A True State of the Present Difference between the Royal African Company and the Separate Traders ... written by a true lover of his country (London, 1710)

2021 ◽  
pp. 15-57
Author(s):  
Kenneth Morgan
Keyword(s):  
1967 ◽  
Vol 12 (8) ◽  
pp. 428-428
Author(s):  
DURGANAND SINHA
Keyword(s):  

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Kenneth Albert Saban ◽  
Stephen Rau ◽  
Charles A. Wood

Purpose Information security has increasingly been in the headlines as data breaches continue to occur at alarming rates. This paper aims to propose an Information Security Preparedness Model that was developed to examine how SME executives’ perceptions of security importance, implementation challenges and external influences impact their awareness and commitment to security preparedness. Design/methodology/approach Funded by the Department of Justice, a national survey of SME executives’ perceptions of information security preparedness was conducted. Using PLS-SEM, the survey responses were used to test the proposed Information Security Preparedness Model. Findings The results indicate that as perceptions of security importance and external influences increase, SME executives’ awareness and commitment to information security also increases. In addition, as implementation challenges increase, awareness and commitment to information security decreases. Finally, as security importance and awareness and commitment to information security increases, executives’ perception of security preparedness also increases. Research limitations/implications Executive perceptions of information security were measured and not the actual level of security. Further research that examines the agreement between executive perceptions and the true state of information security within the organization is warranted. Originality/value Prior information security studies using Roger’s (1975, 1983) Protection Motivation Theory have produced mixed results. This paper develops and tests the Information Security Preparedness Model to more fully explain SME executive’s perceptions of information security.


Author(s):  
Patricia Everaere ◽  
Sebastien Konieczny ◽  
Pierre Marquis

We study how belief merging operators can be considered as maximum likelihood estimators, i.e., we assume that there exists a (unknown) true state of the world and that each agent participating in the merging process receives a noisy signal of it, characterized by a noise model. The objective is then to aggregate the agents' belief bases to make the best possible guess about the true state of the world. In this paper, some logical connections between the rationality postulates for belief merging (IC postulates) and simple conditions over the noise model under consideration are exhibited. These results provide a new justification for IC merging postulates. We also provide results for two specific natural noise models: the world swap noise and the atom swap noise, by identifying distance-based merging operators that are maximum likelihood estimators for these two noise models.


Author(s):  
S.S. Pertsov ◽  
E.A. Yumatov ◽  
N.A. Karatygin ◽  
E.N. Dudnik ◽  
A.E. Khramov ◽  
...  

It is a well-known fact that mental activity of the brain can be presented by two different states, i.e., the true state and the false state. A promising method of the electroencephalogram (EEG) wavelet transform has been developed over recent years. Using this method, we evaluated the principle possibility for direct objective registration of mental activity in the human brain. Previously we developed and described (published) a new experimental model and software for recognizing the true and false mental responses of a person with the EEG wavelet transform. The developed experimental model and software-and-data support allowed us to compare (by EEG parameters) two mental states of brain activity, one of which is the false state, while another is the true state. The goal of this study is to develop an absolutely new information technology for recognizing the true and false states in mental activity of the brain by means of the EEG wavelet transform. Our study showed that the true and false states of the brain can be distinguished using the method of continuous wavelet transform and calculation of the EEG wavelet energy. It was revealed that the main differences between truthful and false mental responses are observed in the delta and alpha ranges of the EEG. In the EEG delta rhythm, the wavelet energy is much higher under conditions of the false response as compared to that in the true response. In the EEG alpha rhythm, the wavelet energy is significantly higher with the true answer than in the false one. These data open a new principal possibility of revealing the true and false mental state of the brain by means of continuous wavelet transform and calculation of the EEG wavelet energy.


PEDIATRICS ◽  
1977 ◽  
Vol 59 (3) ◽  
pp. 488-488
Author(s):  
Arthur M. Smith ◽  
John K. Lattimer

A competent, modern textbook on pediatric urology must encompass more than just a description of morphological anomalies and techniques for surgical repair. To reflect the true state of the art, it must contain a sophisticated integration of information from many disciplines. The present-day pediatric urologist thinks in terms of genetic, metabolic, endocrinologic, neurologic, psychologic, oncologic, and nephrologic disease factors. A new text devoted to pediatric urology muust therefore incorporate a huge volume of information in order to justify its relevance.


Author(s):  
Alison Morgan

The words ‘liberty’ or ‘freedom’ feature in forty-three poems in this collection, indicative of the centrality of this theme to the radical discourse of the day. In an era of almost unprecedented repression and the curtailment of rights, working people wished to rid themselves of their chains and reclaim their lost liberties, as a way of asserting English nationalism in the face of a ‘foreign’ monarchy. The twelve poems and songs in this section celebrate both the forthcoming return of liberty, presented as a goddess, and Henry Hunt as liberty’s human representative. The restoration of liberty as an end to slavery is a common trope within English radical discourse and poems often depict the radical patriot endeavouring to rescue his country from an imposed and unnatural tyranny and return it to its true state of liberty; however, this trope predates the era of revolution when such rhetoric was common currency and this section explores the prevalence of the theme of liberty in the mid-eighteenth century and the subsequent influence of William Collins and Thomas Gray on the poems in this collection. The introduction also seeks to explain the lack of references to the transatlantic slave trade in these poems at a time when the issue of rights was at the fore. It includes poems written by Samuel Bamford and the Spencean Robert Wedderburn.


Author(s):  
PETER P. WAKKER

This paper shows that a "principle of complete ignorance" plays a central role in decisions based on Dempster belief functions. Such belief functions occur when, in a first stage, a random message is received and then, in a second stage, a true state of nature obtains. The uncertainty about the random message in the first stage is assumed to be probabilized, in agreement with the Bayesian principles. For the uncertainty in the second stage no probabilities are given. The Bayesian and belief function approaches part ways in the processing of the uncertainty in the second stage. The Bayesian approach requires that this uncertainty also be probabilized, which may require a resort to subjective information. Belief functions follow the principle of complete ignorance in the second stage, which permits strict adherence to objective inputs.


Legal Studies ◽  
1998 ◽  
Vol 18 (3) ◽  
pp. 360-368 ◽  
Author(s):  
Andrew Robertson

The word ‘estoppel’ had its origins in the old French word ‘estoup’, meaning plug or stopper. The principle of estoppel by representation of fact operates in a manner which is consistent with those origins. Where a representation of fact is relied upon by a representee, the effect of the estoppel is to stop up the mouth of the representor, and prevent him or her from asserting facts contrary to his or her own representation. The rights of the parties are then determined by reference to the represented or assumed state of affairs. An estoppel by representation of fact can be used defensively, where an action which would otherwise be available to the plaintiff is not available on the assumed state of affairs. It can also be used aggressively, to establish a state of affairs in which a cause of action exists, where that cause of action would not be available on the true state of affairs.


Sign in / Sign up

Export Citation Format

Share Document