Tradicionālā loģika – arhaisms vai fenomens ar attīstības iespējām

Author(s):  
Vilis Daberts

The aim of the article is to show the specifics of traditional logic. To a large extent, logic initially operates as Aristotle's logic. The traditional formal logic appears as a combination of individual elements, which are obtained from logical systems of various historical eras and directions. The author believes that the subject of logic is objectively linked to the category of the form, but the difficulty in understanding the form lies in the complexity of the form’s nature. The author claims that the content, which differs from the form, is not included in it. There is a functional difference between the form and the content. It is assumed that the types of logic appear as a function of a certain form, and diversity of logic is a consequence of the various manifestations of the form. Logic is interested in the correct form. Such assessment of the form includes an idea of the form as a specific condition. The correct form is a condition for the safety of information included in the statements or their sets. The author argues that logic can be characterized as a science of formal conditions and ways to achieve information security of certain parameters. Supposedly, traditional logic is a formal (form-based) science, which however is limited to certain substantial conditions, and that is one of the factors that forms the specifics of science. The author emphasizes that the tools offered by traditional logic allow to find solutions related to novelty.

Author(s):  
Turhut Salayev

The article deals with scientific and theoretical understanding and the provision of the definition of the category "actors of administrative and legal support of information security in the customs area". The author has disclosed and analyzed the provisions of the administrative and legal doctrine of the above questio, besides, the problematic issues of the definition of "subjects of administrative and legal support of information security in the customs sphere" are identified, andthe necessity of distinguishing this concept from other related concepts and categories is defined. Disclosing issues of actors of administrative and legal support of information security in the cus-toms sphere, it is necessary to avoid substitution of concepts and clearly understand the difference between the concepts of "institutional mechanism of administrative and legal support of information security in customs" and "state mechanism of administrative and legal support of information security in the customs sphere "from the concept of" subjects of administrative and legal support of information security in the customs sphere ". After all, the concept that is the subject of our study, of all the above, has the most comprehensive and broad scope and meaning. That is why, disclosing a set of subjects of administrative and legal support of information security in the customs sphere, it is advisable to apply a broad approach to understanding this category, given that among such subjects must be considered non-state subjects. objects - local governments, public organizations, etc. Because without their activities such a list will not be complete, and the mechanism of administrative and legal support of information security in the customs sphere will not be such that covers all possible spheres of public life and methods of information security. The current general information and administrative legislation, as well as special legislation gov-erning the procedure of customs, is considered in order to more clearly disclose the features and legal status of the actors of administrative and legal support of information security in the customs area. Each of these entities plays an appropriate role and occupies the necessary place in the system of national security of Ukraine, information security of Ukraine in general and information security in the customs area in particular. This role can be described as the implementation of general control over information security in the customs area, as well as taking measures to respond to violations of information legislation and the emergence of threats to information in the customs area within the powers defined by law. At the same time, the administrative and legal provision of information security is carried out directly by the customs authorities.


2014 ◽  
Vol 19 (2) ◽  
pp. 207-232 ◽  
Author(s):  
Alberto Vanzo

AbstractThis article reconstructs Kant's view on the existential import of categorical sentences. Kant is widely taken to have held that affirmative sentences (theAandIsentences of the traditional square of opposition) have existential import, whereas negative sentences (EandO) lack existential import. The article challenges this standard interpretation. It is argued that Kant ascribes existential import only to some affirmative synthetic sentences. However, the reasons for this do not fall within the remit of Kant's formal logic. Unlike traditional logic and modern standard quantification theory, Kant's formal logic is free from existential commitments.


1968 ◽  
Vol 3 (1) ◽  
pp. 1-6 ◽  
Author(s):  
Ch. Perelman

That the question what is legal logic should still arise today appears paradoxical, for law is after all one of the oldest of human disciplines and logic has in the twentieth century become one of the most developed of the disciplines of contemporary philosophy. Yet comparison of a number of recent works dealing with the subject, all of which, not being without merit, have enjoyed a measure of success, is enough to show that the problem exists and is even strongly disputed.Of four such works, two—those by E. Levi and K. Engisch—do not use the word “logic” in their titles, though they deal with legal reasoning and legal thought. The other two, on the contrary, expressly purport to deal with legal logic. Strangely enough, however, their authors explicitly deny the specific existence of such a discipline, whereas Levi and Engisch underscore, without any hesitation, the specific nature of legal reasoning and the existence of a particular logic, legal logic.Thus in the first paragraph of his work, where Klug attempts to define the concept of legal logic, he states that it comprises the study of the rules of formal logic as used in the judicial application of rules of law (p. 6); that legal logic is therefore practical logic, consisting of the application to law of the rules of pure or theoretical logic which is general logic (p. 7).


