capacities for Designing, Operating, Supervising, and Securing Complex Systems -- Chapter. 4. Review of System-Scientific Perspectives for Analysis, Exploitation, and Mitigation of Cognitive Vulnerabilities -- Chapter. 5. ADVERT: Defending against Reactive Attention Attacks -- Chapter. 6. RADAMS: Defending against Proactive Attention Attacks -- Chapter. 7. Summary and Conclusions. 330 $aThis book presents the latest research in cognitive security, a rapidly emerging field that addresses the vulnerabilities in human behavior and cognition that can lead to Cyber-Physical Systems (CPS) compromise. This book demonstrates that as adversaries increasingly use manipulative and deceptive information to disrupt human cognitive processes, including sensation, attention, memory, and mental operations, humans are misled into fallacious reasoning and manipulated decisions that can lead to system-level meltdown. Cognitive security aims to protect humans from the exploitation of cognitive vulnerabilities, help them make informed decisions that are free from manipulation and undue influence, and mitigate the aggravating risk in the ensuing steps of the attacker?s kill chain. This book offers solutions that work across different fields, such as psychology, neuroscience, data science, social science, and game theory, to deal with cognitive threats. It guides the reader through the core ideas with figures, real-life examples, and case studies. Moreover, it formally defines all research questions, presents the results using mathematical theorems and proofs, and obtains insights through numerical validation. This book provides a self-contained and brief overview of essential system-scientific tools for modeling, analyzing, and mitigating cognitive vulnerabilities. The concepts of human cognitive capacities and cognitive vulnerabilities are formally discussed, followed by two case studies in the scenarios of reactive and proactive attention vulnerabilities. This book provides insights and applications on this transdisciplinary topic, with the goal of motivating future research in this emerging area and pushing the frontier of human-technology convergence. This book is a valuable reference for researchers and advanced-level students studying or working in cognitive security and related fields. It is also useful for decision-makers, managers, and professionals working within these related fields. 410 0$aSpringerBriefs in Computer Science,$x2191-5776 606 $aData protection?Law and legislation 606 $aArtificial intelligence 606 $aPrivacy 606 $aArtificial Intelligence 610 $aMathematics 615 0$aData protection?Law and legislation. 615 0$aArtificial intelligence. 615 14$aPrivacy. 615 24$aArtificial Intelligence. 676 $a004.019 700 $aHuang$b Linan$01363656 701 $aZhu$b Quanyan$0888933 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996546831203316 996 $aCognitive Security$93384498 997 $aUNISA