{"id":21,"date":"2019-06-12T15:09:54","date_gmt":"2019-06-12T15:09:54","guid":{"rendered":"http:\/\/conspiracy-theories.eu\/?page_id=21"},"modified":"2024-03-17T18:34:56","modified_gmt":"2024-03-17T18:34:56","slug":"home","status":"publish","type":"page","link":"https:\/\/conspiracy-theories.eu\/de\/home\/","title":{"rendered":"Home"},"content":{"rendered":"<span class=\"su-lightbox\" data-mfp-src=\"https:\/\/conspiracy-theories.eu\/what-is-a-meme\/\" data-mfp-type=\"iframe\" data-mobile=\"yes\"><span style=\"text-decoration: underline;\">What is a meme?<\/span><\/span>\n<div class=\"su-tabs su-tabs-style-default su-tabs-mobile-stack\" data-active=\"1\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\"><div class=\"su-tabs-nav\"><span class=\"\" data-url=\"\" data-target=\"blank\" tabindex=\"0\" role=\"button\">Psychoepistemology: The origin of the 'conspiracy theory meme' and its rhetorical function<\/span><span class=\"\" data-url=\"\" data-target=\"blank\" tabindex=\"0\" role=\"button\">Shaping the mind: How ideas, knowledge, and beliefs are created<\/span><span class=\"\" data-url=\"\" data-target=\"blank\" tabindex=\"0\" role=\"button\">Pattern recognition in visual perception<\/span><\/div><div class=\"su-tabs-panes\"><div class=\"su-tabs-pane su-u-clearfix su-u-trim\" data-title=\"Psychoepistemology: The origin of the &#039;conspiracy theory meme&#039; and its rhetorical function\">\n<h1>A historical inventory: How the &#8220;conspiracy theory meme&#8221; was <em>de facto <\/em>intentionally created by govermental think-tanks in order to steer public discourse<\/h1>\n<p><a href=\"https:\/\/news.fsu.edu\/experts\/lance-dehaven-smith\/\" target=\"_blank\" rel=\"noopener\">Professor Lance deHaven-Smith<\/a> (professor emeritus of political science at Florida State University) writes the following about the history of the &#8220;conspiracy theory <span id=\"su_tooltip_69e3013171bca_button\" class=\"su-tooltip-button su-tooltip-button-outline-yes\" aria-describedby=\"su_tooltip_69e3013171bca\" data-settings='{\"position\":\"top\",\"behavior\":\"hover\",\"hideDelay\":0}' tabindex=\"0\"><mark>meme<\/mark><\/span><span style=\"display:none;z-index:100\" id=\"su_tooltip_69e3013171bca\" class=\"su-tooltip\" role=\"tooltip\"><span class=\"su-tooltip-inner su-tooltip-shadow-yes\" style=\"z-index:100;background:#FFFFFF;color:#333333;font-size:16px;border-radius:5px;text-align:left;max-width:300px;line-height:1.25\"><span class=\"su-tooltip-title\">Terminological definition<\/span><span class=\"su-tooltip-content su-u-trim\">A meme is an idea, behavior, or style that spreads from person to person within a culture\u2014often with the aim of conveying a particular phenomenon, theme, or meaning represented by the meme.<\/span><\/span><span id=\"su_tooltip_69e3013171bca_arrow\" class=\"su-tooltip-arrow\" style=\"z-index:100;background:#FFFFFF\" data-popper-arrow><\/span><\/span>&#8221; in his peer-reviewed book entitled <span id=\"su_tooltip_69e3013171c3f_button\" class=\"su-tooltip-button su-tooltip-button-outline-yes\" aria-describedby=\"su_tooltip_69e3013171c3f\" data-settings='{\"position\":\"top\",\"behavior\":\"hover\",\"hideDelay\":0}' tabindex=\"0\"><mark>Conspiracy Theory in America<\/mark><\/span><span style=\"display:none;z-index:100\" id=\"su_tooltip_69e3013171c3f\" class=\"su-tooltip\" role=\"tooltip\"><span class=\"su-tooltip-inner su-tooltip-shadow-yes\" style=\"z-index:100;background:#FFFFFF;color:#333333;font-size:16px;border-radius:5px;text-align:left;max-width:300px;line-height:1.25\"><span class=\"su-tooltip-title\">Citation &amp; ISBN<\/span><span class=\"su-tooltip-content su-u-trim\">DeHaven-Smith, L. (2013). Conspiracy theory in America. University of Texas Press. (ISBN: #9780292757691) <\/span><\/span><span id=\"su_tooltip_69e3013171c3f_arrow\" class=\"su-tooltip-arrow\" style=\"z-index:100;background:#FFFFFF\" data-popper-arrow><\/span><\/span> which was published by the <a href=\"https:\/\/openlibrary.org\/books\/OL30662296M\/Conspiracy_theory_in_America\" target=\"_blank\" rel=\"noopener noreferrer\">University of Texas Press<\/a> in 2013:<\/p>\n<blockquote><p>Der Begriff \"Verschw\u00f6rungstheorie\" wurde 1964 von der CIA erfunden und in den \u00f6ffentlichen Diskurs eingebracht, um die vielen Skeptiker zu diskreditieren, die die Schlussfolgerung der Warren-Kommission anzweifelten, dass Pr\u00e4sident John F. Kennedy von einem einsamen Sch\u00fctzen namens Lee Harvey Oswald ermordet wurde, der selbst in Polizeigewahrsam ermordet wurde, bevor er befragt werden konnte. Die CIA nutzte ihre Freunde in den Medien, um eine Kampagne zu starten, die den Verdacht gegen den Bericht der Warren-Kommission zur Zielscheibe von Spott und Anfeindungen machte. Diese Kampagne war \"eine der erfolgreichsten Propaganda-Initiativen aller Zeiten\".<\/p><\/blockquote>\n<p><a href=\"http:\/\/libgen.li\/get.php?md5=bdde709e5bd6fa1357e730af49a03446&amp;key=LWREMI3WN7QT0E6Q\" target=\"_blank\" rel=\"noopener noreferrer\">Download e-book as PDF<\/a><\/p>\n<hr \/>\n<p>Chronological Ngram chart for the &#8220;conspiracy theory meme&#8221; (<a href=\"https:\/\/books.google.com\/ngrams\/graph?content=conspiracy+theory%2Cconspiracy+theories&amp;year_start=1800&amp;year_end=2019&amp;corpus=26&amp;smoothing=3&amp;direct_url=t1%3B%2Cconspiracy%20theory%3B%2Cc0%3B.t1%3B%2Cconspiracy%20theories%3B%2Cc0#\" target=\"_blank\" rel=\"noopener\">Google Books Ngram Viewer<\/a>) in support of the hypothesis by Professor Lance DeHaven-Smith. The x-axis represents years in chronological order; the y-axis represents the percentage of books that a particular word or phrase appears in during that given year.<br \/>\n<iframe loading=\"lazy\" width=\"100%\" height=\"210\" name=\"ngram_chart\" src=\"https:\/\/books.google.com\/ngrams\/interactive_chart?content=conspiracy+theory%2Cconspiracy+theories&amp;year_start=1800&amp;year_end=2019&amp;corpus=26&amp;smoothing=3&amp;direct_url=t1%3B%2Cconspiracy+theory%3B%2Cc0%3B.t1%3B%2Cconspiracy+theories%3B%2Cc0\" marginwidth=\"0\" marginheight=\"0\" hspace=\"0\" vspace=\"0\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<hr \/>\n<h2>Argumentum ad hominem<\/h2>\n<p>Ad hominem (Latin for &#8216;to the person&#8217;), short for <em>argumentum ad hominem<\/em>, is a term that refers to several types of arguments, most of which are fallacious. Typically this term refers to a rhetorical strategy where the speaker attacks the character, motive, or some other attribute of the person making an argument rather than attacking the substance of the argument itself. This avoids genuine debate by creating a diversion to some irrelevant but often highly charged issue. The fallacious attack can also be direct to membership in a group or institution.