scholarly journals Critical information thresholds underlying generic and familiar face categorisation at the same face encounter

NeuroImage ◽  
2021 ◽  
pp. 118481
Author(s):  
Genevieve L. Quek ◽  
Bruno Rossion ◽  
Joan Liu-Shuang
TAPPI Journal ◽  
2015 ◽  
Vol 14 (9) ◽  
pp. 609-616 ◽  
Author(s):  
FRÉDÉRIC CLERC ◽  
VIRGINIE CHAMBOST ◽  
PAUL STUART

The objective of this TAPPI JOURNAL (TJ) special feature is to synthesize critical information and take-away messages from the 2013 TAPPI Biorefinery Design Course in Green Bay, WI, USA, based on the presentations made, as well as discussions between participants and experts. The content of this feature was developed based on notes taken during the course; synthesis of critical information; identification of some critical results and figures included here; and identification of key messages that may be useful to TJ readers.


Author(s):  
David James Hudson

Drawing on a range of critical race and anti-colonial writing, and focusing chiefly on Anglo-Western contexts of librarianship, this paper offers a broad critique of diversity as the dominant mode of anti-racism in LIS. After outlining diversity's core tenets, I examine the ways in which the paradigm's centering of inclusion as a core anti-racist strategy has tended to inhibit meaningful treatment of racism as a structural phenomenon. Situating LIS diversity as a liberal anti-racism, I then turn to diversity's tendency to privilege individualist narratives of (anti-)racism, particularly narratives of cultural competence, and the intersection of such individualism with broader structures of political-economic domination. Diversity's preoccupation with demographic inclusion and individual behavioural competence has, I contend, left little room in the field for substantive engagement with race as a historically contingent phenomenon: race is ultimately reified through LIS diversity discourse, effectively precluding exploration of the ways in which racial formations are differentially produced in the contextually-specific exercise of power itself. I argue that an LIS foregrounding of race as a historical construct - the assumption of its contingency - would enable deeper inquiry into the complex ways in which our field - and indeed the diversity paradigm specifically - aligns with the operations of contemporary regimes of racial subordination in the first place. I conclude with a reflection on the importance of the Journal of Critical Information and Library Studies as a potential site of critical exchange from which to articulate a sustained critique of race in and through our field.


Author(s):  
Ilia Pavlovich Mikhnev ◽  
Svetlana Vladimirovna Mikhneva

The article discusses the competences and powers of the state authorities of the Russian Federation within their legal status in the field of ensuring the security of critical information infrastructure. Some functions and authorities in the field of information security have changed in a number of federal executive bodies. In particular, the Federal Security Service, on the basis of a presidential decree, is authorized to create a state system for detecting, preventing and eliminating the consequences of computer attacks on information resources of the Russian Federation. However, not all rights and obligations are enshrined; a number of powers cause the duality of the legal status of certain federal bodies of state power. The clarity and unambiguity of securing the rights and obligations of state bodies authorized in the field of information security are guarantees for effectively ensuring the security of important information infrastructure facilities.


Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


2018 ◽  
Author(s):  
Jeesun Kim ◽  
Sonya Karisma ◽  
Vincent Aubanel ◽  
Chris Davis

Author(s):  
Arthur Coelho Bezerra ◽  
Marco Schneider ◽  
Anna Brisola

A magnitude das informações circulantes nas sociedades contemporâneas faz com que seja cada vez mais urgente a aquisição de ferramentas necessárias para a absorção, avaliação e utilização dessas informações pelos indivíduos. Defenderemos, no presente artigo, que esse caminho passa pelo pensamento reflexivo e pelo gosto informacional, disposições que se apresentam como contribuições essenciais para o desenvolvimento de uma competência crítica em informação. Para tanto, recorreremos tanto às pesquisas de cientistas da informação sobre a chamada critical information literacy quanto à proposta pedagógica de Paulo Freire para o desenvolvimento do pensamento crítico, incorporando, também, apontamentos de filósofos e outros pensadores que dissertaram a respeito do gosto pelo conhecimento.Palavras-chave: Competência em informação. Competência crítica em informação. Pensamento reflexivo. Gosto. Paulo Freire.Link:http://www.ies.ufpb.br/ojs2/index.php/ies/article/view/31114


Author(s):  
Courtney Freer

This chapter provides a critical background on the country cases by examining their brief political histories as independent states. It also gives critical information about the legal frameworks of such states to highlight where and how Islamist groups can act in these states. By providing such descriptions, this chapter demonstrates the extent to which these states, in regime or popular politics, either adhere or fail to adhere to the government type and political environment normally associated with the rentier state. The chapter also reveals critical commonalities among the super-rentier states—they are governed by powerful ruling families; institutionalized political life is hampered; and civil society and political life remain largely informal—while also indicating their differences, which arose in light of their differing sociocultural and economic backgrounds.


Sign in / Sign up

Export Citation Format

Share Document