114 research outputs found

    La philosophie de l'histoire chez Marcel Gauchet : les apports théoriques de la phénoménologie, du structuralisme et de l'herméneutique

    Get PDF
    Le pari que nous avons pris ici, consiste à éclairer la question de la philosophie de l'histoire chez Marcel Gauchet à l'aide d'une analyse des apports de trois sources théoriques qui déterminent l'anthroposociologie transcendantale soit la phénoménologie, le structuralisme et l'herméneutique. Notre hypothèse se situe dans le désir de vérifier la justesse des thèses qui imputent une philosophie de l'histoire déterministe et téléologique à la pensée historique de Marcel Gauchet. Si tel était le cas, l'histoire serait alors réduite à être celle d'un processus structural qui, en dernière analyse, déterminerait de manière absolue les possibles des phénomènes politiques aussi différents que la religion chez les peuples primitifs et la modernité politique. Notre intuition fut que braquer l'analyse sur la question de l'origine abolirait la thèse selon laquelle, au terme d'une succession progressiste de l'histoire, l'hétéronomie mènerait nécessairement à l'autonomie. Ainsi, une analyse de la philosophie de l'histoire chez Gauchet demande de s'interroger sur la condition de possibilité de l'histoire, soit l'ontologie du social historique qui sous tend, chez Gauchet, le devenir historique du politique au sein du monde social-humain. Pour y arriver, nous avons pris une distance par rapport aux interprétations qui étaient faites jusqu'alors de la pensée de Marcel Gauchet. En effet, celles-ci se limitaient principalement à deux types d'analyses, soit son approche politique du fait religieux, soit son interprétation de l'histoire comme avènement progressif des sociétés de l'autonomie. Nous avons plutôt décidé de replacer la pensée gauchetienne au coeur des débats théoriques et épistémologique plus fondamentaux qui touchaient la philosophie et les sciences humaines françaises de la deuxième moitié du XXe siècle. L'oeuvre de Gauchet est donc replacée d'emblée au sein des débats qui touchent la pensée française des années 1960-70 -débats qui avaient pour enjeux principal le statut de l'hégélano-marxisme. Au delà d'une ressaisie détaillée du devenir historique et de sa mécanique, la philosophie de l'histoire est à comprendre chez Gauchet en fonction des apports théoriques et des débats entourant l'influence de la phénoménologie, du structuralisme et de l'herméneutique au sein des sciences humaines. Comprendre ces apports théoriques s'avère nécessaire afin de ressaisir le sens originaire, ontologique et historique que prend le fait social et politique chez Gauchet. ______________________________________________________________________________ MOTS-CLÉS DE L’AUTEUR : Gauchet, Structuralisme, Phénoménologie, Herméneutique, Origine

    cyberaCTIve: a STIX-based Tool for Cyber Threat Intelligence in Complex Models

    Full text link
    Cyber threat intelligence (CTI) is practical real-world information that is collected with the purpose of assessing threats in cyber-physical systems (CPS). A practical notation for sharing CTI is STIX. STIX offers facilities to create, visualise and share models; however, even a moderately simple project can be represented in STIX as a quite complex graph, suggesting to spread CTI across multiple simpler sub-projects. Our tool aims to enhance the STIX-based modelling task in contexts when such simplifications are infeasible. Examples can be the microgrid and, more in general, the smart grid.Comment: 11 pages, 8 figures, technical repor

    Cost-aware Runtime Enforcement of Security Policies

    Get PDF
    In runtime enforcement of security policies, the classic requirements on monitors in order to enforce a security policy are soundness and transparency. However, there are many monitors that successfully pass this specification but they differ in complexity of both their implementation and the output they produce. In order to distinguish and compare these monitors we propose to associate cost with enforcement. We present a framework where the cost of enforcement of a trace is determined by the cost of operations the monitor uses to edit the trace. We explore cost-based order relations on sound monitors. We investigate cost-optimality of monitors which allows considering the most cost-efficient monitors that soundly enforce a property

    Impact of using a privacy model on smart buildings data for CO2 prediction

    Full text link
    There is a constant trade-off between the utility of the data collected and processed by the many systems forming the Internet of Things (IoT) revolution and the privacy concerns of the users living in the spaces hosting these sensors. Privacy models, such as the SITA (Spatial, Identity, Temporal, and Activity) model, can help address this trade-off. In this paper, we focus on the problem of CO2CO_2 prediction, which is crucial for health monitoring but can be used to monitor occupancy, which might reveal some private information. We apply a number of transformations on a real dataset from a Smart Building to simulate different SITA configurations on the collected data. We use the transformed data with multiple Machine Learning (ML) techniques to analyse the performance of the models to predict CO2CO_{2} levels. Our results show that, for different algorithms, different SITA configurations do not make one algorithm perform better or worse than others, compared to the baseline data; also, in our experiments, the temporal dimension was particularly sensitive, with scores decreasing up to 18.9%18.9\% between the original and the transformed data. The results can be useful to show the effect of different levels of data privacy on the data utility of IoT applications, and can also help to identify which parameters are more relevant for those systems so that higher privacy settings can be adopted while data utility is still preserved

    cyberaCTIve: a STIX-based Tool for Cyber Threat Intelligence in Complex Models

    Get PDF
    Cyber threat intelligence (CTI) is practical real-world information that is collected with the purpose of assessing threats in cyber-physical systems (CPS). A practical notation for sharing CTI is STIX. STIX offers facilities to create, visualise and share models; however, even a moderately simple project can be represented in STIX as a quite complex graph, suggesting to spread CTI across multiple simpler sub-projects. Our tool aims to enhance the STIX-based modelling task in contexts when such simplifications are infeasible. Examples can be the microgrid and, more in general, the smart grid

    Modeling and analysis of influence power for information security decisions

    Get PDF
    Users of computing systems and devices frequently make decisions related to information security, e. g., when choosing a password, deciding whether to log into an unfamiliar wireless network. Employers or other stakeholders may have a preference for certain outcomes, without being able to or having a desire to enforce a particular decision. In such situations, systems may build in design nudges to influence the decision making, e. g., by highlighting the employer’s preferred solution. In this paper we model influencing information security to identify which approaches to influencing are most effective and how they can be optimized. To do so, we extend traditional multi-criteria decision analysis models with modifiable criteria, to represent the available approaches an influencer has for influencing the choice of the decision maker. The notion of influence power is introduced to characterize the extent to which an influencer can influence decision makers. We illustrate our approach using data from a controlled experiment on techniques to influence which public wireless network users select. This allows us to calculate influence power and identify which design nudges exercise the most influence over user decisions
    • …
    corecore