<br \/>\n<a href=\"https:\/\/de.wikipedia.org\/wiki\/Argumentum_ad_hominem\" target=\"_blank\" rel=\"noopener\">https:\/\/de.wikipedia.org\/wiki\/Argumentum_ad_hominem<\/a><\/p>\n<hr \/>\n<h2 class=\" translation-block\">Der Begriff \"Verschw\u00f6rungstheorie\" als Werkzeug der kulturellen Hegemonie:<br>\nEine kritische Diskursanalyse<\/h2>\n<p>Eine k\u00fcrzlich als Dissertation ver\u00f6ffentlichte systematische Diskursanalyse untermauert diese Analyse mit Belegen aus einer Vielzahl von Quellen.<\/p>\n<p><span class=\"refauthors\">Rankin Jr., J. E.<\/span>. (<span class=\"refyear\">2018<\/span>). The conspiracy theory meme as a tool of cultural hegemony: A critical discourse analysis. Dissertation Abstracts International: Section B: The Sciences and Engineering<\/p>\n<p class=\" translation-block\"><strong>Abstract (Zusammenfassung)<\/strong><br>\nDiejenigen, die die offiziellen Darstellungen von bedeutenden verd\u00e4chtigen und einschneidenden Ereignissen ablehnen, werden oft als Verschw\u00f6rungstheoretiker bezeichnet und die alternativen Erkl\u00e4rungen, die sie vorschlagen, werden oft als Verschw\u00f6rungstheorien bezeichnet. Diese Etiketten werden oft verwendet, um die \u00dcberzeugungen derjenigen Individuen abzutun, die die potenziell hegemoniale Kontrolle dar\u00fcber, was die Menschen glauben, in Frage stellen. Das Konzept der Verschw\u00f6rungstheorie fungiert als ein Hindernis f\u00fcr die legitime diskursive Auseinandersetzung mit Verschw\u00f6rungsverd\u00e4chtigungen. Die Wirkung des Etiketts scheint selbst die angesehensten Denker zu behindern. Dieses Hindernis ist besonders problematisch in der Wissenschaft, wo eine gr\u00fcndliche, objektive Analyse von Informationen entscheidend f\u00fcr die Aufdeckung der Wahrheit ist und wo Mitglieder der Wissenschaft typischerweise als eine der wichtigsten epistemischen Autorit\u00e4ten angesehen werden. Diese Dissertation verfolgte die Entwicklung und Verwendung solcher Begriffe als Pejorative, die verwendet werden, um kritisches Denken, Analyse und Infragestellung der Autorit\u00e4t zu unterbinden. Dies wurde mit Hilfe der kritischen Diskursanalyse als Forschungsmethode erreicht. In den zeitgen\u00f6ssischen Medien wurden Beweise gefunden, die darauf hindeuten, dass Regierungsvertreter ma\u00dfgeblich an der Schaffung des pejorativen Mems Verschw\u00f6rungstheoretiker beteiligt waren. Das Nachverfolgen der Entwicklung des Verschw\u00f6rungstheorie-Memes und seiner Verwendung als pejorativer Schalld\u00e4mpfer kann das Bewusstsein f\u00fcr seine Verwendung auf diese Art und Weise sch\u00e4rfen und seine Auswirkungen vermindern.<\/p>\n<ul>\n<li>URL: <a href=\"https:\/\/www.proquest.com\/openview\/55ccdf26dcda24e7190a0e99ffb88a87\/1?pq-origsite=gscholar&amp;cbl=18750&amp;diss=y\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.proquest.com\/openview\/55ccdf26dcda24e7190a0e99ffb88a87\/1?pq-origsite=gscholar&amp;cbl=18750&amp;diss=y<\/a><\/li>\n<li>Free access PDF: <a href=\"https:\/\/www.researchgate.net\/profile\/James_Rankin9\/publication\/322682499_The_conspiracy_theory_meme_as_a_tool_of_cultural_hegemony_A_critical_discourse_analysis\/links\/5ad7b2eea6fdcc293584bb5a\/The-conspiracy-theory-meme-as-a-tool-of-cultural-hegemony-A-critical-discourse-analysis.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.researchgate.net\/publication\/322682499<\/a><\/li>\n<\/ul>\n<hr \/>\n<div class=\"su-spoiler su-spoiler-style-fancy su-spoiler-icon-folder-2 su-spoiler-closed\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\"><div class=\"su-spoiler-title\" tabindex=\"0\" role=\"button\"><span class=\"su-spoiler-icon\"><\/span>Prof. Lance deHaven-Smith on 'Conspiracy Theories'<\/div><div class=\"su-spoiler-content su-u-clearfix su-u-trim\">\n<p><iframe loading=\"lazy\" title=\"The Toronto Hearings on 9\/11 Uncut - Day 1 Lance DeHaven-Smith\" width=\"625\" height=\"352\" src=\"https:\/\/www.youtube.com\/embed\/UELxUMCtF0E?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><br \/>\n<iframe loading=\"lazy\" title=\"State Crimes Against Democracy - Lance deHaven-Smith\" width=\"625\" height=\"352\" src=\"https:\/\/www.youtube.com\/embed\/A42m7zABR3o?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/p>\n<\/div><\/div>\n<h3>Psycholinguistic Tools &amp; Deceptive Memes<\/h3>\n<p>For further detailed information the see the attached <a href=\"http:\/\/conspiracy-theories.eu\/wp-content\/uploads\/origin-of-the-conspiracy-theory-idea-cia-foia-request-1976.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">official CIA document (Warren Comission Report)<\/a> which was released in response to a 1976 FOIA request by the New York Times. The document shows how the term &#8220;conspiracy&#8221; was intentionally utilised to prevent critical rational analysis and &#8220;dissenting perspectives&#8221;.<\/p>\n<div style=\"width: 320px;\" class=\"wp-video\"><!--[if lt IE 9]><script>document.createElement('video');<\/script><![endif]-->\n<video class=\"wp-video-shortcode\" id=\"video-21-1\" width=\"320\" height=\"240\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/conspiracy-theories.eu\/wp-content\/uploads\/JFK-Secret-Service-Called-off.mp4?_=1\" \/><a href=\"http:\/\/conspiracy-theories.eu\/wp-content\/uploads\/JFK-Secret-Service-Called-off.mp4\">http:\/\/conspiracy-theories.eu\/wp-content\/uploads\/JFK-Secret-Service-Called-off.mp4<\/a><\/video><\/div>\n<p>Video: <em>Secret service was called off shortly before Kennedy was killed.<\/em><\/p>\n<div id=\"attachment_481\" style=\"width: 744px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/conspiracy-theories.eu\/wp-content\/uploads\/kenndy.gif\" target=\"_blank\" rel=\"noopener\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img aria-describedby=\"caption-attachment-481\" loading=\"lazy\" class=\"wp-image-481 size-full\" src=\"http:\/\/conspiracy-theories.eu\/wp-content\/uploads\/kenndy.gif\" alt=\"\" width=\"734\" height=\"564\" \/><\/a><p id=\"caption-attachment-481\" class=\"wp-caption-text\">Seven days before John F. Kennedy was assassinated he allegedly said, &#8220;There is a plot in this country to enslave every man, woman and child. Before I leave this high and noble office, I intend to expose this plot.