<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Information and Information Security </title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Jaak</forename><surname>Henno</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Tallinn University of Technology</orgName>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">Tallinn University of Technology</orgName>
								<address>
									<addrLine>Ehitajate tee 5</addrLine>
									<postCode>19086</postCode>
									<settlement>Tallinn</settlement>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Information and Information Security </title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">59B74B56EE872B09267E0482BB84C0CF</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T07:48+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>H.1.0 [General]: Information/Entropy-Information/Processing</term>
					<term>H.1.1 [Systems and Information Theory]: Natural Information Processing Systems-Unified view/methodology</term>
					<term>H.1.2 [Models and Principles] Information, Entropy, Information Processing Systems, Information Security data, models, games, MMORG</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Tremendous growth of Information Security issues poses a problem -is most of mankind turning criminals or is something wrong with rules? Are we always trying to secure valuable Information or just data and do the rules correspond to generally accepted behaviour?</p><p>In order to understand better issues connected with Information Security we have first establish concise meaning of terms 'Information' and 'Information Security'. Information cannot be considered separately from an Information Processing System (IPS); a message is Information only for some IPS and is used by the IPS for achieving its goals.</p><p>In the paper is considered general model of IPSs and their goals. To get some insight of attitudes of users, the mileu of Massively Multiplayer On-line Games (MMOG) is considered. A 'Security Incident' may be just a curiosity; cheating in a game is not considered serious offence by fellow players.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">INTRODUCTION</head><p>Insecurity, threats to information, need to defend information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction are nearly always deliberate. Accidents, which in 90ties were responsible for most Information Security issues -a plane flows into an office building destroying all computers in it, employee mistakes ("Format C:"), fire, flood, earthquake, lightning, shooting or otherwise destroying a computer in fit of anger ("You do not have right to access folder 'My Documents'!), issues with ISP or WAN etc account currently only for tiny part of Information Security problems. According to recent report from Panda Labs [PandaSecurity 2014], in 2013 appeared about 82,000 new malware threats per day and in the whole year -30 million new malware threats, Kaspersky Lab is detecting 315,000 new malicious files every day [Kaspersky 2014] most of them (&gt;70%)trojans, especially designed for stealing/damaging Information.</p><p>Current computerized Information Processing systems are vulnerable, rigid and not adaptive, since the main focus in their development is on computer technology and communication protocols. System environments, culture of system users, reasons for attacks, culture and operating modes of attackers are considered less.</p><p>Threats to Information are not specific only to computers and computer networks, they are present in nearly any Information Processing System (IPS) -social and business organizations, governments, all kinds of living systems down to simplest ones -cells and bacteria. In order understand mechanisms which provoke misuse of information and design and create adaptive information security systems, which can adequately respond to constantly changing dynamic environment and threats and can secure functioning of IPS under attacks and threats the IPS should be considered on more general level. But we should also re-consider rules and practices -do they agree with general understanding of right and wrong? 4:24 • J.Henno</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">INFORMATION FLOOD</head><p>Information regulates all processes and information processing is the central characteristics of all Universe. Advances of Biology, Economy, Information Technology, Social studies etc have introduced and supported the understanding, that we are living among Information Processing Systems Ko Seth Lloyd from MIT calculated in 2006 <ref type="bibr">[Lloyd 2006</ref>], that the visible universe has so far computed about 10 122 operations on 10 92 bits.</p><p>Even a simple unicellular organism is a complex and purposefully organized algorithm, but the most complex IPS are humans. Man is the most complex information-processing system on Earth. By some estimates <ref type="bibr" target="#b19">[Spiro 1980</ref>] the human brain can store 2.5 petabytes (ca million gigabytes); in the human body are in every second processed 19 3.4 10  bits. Our individual Information Processing capabilities are tremendously amplified by our Society and our greatest invention -Internet; so much so, that we clearly are not any more able to manage the process. The amount of digital data created in World grows in two years (at least) twice and in 2020 will be 40000 exabytes (exabyte = 1018 bytes) -over 300 times more than it was in 2005 <ref type="bibr">[EMC 2014</ref>]. World population in 2020 is estimated to be 7.72 billion, thus the memory capacity of the whole mankind can in 2020 store only 0.00004% of the whole digital data generated in our digital universe.</p><p>We believe, that we are rational beings and everything we do has a purpose. What is the purpose of this flood of data ? Some people call this 'Information Age', 'Age of Big Data', but what is the purpose of amounts of data, what we can not manage? Software is eating the world <ref type="bibr" target="#b0">[Andreessen 2011</ref>], who will be in control in 2020 -we or our programs? How much of this data is Information, what has for us some use? How much of this should be protected using the Digital Rights Management (DRM) methods and is this protection in interests of whole Mankind?