P. V. Tavanéc. O vidah suždéniá (On types of judgment). Izvéstiá Akadémii Nauk SSSR, Sériá istorii i filosofii, vol. 7 (1950), pp. 69–84. - P. V. Tavanéc. Kritika istolkovaniá prirody suždénij logikoj otnošénij (A critique of the interpretation of the nature of judgments in the logic of relations). Izvéstiá Akadémii Nauk SSSR, Sériá istorii i filosofii, vol. 7 (1950), pp. 360–372. - K. S. Bakradzé. K voprosu o sootnošénii logiki i dialéktiki (On the question of the relationship of logic to dialectic). Voprosy filosofii, no. 2 (1950), pp. 198–209. - V. I. Čérkésov. O logiké i marksistskoj dialéktiké (On logic and Marxist dialectic). Voprosy filosofii, no. 2 (1950), pp. 209–222. - M. S. Strogovič. O prédmété formal'noj logiki (On the subject matter of formal logic). Voprosy filosofii, no. 3 (1950), pp. 309–317. - I. I. Os'makov. O logiké myšéniá i o nauké logiké (On the logic of thought and the science of logic). Voprosy filosofii, no. 3 (1950), pp. 317–330. - P. S. Popov. Prédméi formal'noj logiki i dialéktika (Dialectic and the subject matter of formal logic). Voprosy filosofii, no. 1 (1951), pp. 210–218. - N. V. Zavadskaá. K diskussii po voprosam logiki (On the discussion of questions of logic). Voprosy filosofii, no. 1 (1951), pp. 218–222. - A. O. Makovél'skij. Čém, dolžna byt' logika kak nauka? (What should logic be as a science?) Voprosy filosofii, no. 2 (1951), pp. 179–181. - Dobrin Spasov. Dialéktičéskuú logiku nado né otricat', a razrabatyvat' (Dialectical logic should not be rejected but elaborated). Voprosy filosofii, no. 2 (1951), pp. 182–184. - M. N. Alékséév. Obsuždénié voprosov logiki v Moskovskom Gosudarstvénnom Univérsdtété (Discussion of questions of logic at the State University of Moscow). Voprosy filosofii, no. 2 (1951), pp. 184–192. - A. D. Aléksandrov. O logiké (On logic). Voprosy filosofii, no. 3 (1951), pp. 152–163. - F. Á. Ostrouh. Protiv iskažéniá marksizma v voprosah logiki (Versus distortion of Marxism in questions of logic). Voprosy filosofii, no. 3 (1951), pp. 164–173.

1952 ◽  
Vol 17 (2) ◽  
pp. 124-128
Author(s):  
George L. Kline

Philosophy ◽  
1930 ◽  
Vol 5 (18) ◽  
pp. 159-174
Author(s):  
Ph. Kohnstamm

There is perhaps no part of Kant’sCritique of Pure Reasonwhich has called forth such severe criticism as his deduction of the System of Categories in the Transcendental Analytic. I am not aware of even one among his many followers who holds to this part of Kant’s doctrine. And the reason for this disagreement is obvious. Kant’s deduction of his System of Categories is based on Formal Logic, the theory of syllogism, first laid down by Aristotle. Mediaeval scholars had changed some details and partly systematized the subject. Kant himself had added some finishing touches to produce his famous number of a dozen categories, but the gist of this logical theory was the same as that found in Aristotle’sOrganon.


1941 ◽  
Vol 6 (3) ◽  
pp. 73-89 ◽  
Author(s):  
Alfred Tarski

The logical theory which is called the calculus of (binary) relations, and which will constitute the subject of this paper, has had a strange and rather capricious line of historical development. Although some scattered remarks regarding the concept of relations are to be found already in the writings of medieval logicians, it is only within the last hundred years that this topic has become the subject of systematic investigation. The first beginnings of the contemporary theory of relations are to be found in the writings of A. De Morgan, who carried out extensive investigations in this domain in the fifties of the Nineteenth Century. De Morgan clearly realized the inadequacy of traditional logic for the expression and justification, not merely of the more intricate arguments of mathematics and the sciences, but even of simple arguments occurring in every-day life; witness his famous aphorism, that all the logic of Aristotle does not permit us, from the fact that a horse is an animal, to conclude that the head of a horse is the head of an animal. In his effort to break the bonds of traditional logic and to expand the limits of logical inquiry, he directed his attention to the general concept of relations and fully recognized its significance. Nevertheless, De Morgan cannot be regarded as the creator of the modern theory of relations, since he did not possess an adequate apparatus for treating the subject in which he was interested, and was apparently unable to create such an apparatus. His investigations on relations show a lack of clarity and rigor which perhaps accounts for the neglect into which they fell in the following years.