&#8221; In a speech three weeks before he was murdered, John F. Kennedy asked the American people &#8220;for their help in this tremendous task of informing and alerting the American people!&#8221; For I have complete confidence in the response and dedication of our Citizens whenever they are fully informed.&#8221; Because he knew that he could not defeat this secrete society of corporate demons on his own. But &#8220;I am confident that with your help man will be what he was born to be, Free and Independent.&#8221; Source: https:\/\/books.google.co.uk\/books\/about\/Who_killed_John_F_Kennedy_and_Why.html?id=KfjEBQAAQBAJ&amp;redir_esc=y (So called &#8220;factcheckers&#8221; deny that Kennedy said this, e.g., https:\/\/www.politifact.com\/factchecks\/2019\/apr\/03\/viral-image\/no-jfk-didnt-say-he-would-expose-slavery-plot\/)<\/p><\/div>\n***<br \/>\n<div style=\"width: 420px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-21-2\" width=\"420\" height=\"440\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"https:\/\/cognitive-liberty.online\/JFK-to-911.mp4?_=2\" \/><a href=\"https:\/\/cognitive-liberty.online\/JFK-to-911.mp4\">https:\/\/cognitive-liberty.online\/JFK-to-911.mp4<\/a><\/video><\/div>\n***<br \/>\n<!--[if lt IE 9]><script>document.createElement('audio');<\/script><![endif]-->\n<audio class=\"wp-audio-shortcode\" id=\"audio-21-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"http:\/\/conspiracy-theories.eu\/wp-content\/uploads\/Theres-a-plot-in-this-country-to-enslave-every-man-woman-and-child.-JFK.mp3?_=1\" \/><a href=\"http:\/\/conspiracy-theories.eu\/wp-content\/uploads\/Theres-a-plot-in-this-country-to-enslave-every-man-woman-and-child.-JFK.mp3\">http:\/\/conspiracy-theories.eu\/wp-content\/uploads\/Theres-a-plot-in-this-country-to-enslave-every-man-woman-and-child.-JFK.mp3<\/a><\/audio>\n***<br \/>\n<iframe loading=\"lazy\" title=\"What JFK tried to do before his assassination w\/Jeffrey Sachs | The Chris Hedges Report\" width=\"625\" height=\"352\" src=\"https:\/\/www.youtube.com\/embed\/Wqm9Yl1gGEY?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><br \/>\n***<br \/>\nOn April 27, 1961 in New York City, Kennedy said, in part:<\/p>\n<blockquote><p>The very word \u201csecrecy\u201d is repugnant in a free and open society; and we are as a people inherently and historically opposed to secret societies, to secret oaths and to secret proceedings. We decided long ago that the dangers of excessive and unwarranted concealment of pertinent facts far outweighed the dangers which are cited to justify it. Even today, there is little value in opposing the threat of a closed society by imitating its arbitrary restrictions. Even today, there is little value in insuring the survival of our nation if our traditions do not survive with it. And there is very grave danger that an announced need for increased security will be seized upon by those anxious to expand its meaning to the very limits of official censorship and concealment.<\/p><\/blockquote>\n<p>Excerpts from the Warren Commission Report:<\/p>\n<blockquote><p>Conspiracy theories have frequently thrown suspicion on our organization, for example by falsely alleging that Lee Harvey Oswald worked for us. The aim of this dispatch is to provide material countering and discrediting the claims of the conspiracy theorists, so as to inhibit the circulation of such claims in other countries.<\/p><\/blockquote>\n<blockquote><p>Conspiracy on the large scale often suggested would be impossible to conceal in the United States, esp. since informants could expect to receive large royalties, etc. Note that Robert Kennedy, Attorney General at the time and John F. Kennedy&#8217;s brother, would be the last man to overlook or conceal any conspiracy.<\/p><\/blockquote>\n<blockquote><p>A conspirator moreover would hardly choose a location for a shooting where so much depended on conditions beyond his control: the route, the speed of the cars, the moving target, the risk that the assassin would be discovered. A group of wealthy conspirators could have arranged much more secure conditions.<\/p><\/blockquote>\n<p>In his book Professor Lance deHaven-Smith provides further historical facts on how the CIA succeeded in manipulating public opinions and how they created an uncritical, reflexive, automatic, stigmatization in the public mind towards those who challenge official government explanations (i.e., the systematic use of ad hominem stratagems such as social exclusion and ostracism based on linguistic labeling and social categorisation).<br \/>\n<div class=\"su-spoiler su-spoiler-style-fancy su-spoiler-icon-folder-2 su-spoiler-closed\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\"><div class=\"su-spoiler-title\" tabindex=\"0\" role=\"button\"><span class=\"su-spoiler-icon\"><\/span>Peer-reviewed references<\/div><div class=\"su-spoiler-content su-u-clearfix su-u-trim\">\n<img loading=\"lazy\" class=\"alignnone wp-image-218 size-full\" src=\"http:\/\/conspiracy-theories.eu\/wp-content\/uploads\/conspiracy-theory-peer-reviewed-literature1.png\" alt=\"\" width=\"734\" height=\"302\" srcset=\"https:\/\/conspiracy-theories.eu\/wp-content\/uploads\/conspiracy-theory-peer-reviewed-literature1.png 734w, https:\/\/conspiracy-theories.eu\/wp-content\/uploads\/conspiracy-theory-peer-reviewed-literature1-300x123.png 300w, https:\/\/conspiracy-theories.eu\/wp-content\/uploads\/conspiracy-theory-peer-reviewed-literature1-624x257.png 624w\" sizes=\"(max-width: 734px) 100vw, 734px\" \/><br \/>\n<\/div><\/div>\n<hr \/>\n<div class=\"csl-entry\">\n<div class=\"ref1\"><span class=\"refauthors\">deHaven-Smith, L.