Posted by
Nick Thompson on
Dec 23, 2004; 1:55pm
URL: http://friam.383.s1.nabble.com/RE-Ray-Parks-and-Ecological-Psychology-tp519870.html
Ray,
I was intrigued by the connection between your post and Ecological
Psychology. I would love to hear more about that.
Also, I thought you might be the appropriate person to which to confess the
following sin:
In the wikipedia entry on ontology I took out a short paragraph on the
ontology of J.J.Gibson. I expected to be ... educated ... from all sides
by Gibsonians
not a peep. I wrote a long comment justifying my change. Funny how a sin
is just no fun if nobody notices.
Nick
Nicholas S. Thompson
Professor of Psychology and Ethology
Clark University
[hidden email]
http://home.earthlink.net/~nickthompson/ [hidden email]
> [Original Message]
> From: <
[hidden email]>
> To: <
[hidden email]>
> Date: 12/23/2004 9:00:21 AM
> Subject: Friam Digest, Vol 18, Issue 22
>
> Send Friam mailing list submissions to
>
[hidden email]
>
> To subscribe or unsubscribe via the World Wide Web, visit
>
http://redfish.com/mailman/listinfo/friam_redfish.com> or, via email, send a message with subject or body 'help' to
>
[hidden email]
>
> You can reach the person managing the list at
>
[hidden email]
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of Friam digest..."
>
>
> Today's Topics:
>
> 1. Re: Research on weakest points in hierarchical networks
> (Raymond C. Parks)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Wed, 22 Dec 2004 17:28:35 -0700
> From: "Raymond C. Parks" <
[hidden email]>
> Subject: Re: [FRIAM] Research on weakest points in hierarchical
> networks
> To: "The Friday Morning Applied Complexity Coffee Group"
> <
[hidden email]>
> Cc: "Berg, Michael J" <
[hidden email]>
> Message-ID: <
[hidden email]>
> Content-Type: text/plain; charset=us-ascii; format=flowed
>
> Stephen Guerin wrote:
>
> > Partially related is the research from 4 or 5 years ago on percolation
and
> > robustness in Small World and Scale Free networks which I'm sure you
guys
> > are aware of and probably contributed to.
>
> I am aware of it, but I did not contribute to that work. However,
> these networks aren't really either Small World or Scale Free. They are
> clearly hierarchical even though some communication is via other
> networks that are Small World.
>
> > I haven't seen anything more specific to attacking the data content in
> > hierarchical networks. Though, empirically, it would be pretty
> > straightforward to write a model and sweep the parameter space to
quickly
> > test your intuitions of intermediate node vulnerabilities.
>
> What would you use to write such a model? I'm not in the modeling
> business, normally, but I could be if necessary.
>
> > BTW, from you description, I'm a little unclear why a command or control
> > node (top of the hierarchy) wouldn't be a more vulnerable target than an
> > intermediate node. Wouldn't a modification of data at the source have
the
> > greatest impact? Or in other words, a source node by definition has the
> > smallest distance to the information source. I must be missing a key
idea in
> > the model description. It may be that you're talking about something
> > different than a command and control network and more of a
> > "Perceiving/Acting" network where information integration is happening
in
> > the intermediate nodes. Perceiving/Acting networks isn't a standard
term for
> > graph theory; I'm applying it from the Ecological Psychology literature.
>
> You've hit the nail on the head with your last suggestion. We are
> looking at networks that transform the data during its move from the
> command or control nodes out to the leaf nodes. The data is changed
> from generalities to specifics. The intermediate nodes modify commands
> enough that an attack on the command or control nodes is watered down by
> the intermediate transformations. Conversely, the leaf nodes only have
> a very small part of the total data picture. They transmit information
> up the hierarchy and the intermediate nodes consolidate, aggregate, and
> create new data from what the leaf nodes transmit. An attack on a leaf
> node is able to affect the world of that leaf node. In a few rare
> cases, the data from the leaf node may make it to the command or control
> node level without change and thus affect decisions made at that level.
> However, in the majority of cases, the data transformation is
> sufficient that a data attack is hidden in the background by the time
> data makes it to the command or control nodes.
>
> Thanks for the pointer. I will set our reference librarian searching
> for Perceiving/Acting networks in the Ecological Psychology literature.
>
> --
> Ray Parks
[hidden email]
> IDART Project Lead Voice:505-844-4024
> IORTA Department Fax:505-844-9641
>
http://www.sandia.gov/idart Pager:800-690-5288
>
>
>
>
> ------------------------------
>
> _______________________________________________
> Friam mailing list
>
[hidden email]
>
http://redfish.com/mailman/listinfo/friam_redfish.com>
>
> End of Friam Digest, Vol 18, Issue 22
> *************************************