</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">WHAT IS INFORMATION?</head><p>We all agree that we now live in "Information Age", we have become an "Information Society" and that information is the main source of value in the global economy. Several scientists have proposed <ref type="bibr">[Stonier 1990</ref><ref type="bibr" target="#b7">, Hefner 1992</ref><ref type="bibr" target="#b6">, Gitt 1994]</ref>, that that information is a part of the physical universe the same way as matter and energy. Information present in a system is the measure of organization of the system.</p><p>But in spite of vast number of papers on Information, Information systems, Information Security etc the meaning of the word "Information" remains abstract and underdefined. The situation has not become essentially better from the famous utterance from father of Cybernetics Norbert Wiener: "Information is information, not matter or energy" <ref type="bibr">[Wiener 1948, p. 132]</ref>. In spite of proliferation of information systems, there is still no generally agreed answers to the questions -What is Information? Has Information natural properties and if so, then what are these properties?</p><p>The word 'information' is derived from the Latin word 'informare' -"give form to", i.e. information is always represented with some form, structure, pattern. But 'representation' of a concept (e.g. in human mind) is not the concept itself, representations are the result of grounding our sensory perceptions, discovering patterns in perceptions.</p><p>The Oxford Dictionary explains 'information' as 'facts provided or learned about something or someone', i.e. information is communicated to receaver.</p><p>It is often claimed that Information Theory was created by Claude Shannon, but the main topic of Shannon's research was Communication. Shannon always considered communication and did not speak about information; he always used notions 'communication, communications channel'. In his groundbreaking paper "A Mathematical Theory of Communication" <ref type="bibr" target="#b17">[Shannon 1948</ref>] he explicitly states: "fundamental problem of communication is that of reproducing at one point either exactly or approximately a message selected at another point", but "semantic aspects of communication are irrelevant to the engineering problem". Shannon considered messages and communication without any assumptions about their meaning, but information is based on meaning. A message without meaning does not contain information for receiver.</p><p>Shannon's paper started the 'Information Theory' boom in many fields-linguistics, biology, physics, so that he was forced to warn: "Workers in other fields should realize that the basic results of the subject [communication channels] are aimed in a very specific direction, a direction that is not necessarily relevant to such fields as psychology, economics, and other social sciences".</p><p>Meaning of communicated signals, how these signals are used in receiving IPS both in mechanical and biological systems, i.e. how signals influence, control these systems this was considered by Norbert Wiener considered in his ground-breaking opus "Cybernetics or Control and Communication in the Animal and the Machine" <ref type="bibr" target="#b20">[Wiener 1948</ref>]. Wiener considered signals as information. Signals, data become for receiver information if they make sense for receiver and receiver can use them for achieving its goals. A data item is Information for an IPS if it helps the IPS in achieving its goals, i.e if it changes the future behaviour of the IPS, acts for the IPS like a program. When IPS performs the above deduction and thereafter clears the used memory (its finite!), its entropy increases by this amount.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">EXAMPLE TO CONSIDER -MMOGS</head><p>Problems with Security for environment arise from the third goal of IPS -securing their existence, resources/territory from external threats. IPS should keep balance with their environment for sustainable existence, but humans are often driven by greed and often overact, trying to secure more than inevitable, cheat and commit fraud. Every Security incident means, that somebody is violating the accepted rules and practices. The tremendous growth of security accidents poses a problem: wheather the whole Mankind is becoming criminals or is something wrong with rules, the rules do not agree with what is considered normal.</p><p>Reasons of our behaviour lay deep in human culture, history and psychology and are difficult to analyse, but for illustrative 'sandbox example' could be used computer games, especially Massively Multiplayer Online Games (MMOG).</p><p>The online gaming industry has in the past decades grown rapidly. The virtual economies created within MMOGs often blur the lines between real and virtual worlds so that several companies producing MMOGs have hired an economists to regulate the virtual economy in their games <ref type="bibr" target="#b13">[Plumer 2012</ref>].</p><p>As a result, the Security problems in MMOGs are becoming increasingly critical. Cheating, virtual frauds, and other security attacks are widespread in the virtual worlds of MMOGs. Gamers have developed illegal methods to obtain virtual wealth and convert it into real wealth in the real world using Real Money Trading, which allows to buy using real money game values (tropies, achievements).</p><p>MMOGs are played in massively distributed systems spreaded over many countries with thousands of client processes interweaving on common servers in real time. This greates many security issues and is the reason for the lack of regulations in this industry -it is difficult to impose legal laws in a world that is virtual, "not real", involving several countries.</p><p>As a result has appeared a million-dollar business of developing cheating tools, bots for (half) automated gaming, cheats, trainers and walkthroughs and web-sites, where one could get for monthly fee super-human abilities in some game, e.g. see other players through walls <ref type="bibr" target="#b11">[Maiberg 2014</ref>].