<\/span>. (<span class=\"refyear\">2010<\/span>). <span class=\"reftitle\">State crimes against democracy in the war on terror: applying the Nuremberg principles to the Bush\u2013Cheney Administration<\/span>. <span class=\"refjournal\">Contemporary Politics<\/span>, <span class=\"refnumber\">16(4)<\/span>, <span class=\"refpages\">403\u2013420. <\/span><\/div>\n<p><span class=\"refnumericaldoi\">Plain numerical DOI: 10.1080\/13569775.2010.523939<\/span><br \/>\n<span class=\"refdoiurl\"><a href=\"https:\/\/doi.org\/10.1080\/13569775.2010.523939\" target=\"_blank\" rel=\"noopener\">DOI URL<\/a><\/span><br \/>\n<span class=\"refdoiscihub\"><a href=\"https:\/\/sci-hub.ru\/10.1080\/13569775.2010.523939\" target=\"_blank\" rel=\"noopener\">directSciHub download<\/a><\/span><br \/>\n<div id=\"accordion-1\" class=\"accordion no-js\">\n\t\t\t\t\t<h3 role=\"button\" id=\"accordion-1-t1\" class=\"accordion-title js-accordion-controller\" aria-controls=\"accordion-1-c1\" aria-expanded=\"false\" tabindex=\"0\">\n\t\t\t\tShow\/hide publication abstract\t\t\t<\/h3>\n\t\t\n\t\t<div id=\"accordion-1-c1\" class=\"accordion-content\" aria-hidden=\"true\">\n\t\t\t\n<div class=\"refabstract\">\u201cThis article asks whether, in waging war in the middle east, the bush-cheney administration developed and executed a conspiracy comparable to the one for which nazi leaders were tried, convicted, and executed at nuremberg after world war ii. to meet the nuremberg standards, such a conspiracy must include efforts to subvert the constitutional order. today, scholars refer to these actions as \u2018state crimes against democracy\u2019 (scads). after explicating the nuremberg standards, the article applies them to the bush-cheney administration\u2019s \u2018war on terror\u2019. the conclusion reached is that evidence of a scad-driven conspiracy is extensive and certainly adequate by the nuremberg standards to warrant investigations and trials. \u00a9 2010 taylor &amp; francis.\u201d<\/div>\n\t\t<\/div>\n\n\t\t<\/div>\n<\/div>\n<hr \/>\n<p>URL: https:\/\/zero.sci-hub.ru\/4203\/d9fc53386d750041db5a26ed22c79a48\/dehaven-smith2010.pdf#navpanes=0&amp;view=FitH<br \/>\n<iframe loading=\"lazy\" width=\"100%\" height=\"1100px\" style=\"border: 0px #ffffff none;\" src=\"https:\/\/zero.sci-hub.ru\/4203\/d9fc53386d750041db5a26ed22c79a48\/dehaven-smith2010.pdf#navpanes=0&amp;view=FitH\" name=\"myiFrame\" scrolling=\"auto\" frameborder=\"0\" marginheight=\"0px\" marginwidth=\"0px\" allowfullscreen=\"allowfullscreen\"><\/iframe><br \/>\n<\/div>\n<div class=\"su-tabs-pane su-u-clearfix su-u-trim\" data-title=\"Shaping the mind: How ideas, knowledge, and beliefs are created\">\n<p>Here is a classical epistemological (philosophical) argument which concisely highlights the importance of free access to information (e.g., free press, media, and internet):<\/p>\n<p><strong>Nihil est in intellectu quod non sit prius in sensu<\/strong><br \/>\n<em>(Transl.: Nothing is in the intellect that was not first in the senses)<\/em><\/p>\n<p>This postulate is known as the &#8220;Aristotelian Peripatetic Axiom&#8221; and it highlights the importance of information (input) for reasoning and knowledge. To put it simply, if information (which is perceived through the senses, e.g., eyes and ears) is not available to us, then we obviously cannot think about it. Accordingly, knowledge is fundamentally based on information. The opposite of knowing is <em>nescience<\/em> (ne-science = not knowing). The human mind is thus furnished by sensory impressions which in turn form the basis of ideas. In other words, the data which impinges on our sensory organs &#8220;determines&#8221; our worldview (i.e., our holistic perspective on reality; a Gestalt; German: <em>Weltanschauung<\/em>). Ergo, the peripatetic axiom is obviously of great pertinence in the context of the &#8220;information revolution&#8221; (the information age). <em>Per analogiam<\/em> to the agricultural revolution and industrial revolution, the digital revolution heralded the beginning of the information revolution. According to this ancient principle, any form of information censorship is thus a limitation of possible knowledge. In addition, the selective propagation of information can be used to create specific worldviews in the human mind (cf. cybernetics).<br \/>\n<div class=\"su-spoiler su-spoiler-style-fancy su-spoiler-icon-folder-2 su-spoiler-closed\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\"><div class=\"su-spoiler-title\" tabindex=\"0\" role=\"button\"><span class=\"su-spoiler-icon\"><\/span>Display additional etymological information on this basic principle of knowledge<\/div><div class=\"su-spoiler-content su-u-clearfix su-u-trim\">\nThe term &#8216;Peripatetic&#8217; is a transliteration of the ancient Greek word \u03c0\u03b5\u03c1\u03b9\u03c0\u03b1\u03c4\u03b7\u03c4\u03b9\u03ba\u03cc\u03c2 (<em>peripat\u00eatikos<\/em>), which translates into &#8216;of walking&#8217; or roughly &#8216;traveling on foot&#8217;. The term relates to the philosophy or teaching methods of Aristotle, who conducted discussions while walking about in the Lyceum of ancient Athens while lecturing. The &#8216;Peripatetic school&#8217; was thus a school of philosophy in Ancient Greece and its teachings derived from its founder, Aristotle (384\u2013322 BC). Peripatetic is an adjective ascribed to his followers and the Peripatetic school was actually known simply as the Peripatos.<\/p>\n<hr \/>\n<div class=\"csl-entry\">\n<div class=\"ref1\"><span class=\"refauthors\">Lacrosse, J.<\/span>. (<span class=\"refyear\">2007<\/span>). <span class=\"reftitle\">Some Remarks about a Meeting between Socrates and an Indian (Aristoxenus\u2019 fragment 53)<\/span>. <span class=\"refjournal\">Archiv F\u00fcr Geschichte Der Philosophie<\/span><\/div>\n<p>, <span class=\"refnumber\">89(3)<\/span><br \/>\n<span class=\"refnumericaldoi\">Plain numerical DOI: 10.1515\/AGPH.2007.012<\/span><br \/>\n<span class=\"refdoiurl\"><a href=\"https:\/\/doi.org\/10.1515\/AGPH.2007.012\" target=\"_blank\" rel=\"noopener noreferrer\">DOI URL<\/a><\/span><br \/>\n<span class=\"refdoiscihub\"><a href=\"https:\/\/sci-hub.tw\/10.1515\/AGPH.2007.012\" target=\"_blank\" rel=\"noopener noreferrer\">directSciHub download<\/a><\/span><br \/>\n<div id=\"accordion-2\" class=\"accordion no-js\">\n\t\t\t\t\t<h3 role=\"button\" id=\"accordion-2-t1\" class=\"accordion-title js-accordion-controller\" aria-controls=\"accordion-2-c1\" aria-expanded=\"false\" tabindex=\"0\">\n\t\t\t\tShow\/hide publication abstract\t\t\t<\/h3>\n\t\t\n\t\t<div id=\"accordion-2-c1\" class=\"accordion-content\" aria-hidden=\"true\">\n\t\t\t\n<div class=\"refabstract\">\u201cThis article aims at discussing the origin of an indian argument quoted by a member of the peripatetic school at the end of the 4th century bc. aristoxenus\u2019 53rd fragment tells the surprising story of a (fictitious) meeting between socrates and an indian in athens. challenging socrates and his definition of philosophy as investigations about human life, the indian argues that it is not possible for anyone to understand human matters (\u03c4\u1f70 \u1f00\u03bd\u03b8\u03c1\u03ce\u03c0\u03b5\u0131\u03b1 \u03ba\u03b1\u03c4\u0131\u03b4\u03b5\u0129\u03bd) without considering divine ones (\u1f00\u03b3\u03bd\u03bf\u1fe6\u03bd\u03c4\u03ac \u03b3\u03b5 \u03c4\u1f70 \u03b8\u03b5\u0129\u03b1). this argument, even though it clearly belongs to internal greek philosophical debates, echoes the genuine and typically indian axiom that knowledge of the human self is knowledge of god and vice-versa, which is one of the major commonplaces in traditional brahmanic thought. by discussing successively the historical context of the fragment, some related platonic passages and some indian parallels on the issue, the article shows that aristoxenus\u2019 fragment is one of the first and only texts, historically, in which a typical greek philosophical argument is challenged by an authentic indian proposition translated into an argument based on greek conceptual categories.