2019 ◽  
Vol 11 (1) ◽  
pp. 15-18
Author(s):  
V Kurchenko ◽  
T Sharamok ◽  
O Marenkov

Fish erythrocytes are sensitive to environmental pollution and their morphological changes can be used as a bioindicator of the toxicity of the aquatic environment. The disadvantage of existing methods of blood smears coloring is that they are inconvenient in the field conditions, when it is necessary to examine the fish blood during ichthyological researches or they are long-lasting. In this regard, there is a need for a fast and reliable method of coloring blood cells of fish, which can be used both in laboratory and in field conditions. The aim of the work was to improve the method of coloring fish blood smears for easier and faster execution, without degradation of the quality of colouring. The subject of the research was the young Cyprinidae fish. The improved method is based on the classic method of painting by Papenheim, but differs in the interval of time devoted to colouring in a solution of the dye Romanovskogo. The analysis showed that erythrocytes on medicine that were in the Romanovsky solution for 5 minutes had the correct form with clear contours, a dark purple core located in the center of the cell. It has been found that this method can be used in cytometric researches to determine such indicators: large longitudinal and small transverse diameters of erythrocytes, erythrocyte area, erythrocyte core area, nuclear-cytoplasmic ratio, percentage of mature and immature erythrocytes and their forms. It can also be used in analyzing the presence of erythrocyte pathologies. It has been established that reduction of time (from 20 minutes to 5 minutes) of preparations in the dye solution of Romanovsky does not affect the quality of their coloring, and therefore it is a reliable and fast way that can be successfully applied in morphological and cytometric studies of blood of fish.


2020 ◽  
Vol 10 (40) ◽  
pp. 73-83
Author(s):  
Ihor Diorditsa ◽  
Kateryna Katerynchuk ◽  
Armenui Telestakova ◽  
Nataliia Kulak ◽  
Andrii Nastiuk

In this article, the authors analyze cyberterrorism as a threat to Ukraine's cyber security. The urgency of the issue declared in the paper is conditioned by the fact that fair number of terrorist acts intende to make harm to the interests of the state, can be committed today both in real world and in cyberspace. As such acts are committed using computer systems and are done in cyberspace, authors propose to define this type of socially dangerous acts as «cyberterrorism». The methodological basis of this study is a set of philosophical, general scientific, special scientific and other methods that are directly applied in legal researches. The authors have done the interpretation of terms making up the conceptual and categorical apparatus of the subject of research. The difference between information terrorism and cyberterrorism has been substantiated by the writers. The emphasis was placed on the necessity to create a Cyber Command that could react fast to challenges in the information security sphere of the state, including acts of cyberterrorism.


2018 ◽  
Vol 7 (4.36) ◽  
pp. 338
Author(s):  
Arif Uzzaman ◽  
. .

The ability of the healthcare industry to keep abreast with the evolving trends in endpoint information security depends on combinations of measures. In the current literature, some of these measures include the development of analytics capable of spotting intruders on time, embracing quick reactions to potential or detected intrusions, and the decision to employ robust system defenses. In this paper, the main aim was to review the current literature regarding the subject of endpoint information security, with critical insights gained from the case of the healthcare industry. Findings suggest that the healthcare industry forms one of the most attractive arenas for security attackers. Some of the healthcare organizations that have been victims of recent security attacks include the Californian Hollywood Presbyterian Medical Center that experienced a data breach in February 2016 and MedStar Health Inc. (in the same month). In the following month, San Diego’s Alvaro Hospital Medical Center was also targeted for cyber attack. Hence, some algorithms have been proposed to counter these attacks; including the use of SOA-based EHRs, the implementation of the RBAC model, the use of k-anonymity, k-unlinkability, and the SQL searching mechanisms that target the patients’ encrypted data. Also, some strategies have been proposed as best practices in endpoint information security. These strategies include the management of identity lifecycles, the establishment of risk-aware cultures, the management of third-party security compliance, and securing healthcare firms’ devices in terms of design. Overall, it is evident that the complexity of endpoint information security in the healthcare industry (due to the evolution of applications such as virtualization and cloud computing) implies that the ability to survive from future security attacks will depend on the firms’ ability to keep abreast with industry demands. 


Telecom IT ◽  
2020 ◽  
Vol 8 (3) ◽  
pp. 102-111
Author(s):  
V. Desnitsky

The paper presents results of analysis of information security threats in wireless sensor networks and means for their modeling. Research subject. The subject of the research is means for modeling and analyzing information security threats to wireless sensor networks. Method. The work uses methods of mathematical modeling and system analysis. Core results. The analysis of actual threats to information security of wireless sensor networks is performed. A comparative analysis of means for simulation modeling of wireless sensor networks and attacking influences is performed. Two models of presentation of wireless sensor networks are proposed for solving the problems of threat modeling. Practical significance. The results of the work can be used for modeling and evaluation of security of complex wireless sensor networks with a large number of nodes in conditions of organizational complexity of using full-featured instances of wireless sensor networks to solve information security problems.


Sign in / Sign up

Export Citation Format

Share Document