</p><p>It is difficult to tell exact percentage of cheating players. In a reacent study involving one on-line racing game <ref type="bibr" target="#b8">[Blackburn et al 2014]</ref> was collected information about gamers on the Steam Community global gaming network: Steam has an anti-cheating system which marks cheaters public profile; from more than 12 million analyzed gamers over 700 thousand (ca 6 %) had their profiles flagged as cheaters.</p><p>Cheating was earlier considered as a despicable behaviour, but currently the attitude seems to be changing -the study discovered, that "cheaters are well embedded in the social and interaction networks: their network position is largely indistinguishable from that of fair players". And seeing fellow players succeed through cheating creates the idea that it might be worth the risk also to try.</p><p>Cheating is often difficult to distinguish from healthy curiosity. Consider a simple on-line Pong game, where player has to move his paddle in order to bounce a ball to target of another player. If player can place its paddle in correct position (ball bounces from paddle), he/she earns some points; if ball misses the paddle, it also bounces back, but player does not earn anything. We did such a game in game-programming class. Everything went well until one student started to earn rapidly tremendous scores. It turned out, that he has decreased the y-coordinate of his paddle, so that ball often started to bounce back from the bottom of the paddle creating several bounces, which quickly increased his score. </p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Cosmic Pong -player has to move his paddle to bounce the ball back and earn points; if ball misses paddle, it bounces back from ground and player does not earn anything.</figDesc><graphic coords="5,188.05,95.05,253.90,214.90" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Student's modification -paddle's y-coordinate is decreased, so that ball starts bouncing from the bottom of the paddle and creates every time new points.</figDesc><graphic coords="5,188.05,404.90,253.90,214.90" type="bitmap" /></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>What should teacher do -prize for ingenuity or punish for cheating, his modification give him clear advantage? After discussion we changed the game: everyone can modify (some) constants, but the modification will be at once distributed to all computers, so that all players are all the time in equal conditions.</p></div>
			</div>

			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">INFORMATION PROCESSING SYSTEMS</head><p>All Information Processing systems (IPS) -living systems, businesses, social organizations, governments, languages, computer programs, etc are finite and have goals, their purpose is to perform some actions aimed to fulfil their goals and they survive by constantly processing information about threats and opportunities in the world around them.</p><p>Goals of living systems are metabolism (getting energy needed for their functioning), growth and reproduction, secureing resources/territory and collaboration, goals of businesses -acquiring resources (money) by production of some goods and/or services, growth and creating daughter businesses, goals of languages -improve communication of language users, goals of governments -guarantee and improve well-being of citizens etc. Actions of IPS systems are based on information they receive from their environment; these actions allow them survive and develop, become more complex, reduce their inner entropy. Thus all IPS have (at least) these goals:</p><p>1. metabolism -acquiring energy needed of its actions 2. growth/reproduction 3. secureing their existance, resources/territory from external threats 4. collaboration with other similar IPS -when this helps in achieveing their goals. Problems with Security arise from the third goal.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Formal Level</head><p>Actions for achieving of goals can be performed only if some conditions are true. Conditions can be expressed with predicates, thus we can consider goals as logical predicates.</p><p>Signals, data becomes information for an IPS only when they can be used for proving true their goals. A goal for a living system can be e.g. an eatable object:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>() a eatable a </head><p>For processing (proving a goal predicate true) data should be stored by IPS. Since all IPS are finite, they tend not to store useless data or if something is stored, but could not be used for a long time, then it is forgotten. According to Landauer's erasure principle <ref type="bibr" target="#b9">[Landauer 1961]</ref>  </p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Big Data, for better or worse: 90% of world&apos;s data generated over last two years</title>
		<author>
			<persName><forename type="first">M</forename><surname>Andreessen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Brandtzaeg</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Why Software Is Eating The World</title>
				<imprint>
			<publisher>Sciencedaily</publisher>
			<date type="published" when="2011">2011. 2013. 2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Theory of Information</title>
		<author>
			<persName><forename type="first">M</forename><surname>Burgin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">World Scientific</title>
		<imprint>
			<biblScope unit="page" from="283" to="548" />
			<date type="published" when="2010">2010. 2010. 2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Information Loss as a Foundational Principle for the Second Law of Thermodynamics</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">L</forename><surname>Duncan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">S</forename><surname>Semura</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Foundations of Physics</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="page" from="1767" to="1773" />