\u201d<\/div>\n\t\t<\/div>\n\n\t\t<\/div>\n<\/div>\n<\/div><\/div>\n<p>This ancient axiom of how the mind is furnished has been corroborated by fundamental research in 20th century neuroscience. For instance, the path-breaking work by Donald Hebb emphasises the importance of experience in learning. The neuronal circuitry in our brain is &#8220;wired&#8221; by incoming information. The Hebbian mantra is: &#8220;<em>Cells that fire together wire together<\/em>&#8220;.<\/p>\n<p>Connected cells become engrams. Multiple cells become cell assemblies. Hebb stated the following to describe his approach:<\/p>\n<p><em>&#8220;The general idea is an old one, that any two cells or systems of cells that are repeatedly active at the same time will tend to become &#8216;associated&#8217; so that activity in one facilitates activity in the other.&#8221;<\/em>(1949, p.70)<\/p>\n<p>He wrote further:<\/p>\n<p><em>&#8220;When one cell repeatedly assists in firing another, the axon of the first cell develops synaptic knobs (or enlarges them if they already exist) in contact with the soma of the second cell.&#8221;<\/em> (op. cit. p.63)<\/p>\n<p>In other words, repetition of specific information consolidates specific information processing pathways in the brain (<em>per analogiam<\/em> to a path in a forest which becomes more defined and more widely used the more people walk people walk on it, similarly, the ocean washes specific grooves into cliffs over elongated periods of time). Thus, our worldview is shaped by the information we are exposed to. Again, it is thus possible to &#8220;design&#8221; the available information in such a way that it creates a specific worldview (via neuro\/synapto-plastic changes in the brain via the associative neuronal process of &#8220;long term potentiation&#8221;). Repetition is a key concept. The German propaganda expert Joseph Goebbels (who studied <a href=\"https:\/\/cognitive-liberty.online\/edwards-bernays\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bernays work on propaganda<\/a>) understood this principle intuitively. He stated &#8220;If a lie is repeated often enough it becomes true&#8221;. The manipulative and highly centralised mass-media (see <a href=\"https:\/\/cognitive-liberty.online\/chomsky-herman-propaganda-model\/\" target=\"_blank\" rel=\"noopener noreferrer\">Prof. Noam Chomsky<\/a>) makes systematic usage of this principle. Think about the almost hypnotic repetition of the term &#8220;weapons of mass-destruction&#8221; before the invasion of Iraq (which later turned out to be a complete lie &#8211; but by then the imprint in the public mind was already created and extinction is a cumbersome process).<\/p>\n<p>Interestingly in the broader context at hand, Hebb had close ties with the CIA and his methods were applied for the amoral and inhuman <a href=\"https:\/\/cognitive-liberty.online\/kubark-counterintelligence-interrogation\/\" target=\"_blank\" rel=\"noopener noreferrer\">KUBARK torture manual<\/a> of the CIA which was recently declassified. Sensory deprivation is one of several torture methods to &#8220;break down the psyche of human beings&#8221; discussed in this manual. Hebb participated in the CIA project &#8220;Bluebird&#8221; (which had the objective to make people &#8220;sing like a bluebird&#8221; even against their will). Project Bluebird was the predecessor of Project Artichoke which was then preceded by the notorious MK-Utra program which, <em>inter alia<\/em>, tested psychedelics compounds on non-consenting na\u00efve populations (prisoners, mental patients, homeless, etc.). Hebb&#8217;s work thus laid the groundwork for later CIA programs which were primarily concerned with the manipulating the human mind (and consequently human behaviour).<\/p>\n<p>Hebb&#8217;s Rule can be mathematically generalized as follows:<\/p>\n<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-255\" src=\"http:\/\/conspiracy-theories.eu\/wp-content\/uploads\/hebbs-rule2.png\" alt=\"\" width=\"106\" height=\"43\" \/><\/p>\n<p>or the change in the<em><span class=\"mwe-math-element\"><span class=\"mwe-math-mathml-inline mwe-math-mathml-a11y\"> i<\/span><\/span><\/em>th synaptic weight <em><span class=\"mwe-math-element\"><span class=\"mwe-math-mathml-inline mwe-math-mathml-a11y\"> w<sub>i <\/sub><\/span><\/span><\/em>is equal to a learning rate<em> <span class=\"mwe-math-element\"><span class=\"mwe-math-mathml-inline mwe-math-mathml-a11y\"> \u03b7 <\/span><\/span><\/em> times the<em><span class=\"mwe-math-element\"><span class=\"mwe-math-mathml-inline mwe-math-mathml-a11y\"> i<\/span><\/span><\/em>th input <em><span class=\"mwe-math-element\"><span class=\"mwe-math-mathml-inline mwe-math-mathml-a11y\"> x<sub>i\u00a0 <\/sub><\/span><\/span><\/em> times the postsynaptic response <em><span class=\"mwe-math-element\"><span class=\"mwe-math-mathml-inline mwe-math-mathml-a11y\"> y<\/span><\/span><\/em>.<\/p>\n<p>Often cited is the case of a linear neuron as:<\/p>\n<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-256\" src=\"http:\/\/conspiracy-theories.eu\/wp-content\/uploads\/hebbs-rule3.png\" alt=\"\" width=\"103\" height=\"62\" \/><\/p>\n<p>The crux of the argument is that the brain learns by repetition and that information shapes our brain and hence our worldview (our mental model of reality).<\/p>\n<p><strong>Nihil est in intellectu quod non sit prius in sensu<\/strong><br \/>\n<em>(Transl.: Nothing is in the intellect that was not first in the senses)<\/em><\/p>\n<div class=\"csl-entry\">\n<div class=\"ref1\"><span class=\"refauthors\">Brown, R. E.