A letter written to M. Richard Hakluyt of the Midle Temple, contayning a report of the true state and commodities of Newfoundland

Author(s):  
Richard Hakluyt
Keyword(s):  
1967 ◽  
Vol 12 (8) ◽  
pp. 428-428
Author(s):  
DURGANAND SINHA
Keyword(s):  

Author(s):  
Chris Barrett

While Chapters 1–3 examine early modern texts that take the work of spatial representation as an opportunity to consider the labor, dangers, and possibilities of representation, the Conclusion (which takes its title from remarks by Richard Hakluyt in describing how as a child he became fascinated by maps) considers three contemporary objects: a mug, a Mapparium, and recent revisions to the famous boot-shaped silhouette of Louisiana. Each of these objects represents a global or regional area in some novel way: foregrounding their artifice in order to exploit the same cartographic anxieties of representation articulated in works by Spenser, Drayton, and Milton, these objects suggest that the contemporary moment’s efforts to reimagine the space of the world in rhetorically affecting if overtly non-mimetic ways reflects the triumph of an early modern poetics of anxiety, a poetics that might be generative still, in the Anthropocene.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Kenneth Albert Saban ◽  
Stephen Rau ◽  
Charles A. Wood

Purpose Information security has increasingly been in the headlines as data breaches continue to occur at alarming rates. This paper aims to propose an Information Security Preparedness Model that was developed to examine how SME executives’ perceptions of security importance, implementation challenges and external influences impact their awareness and commitment to security preparedness. Design/methodology/approach Funded by the Department of Justice, a national survey of SME executives’ perceptions of information security preparedness was conducted. Using PLS-SEM, the survey responses were used to test the proposed Information Security Preparedness Model. Findings The results indicate that as perceptions of security importance and external influences increase, SME executives’ awareness and commitment to information security also increases. In addition, as implementation challenges increase, awareness and commitment to information security decreases. Finally, as security importance and awareness and commitment to information security increases, executives’ perception of security preparedness also increases. Research limitations/implications Executive perceptions of information security were measured and not the actual level of security. Further research that examines the agreement between executive perceptions and the true state of information security within the organization is warranted. Originality/value Prior information security studies using Roger’s (1975, 1983) Protection Motivation Theory have produced mixed results. This paper develops and tests the Information Security Preparedness Model to more fully explain SME executive’s perceptions of information security.


Author(s):  
Patricia Everaere ◽  
Sebastien Konieczny ◽  
Pierre Marquis

We study how belief merging operators can be considered as maximum likelihood estimators, i.e., we assume that there exists a (unknown) true state of the world and that each agent participating in the merging process receives a noisy signal of it, characterized by a noise model. The objective is then to aggregate the agents' belief bases to make the best possible guess about the true state of the world. In this paper, some logical connections between the rationality postulates for belief merging (IC postulates) and simple conditions over the noise model under consideration are exhibited. These results provide a new justification for IC merging postulates. We also provide results for two specific natural noise models: the world swap noise and the atom swap noise, by identifying distance-based merging operators that are maximum likelihood estimators for these two noise models.


Author(s):  
S.S. Pertsov ◽  
E.A. Yumatov ◽  
N.A. Karatygin ◽  
E.N. Dudnik ◽  
A.E. Khramov ◽  
...  

It is a well-known fact that mental activity of the brain can be presented by two different states, i.e., the true state and the false state. A promising method of the electroencephalogram (EEG) wavelet transform has been developed over recent years. Using this method, we evaluated the principle possibility for direct objective registration of mental activity in the human brain. Previously we developed and described (published) a new experimental model and software for recognizing the true and false mental responses of a person with the EEG wavelet transform. The developed experimental model and software-and-data support allowed us to compare (by EEG parameters) two mental states of brain activity, one of which is the false state, while another is the true state. The goal of this study is to develop an absolutely new information technology for recognizing the true and false states in mental activity of the brain by means of the EEG wavelet transform. Our study showed that the true and false states of the brain can be distinguished using the method of continuous wavelet transform and calculation of the EEG wavelet energy. It was revealed that the main differences between truthful and false mental responses are observed in the delta and alpha ranges of the EEG. In the EEG delta rhythm, the wavelet energy is much higher under conditions of the false response as compared to that in the true response. In the EEG alpha rhythm, the wavelet energy is significantly higher with the true answer than in the false one. These data open a new principal possibility of revealing the true and false mental state of the brain by means of continuous wavelet transform and calculation of the EEG wavelet energy.


Sign in / Sign up

Export Citation Format

Share Document