<\/span>. (<span class=\"refyear\">2007<\/span>). <span class=\"reftitle\">Alfred McCoy, Hebb, the CIA and Torture<\/span>. <span class=\"refjournal\">Journal of the History of the Behavioral Sciences<\/span><\/div>\n<p>, <span class=\"refnumber\">43(2)<\/span>, <span class=\"refpages\">205\u2013213. <\/span><br \/>\n<span class=\"refnumericaldoi\">Plain numerical DOI: 10.1002\/jhbs.20225<\/span><br \/>\n<span class=\"refdoiurl\"><a href=\"https:\/\/doi.org\/10.1002\/jhbs.20225\" target=\"_blank\" rel=\"noopener noreferrer\">DOI URL<\/a><\/span><br \/>\n<span class=\"refdoiscihub\"><a href=\"https:\/\/sci-hub.tw\/10.1002\/jhbs.20225\" target=\"_blank\" rel=\"noopener noreferrer\">directSciHub download<\/a><\/span><br \/>\n<div id=\"accordion-3\" class=\"accordion no-js\">\n\t\t\t\t\t<h3 role=\"button\" id=\"accordion-3-t1\" class=\"accordion-title js-accordion-controller\" aria-controls=\"accordion-3-c1\" aria-expanded=\"false\" tabindex=\"0\">\n\t\t\t\tShow\/hide publication abstract\t\t\t<\/h3>\n\t\t\n\t\t<div id=\"accordion-3-c1\" class=\"accordion-content\" aria-hidden=\"true\">\n\t\t\t\n<div class=\"refabstract\">\u201cThis paper has two aims. the first is to shed light on a remarkable archival source, namely survey responses from thousands of american psychologists during the 1960s in which they described their contemporary research practices and discussed whether the practices were \u2018ethical.\u2019 the second aim is to examine the process through which the american psychological association (apa) used these survey responses to create principles on how psychologists should treat human subjects. the paper focuses on debates over whether \u2018deception\u2019 resbrown, r. (2007). alfred mccoy, hebb, the cia and torture. journal of the history of the behavioral sciences, 43(2), 205\u2013213. doi:10.1002\/jhbsearch was acceptable. it documents how members of the committee that wrote the principles refereed what was, in fact, a disagreement between two contemporary research orientations. the paper argues that the ethics committee ultimately built the model of \u2018the resilient self\u2019 into the apa\u2019s 1973 ethics code. at the broadest level, the paper explores how prevailing understandings of human nature are written into seemingly universal and timeless codes of ethics.\u201d<\/div>\n\t\t<\/div>\n\n\t\t<\/div>\n<\/div>\n<div class=\"csl-entry\">\n<div class=\"ref1\"><span class=\"refauthors\">McCoy, A. W.<\/span>. (<span class=\"refyear\">2007<\/span>). <span class=\"reftitle\">Science in Dachau\u2019s shadow: HEBB, Beecher, and the development of CIA psychological torture and modern medical ethics<\/span>. <span class=\"refjournal\">Journal of the History of the Behavioral Sciences<\/span><\/div>\n<p>, <span class=\"refnumber\">43(4)<\/span>, <span class=\"refpages\">401\u2013417. <\/span><br \/>\n<span class=\"refnumericaldoi\">Plain numerical DOI: 10.1002\/jhbs.20271<\/span><br \/>\n<span class=\"refdoiurl\"><a href=\"https:\/\/doi.org\/10.1002\/jhbs.20271\" target=\"_blank\" rel=\"noopener noreferrer\">DOI URL<\/a><\/span><br \/>\n<span class=\"refdoiscihub\"><a href=\"https:\/\/sci-hub.tw\/10.1002\/jhbs.20271\" target=\"_blank\" rel=\"noopener noreferrer\">directSciHub download<\/a><\/span><br \/>\n<div id=\"accordion-4\" class=\"accordion no-js\">\n\t\t\t\t\t<h3 role=\"button\" id=\"accordion-4-t1\" class=\"accordion-title js-accordion-controller\" aria-controls=\"accordion-4-c1\" aria-expanded=\"false\" tabindex=\"0\">\n\t\t\t\tShow\/hide publication abstract\t\t\t<\/h3>\n\t\t\n\t\t<div id=\"accordion-4-c1\" class=\"accordion-content\" aria-hidden=\"true\">\n\t\t\t\n<div class=\"refabstract\">\u201cThis paper has two aims. the first is to shed light on a remarkable archival source, namely survey responses from thousands of american psychologists during the 1960s in which they described their contemporary research practices and discussed whether the practices were \u2018ethical.\u2019 the second aim is to examine the process through which the american psychological association (apa) used these survey responses to create principles on how psychologists should treat human subjects. the paper focuses on debates over whether \u2018deception\u2019 research was acceptable. it documents how members of the committee that wrote the principles refereed what was, in fact, a disagreement between two contemporary research orientations. the paper argues that the ethics committee ultimately built the model of \u2018the resilient self\u2019 into the apa\u2019s 1973 ethics code. at the broadest level, the paper explores how prevailing understandings of human nature are written into seemingly universal and timeless codes of ethics.\u201d<\/div>\n\t\t<\/div>\n\n\t\t<\/div>\n<\/div>\n<div class=\"csl-entry\">\n<div class=\"ref1\"><span class=\"refauthors\">Arrigo, J. M.<\/span>. (<span class=\"refyear\">2006<\/span>). <span class=\"reftitle\">Psychological Torture\u2014The CIA and the APA<\/span>. <span class=\"refjournal\">PsycCRITIQUES<\/span><\/div>\n<p>, <span class=\"refnumber\">51(30)<\/span><br \/>\n<span class=\"refnumericaldoi\">Plain numerical DOI: 10.1037\/a0003712<\/span><br \/>\n<span class=\"refdoiurl\"><a href=\"https:\/\/doi.org\/10.1037\/a0003712\" target=\"_blank\" rel=\"noopener noreferrer\">DOI URL<\/a><\/span><br \/>\n<span class=\"refdoiscihub\"><a href=\"https:\/\/sci-hub.tw\/10.1037\/a0003712\" target=\"_blank\" rel=\"noopener noreferrer\">directSciHub download<\/a><\/span><br \/>\n<div id=\"accordion-5\" class=\"accordion no-js\">\n\t\t\t\t\t<h3 role=\"button\" id=\"accordion-5-t1\" class=\"accordion-title js-accordion-controller\" aria-controls=\"accordion-5-c1\" aria-expanded=\"false\" tabindex=\"0\">\n\t\t\t\tShow\/hide publication abstract\t\t\t<\/h3>\n\t\t\n\t\t<div id=\"accordion-5-c1\" class=\"accordion-content\" aria-hidden=\"true\">\n\t\t\t\n<div class=\"refabstract\">\u201cReviews the book, a question of torture: cia interrogation, from the cold war to the war on terror by alfred w. mccoy (see record 2006-01819-000). in this book the author traces the development and spread of psychological torture, which he largely attributes to machinations of the central intelligence agency (cia). his cia torture paradigm has two core elements: sensory disorientation (through hooding, sleep deprivation, isolation, etc.) and self-inflicted pain (through forced maintenance of stressful postures, restraint of urination, etc.). sensory disorientation commonly leads to psychosis. self-inflicted pain tends to demoralize the interrogate, in contrast to direct assault, which tends to elicit resistance. cumulatively, these techniques can damage the subject more than physical torture. from the perpetrators\u2019 perspective, psychological torture has the added advantages of eluding detection and minimizing moral objections. mccoy displays compelling similarities among the cia\u2019s early cold war behavioral modification research, the 1963 cia kubark counterintelligence interrogation manual, and the army\u2019s 1983 human resources manual for counterinsurgency-all unmistakably grounded in psychological research. after the collapse of the soviet union in 1991, mccoy speculates, there was a hiatus in u.s. operations. in response to september 11, 2001, though, the bush administration revived the cia torture paradigm. recent government memoranda on interrogation at guantanamo and abu ghraib exhibit the kubark lineage. numerous eminent psychologists and psychiatrists contributed to the development of psychological torture, including former american psychological association (apa) presidents donald hebb (in 1960) and charles osgood (in 1963). hebb\u2019s sensory deprivation experiments, for instance, were directed not toward railway accident prevention, as originally reported, but toward brainwashing. mccoy brings strong evidence for the overall irrationality and inefficacy of torture interrogation as a means of gathering intelligence. he concludes with a public appeal to \u2018repudiat[e] a practice that, more than any other, represents the denial of democracy\u2019 (p. 208). a question of torture deeply informs the torture debate, which is an indisputable public good. through publication of remote and recently declassified source material, mccoy raises the standard for public debate. yet mccoy also polarizes the debate through reductionism and selective reading. as exposure and \u2026\u201d<\/div>\n\t\t<\/div>\n\n\t\t<\/div>\n<\/div>\n<div class=\"csl-entry\">\n<div class=\"ref1\"><span class=\"refauthors\">Attneave, F., B., M., &amp; Hebb, D. O.<\/span>. (<span class=\"refyear\">1950<\/span>). <span class=\"reftitle\">The Organization of Behavior; A Neuropsychological Theory<\/span>. <span class=\"refjournal\">The American Journal of Psychology<\/span><\/div>\n<p>, <span class=\"refnumber\">63(4)<\/span>, <span class=\"refpages\">633. <\/span><br \/>\n<span class=\"refnumericaldoi\">Plain numerical DOI: 10.2307\/1418888<\/span><br \/>\n<span class=\"refdoiurl\"><a href=\"https:\/\/doi.org\/10.2307\/1418888\" target=\"_blank\" rel=\"noopener noreferrer\">DOI URL<\/a><\/span><br \/>\n<span class=\"refdoiscihub\"><a href=\"https:\/\/sci-hub.tw\/10.2307\/1418888\" target=\"_blank\" rel=\"noopener noreferrer\">directSciHub download<\/a><\/span><br \/>\n<div id=\"accordion-6\" class=\"accordion no-js\">\n\t\t\t\t\t<h3 role=\"button\" id=\"accordion-6-t1\" class=\"accordion-title js-accordion-controller\" aria-controls=\"accordion-6-c1\" aria-expanded=\"false\" tabindex=\"0\">\n\t\t\t\tShow\/hide publication abstract\t\t\t<\/h3>\n\t\t\n\t\t<div id=\"accordion-6-c1\" class=\"accordion-content\" aria-hidden=\"true\">\n\t\t\t\n<div class=\"refabstract\">\u201cAn exploration of the organization of behaviour. topics covered include: summation and learning in perception; field theory and equipotentiality; the first stage of perception &#8211; growth of the assembly; perception of a complex &#8211; the phase sequence; development of the learning capacity; and more.\u201d<\/div>\n\t\t<\/div>\n\n\t\t<\/div>\n<\/div>\n<div class=\"csl-entry\">\n<div class=\"ref1\"><span class=\"refauthors\">Hebb, D. O.<\/span>. (<span class=\"refyear\">1953<\/span>). <span class=\"reftitle\">Heredity and environment in mammalian behaviour<\/span>. <span class=\"refjournal\">The British Journal of Animal Behaviour<\/span><\/div>\n<p>, <span class=\"refnumber\">1(2)<\/span>, <span class=\"refpages\">43\u201347. <\/span><br \/>\n<span class=\"refnumericaldoi\">Plain numerical DOI: 10.1016\/S0950-5601(53)80053-5<\/span><br \/>\n<span class=\"refdoiurl\"><a href=\"https:\/\/doi.org\/10.1016\/S0950-5601(53)80053-5\" target=\"_blank\" rel=\"noopener noreferrer\">DOI URL<\/a><\/span><br \/>\n<span class=\"refdoiscihub\"><a href=\"https:\/\/sci-hub.tw\/10.1016\/S0950-5601(53)80053-5\" target=\"_blank\" rel=\"noopener noreferrer\">directSciHub download<\/a><\/span><br \/>\n<div id=\"accordion-7\" class=\"accordion no-js\">\n\t\t\t\t\t<h3 role=\"button\" id=\"accordion-7-t1\" class=\"accordion-title js-accordion-controller\" aria-controls=\"accordion-7-c1\" aria-expanded=\"false\" tabindex=\"0\">\n\t\t\t\tShow\/hide publication abstract\t\t\t<\/h3>\n\t\t\n\t\t<div id=\"accordion-7-c1\" class=\"accordion-content\" aria-hidden=\"true\">\n\t\t\t\n<div class=\"refabstract\">&#8230; \u201c&#8230; Login to save citations to my list. citation. database: psycinfo. [journal article]. heredity and environment in mammalian behaviour . hebb, do. british journal of animal behaviour , vol 1, 1953, 43-47. doi: 10.1016\/s0950-5601(53)80053-5. abstract. &#8230;\u201d<\/div>\n\t\t<\/div>\n\n\t\t<\/div>\n<\/div>\n<\/div>\n<div class=\"su-tabs-pane su-u-clearfix su-u-trim\" data-title=\"Pattern recognition in visual perception\">\n<p><a href=\"https:\/\/conspiracy-theories.eu\/de\/visual-pattern-detection-and-intentional-obfuscation\/\" target=\"_blank\" rel=\"noopener noreferrer\">Open the application fullscreen mode for optimal graphical performance<\/a><br \/>\n[edsanimate_start entry_animation_type= &#8220;fadeIn&#8221; entry_delay= &#8220;0&#8221; entry_duration= &#8220;2.5&#8221; entry_timing= &#8220;linear&#8221; exit_animation_type= &#8220;&#8221; exit_delay= &#8220;&#8221; exit_duration= &#8220;&#8221; exit_timing= &#8220;&#8221; animation_repeat= &#8220;1&#8221; keep= &#8220;yes&#8221; animate_on= &#8220;scroll&#8221; scroll_offset= &#8220;25&#8221; custom_css_class= &#8220;&#8221;][edsanimate_end]\n<hr \/>\n<div class=\"csl-entry\">\n<div class=\"ref1\"><span class=\"refauthors\">Riesenhuber, M., &amp; Poggio, T.<\/span>. (<span class=\"refyear\">1999<\/span>). <span class=\"reftitle\">Hierarchical models of object recognition in cortex<\/span>. <span class=\"refjournal\">Nature Neuroscience<\/span><\/div>\n<p>, <span class=\"refnumber\">2(11)<\/span>, <span class=\"refpages\">1019\u20131025. <\/span><br \/>\n<span class=\"refnumericaldoi\">Plain numerical DOI: 10.1038\/14819<\/span><br \/>\n<span class=\"refdoiurl\"><a href=\"https:\/\/doi.org\/10.1038\/14819\" target=\"_blank\" rel=\"noopener noreferrer\">DOI URL<\/a><\/span><br \/>\n<span class=\"refdoiscihub\"><a href=\"https:\/\/sci-hub.tw\/10.1038\/14819\" target=\"_blank\" rel=\"noopener noreferrer\">directSciHub download<\/a><\/span><br \/>\n<div id=\"accordion-8\" class=\"accordion no-js\">\n\t\t\t\t\t<h3 role=\"button\" id=\"accordion-8-t1\" class=\"accordion-title js-accordion-controller\" aria-controls=\"accordion-8-c1\" aria-expanded=\"false\" tabindex=\"0\">\n\t\t\t\tShow\/hide publication abstract\t\t\t<\/h3>\n\t\t\n\t\t<div id=\"accordion-8-c1\" class=\"accordion-content\" aria-hidden=\"true\">\n\t\t\t\n<div class=\"refabstract\">\u201cVisual processing in cortex is classically modeled as a hierarchy of increasingly sophisticated representations, naturally extending the model of simple to complex cells of hubel and wiesel. surprisingly, little quantitative modeling has been done to explore the biological feasibility of this class of models to explain aspects of higher-level visual processing such as object recognition. we describe a new hierarchical model consistent with physiological data from inferotemporal cortex that accounts for this complex visual task and makes testable predictions. the model is based on a max-like operation applied to inputs to certain cortical neurons that may have a general role in cortical function.\u201d<\/div>\n\t\t<\/div>\n\n\t\t<\/div>\n<\/div>\n<div class=\"csl-entry\">\n<div class=\"ref1\"><span class=\"refauthors\">Oliva, A., &amp; Torralba, A.<\/span>. (<span class=\"refyear\">2007<\/span>). <span class=\"reftitle\">The role of context in object recognition<\/span>. <span class=\"refjournal\">Trends in Cognitive Sciences<\/span><\/div>\n<p>, <span class=\"refnumber\">11(12)<\/span>, <span class=\"refpages\">520\u2013527. <\/span><br \/>\n<span class=\"refnumericaldoi\">Plain numerical DOI: 10.1016\/j.tics.2007.09.009<\/span><br \/>\n<span class=\"refdoiurl\"><a href=\"https:\/\/doi.org\/10.1016\/j.tics.2007.09.009\" target=\"_blank\" rel=\"noopener noreferrer\">DOI URL<\/a><\/span><br \/>\n<span class=\"refdoiscihub\"><a href=\"https:\/\/sci-hub.tw\/10.1016\/j.tics.2007.09.009\" target=\"_blank\" rel=\"noopener noreferrer\">directSciHub download<\/a><\/span><br \/>\n<div id=\"accordion-9\" class=\"accordion no-js\">\n\t\t\t\t\t<h3 role=\"button\" id=\"accordion-9-t1\" class=\"accordion-title js-accordion-controller\" aria-controls=\"accordion-9-c1\" aria-expanded=\"false\" tabindex=\"0\">\n\t\t\t\tShow\/hide publication abstract\t\t\t<\/h3>\n\t\t\n\t\t<div id=\"accordion-9-c1\" class=\"accordion-content\" aria-hidden=\"true\">\n\t\t\t\n<div class=\"refabstract\">\u201cIn the real world, objects never occur in isolation; they co-vary with other objects and particular environments, providing a rich source of contextual associations to be exploited by the visual system. a natural way of representing the context of an object is in terms of its relationship to other objects. alternately, recent work has shown that a statistical summary of the scene provides a complementary and effective source of information for contextual inference, which enables humans to quickly guide their attention and eyes to regions of interest in natural scenes. a better understanding of how humans build such scene representations, and of the mechanisms of contextual analysis, will lead to a new generation of computer vision systems. \u00a9 2007 elsevier ltd. all rights reserved.\u201d<\/div>\n\t\t<\/div>\n\n\t\t<\/div>\n<\/div>\n<div class=\"csl-entry\">\n<div class=\"ref1\"><span class=\"refauthors\">Pelli, D. G., &amp; Tillman, K. A.<\/span>. (<span class=\"refyear\">2008<\/span>). <span class=\"reftitle\">The uncrowded window of object recognition.<\/span>. <span class=\"refjournal\">Nature Neuroscience<\/span><\/div>\n<p>, <span class=\"refnumber\">11(10)<\/span>, <span class=\"refpages\">1129\u201335. <\/span> Retrieved from http:\/\/www.ncbi.nlm.nih.gov\/pubmed\/18828191<br \/>\n<div id=\"accordion-10\" class=\"accordion no-js\">\n\t\t\t\t\t<h3 role=\"button\" id=\"accordion-10-t1\" class=\"accordion-title js-accordion-controller\" aria-controls=\"accordion-10-c1\" aria-expanded=\"false\" tabindex=\"0\">\n\t\t\t\tShow\/hide publication abstract\t\t\t<\/h3>\n\t\t\n\t\t<div id=\"accordion-10-c1\" class=\"accordion-content\" aria-hidden=\"true\">\n\t\t\t\n<div class=\"refabstract\">\u201cIt is now emerging that vision is usually limited by object spacing rather than size. the visual system recognizes an object by detecting and then combining its features. \u2018Crowding\u2019 occurs when objects are too close together and features from several objects are combined into a jumbled percept. here, we review the explosion of studies on crowding&#8211;in grating discrimination, letter and face recognition, visual search, selective attention, and reading&#8211;and find a universal principle, the bouma law. the critical spacing required to prevent crowding is equal for all objects, although the effect is weaker between dissimilar objects. furthermore, critical spacing at the cortex is independent of object position, and critical spacing at the visual field is proportional to object distance from fixation. the region where object spacing exceeds critical spacing is the \u2018uncrowded window\u2019. observers cannot recognize objects outside of this window and its size limits the speed of reading and search.\u201d<\/div>\n\t\t<\/div>\n\n\t\t<\/div>\n<\/div>\n<\/div><\/div><\/div>\n[bernays-fromm]","protected":false},"excerpt":{"rendered":"<p>[bernays-fromm]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/conspiracy-theories.eu\/de\/wp-json\/wp\/v2\/pages\/21"}],"collection":[{"href":"https:\/\/conspiracy-theories.eu\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/conspiracy-theories.eu\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/conspiracy-theories.eu\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/conspiracy-theories.eu\/de\/wp-json\/wp\/v2\/comments?post=21"}],"version-history":[{"count":159,"href":"https:\/\/conspiracy-theories.eu\/de\/wp-json\/wp\/v2\/pages\/21\/revisions"}],"predecessor-version":[{"id":682,"href":"https:\/\/conspiracy-theories.eu\/de\/wp-json\/wp\/v2\/pages\/21\/revisions\/682"}],"wp:attachment":[{"href":"https:\/\/conspiracy-theories.eu\/de\/wp-json\/wp\/v2\/media?parent=21"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}