			<date type="published" when="2007">2007. 2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<ptr target="http://www.emc.com/leadership/digital-universe/index.htmGalbraith" />
		<title level="m">Designing Complex Organizations</title>
				<editor>
			<persName><forename type="first">J</forename><forename type="middle">R</forename></persName>
		</editor>
		<imprint>
			<publisher>Addison-Wesley</publisher>
			<date type="published" when="1973">2014. 1973</date>
		</imprint>
		<respStmt>
			<orgName>EMC</orgName>
		</respStmt>
	</monogr>
	<note>EMC Digital Universe Study</note>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<author>
			<persName><forename type="first">T</forename><surname>Gánti</surname></persName>
		</author>
		<title level="m">The Principles of Life</title>
				<imprint>
			<publisher>Oxford University Press</publisher>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">The Digital Universe in</title>
		<author>
			<persName><forename type="first">J</forename><surname>Gantz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Reinsel</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012. 2020</date>
			<publisher>JDC</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Am Anfang war die Information</title>
		<author>
			<persName><forename type="first">W</forename><surname>Gitt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Am Anfang war die Information</title>
				<imprint>
			<date type="published" when="1994">1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Evolution of Information Processing Systems</title>
		<author>
			<persName><forename type="first">K</forename><surname>Hefner</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1992">1992</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Cheating in Online Games: A Social Network Perspective</title>
		<author>
			<persName><forename type="first">J</forename><surname>Blackburn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">I N</forename><surname>Kourtellis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Skorvetz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ripenau</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Transactions on Internet Technology</title>
		<imprint>
			<date type="published" when="2014">2014. 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Irreversibility and heat generation in the computing process</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">T</forename><surname>Jaynes</surname></persName>
		</author>
		<author>
			<persName><surname>Landauer</surname></persName>
		</author>
		<ptr target="http://www.kaspersky.com/about/news/virus/2013/number-of-the-year" />
	</analytic>
	<monogr>
		<title level="m">KasperskyLab. Number of the year: Kaspersky Lab is detecting 315,000 new malicious files every</title>
				<imprint>
			<date type="published" when="1957">1957. 1957. 2014. 1961. 1961</date>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="183" to="191" />
		</imprint>
	</monogr>
	<note>Phys. Rev.</note>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Programming the Universe: A Quantum Computer Scientist Takes on the Cosmos</title>
		<author>
			<persName><forename type="first">S</forename><surname>Lloyd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Machta</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Am. J. Phys</title>
		<imprint>
			<biblScope unit="volume">67</biblScope>
			<biblScope unit="page">121</biblScope>
			<date type="published" when="1999-12">2007. 2007. 1999. Dec. 1999</date>
			<publisher>Vintage</publisher>
		</imprint>
	</monogr>
	<note>Entropy, information, and computation</note>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">-dollar business of video game cheating</title>
		<author>
			<persName><forename type="first">E</forename><surname>Maiberg</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Hacks! An investigation into aimbot dealers, wallhack users, and the million</title>
				<imprint>
			<publisher>PCGamer</publisher>
			<date type="published" when="2014">2014. 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">The physics of forgetting: Landauer&apos;s erasure principle and information theory</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">B</forename><surname>Pandalab ; Plenio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vitelli</surname></persName>
		</author>
		<ptr target="http://press" />
	</analytic>
	<monogr>
		<title level="m">Annual Report Pandalabs 2013 summary</title>
				<imprint>
			<date type="published" when="2001">2014. 2001. 2001</date>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="page" from="25" to="60" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title level="m" type="main">The economics of video games</title>
		<author>
			<persName><forename type="first">B</forename><surname>Plumer</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012. 2012</date>
			<publisher>The Washington Post</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<author>
			<persName><forename type="first">D</forename><surname>Reeb</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Wolf</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1306.4352</idno>
		<title level="m">Im-)Proving Landauer&apos;s Principle</title>
				<imprint>
			<date type="published" when="1962">1962. 1962</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">The Nature of Information</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">G</forename><surname>Scarrott</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Journal</title>
		<imprint>
			<biblScope unit="volume">32</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="262" to="266" />
			<date type="published" when="1986">1986. 1986</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">Collected Papers</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">E</forename><surname>Shannon</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1993">1993. 1993</date>
			<publisher>Wiley-IEEE press ISBN</publisher>
			<biblScope unit="page" from="1" to="968" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">The mathematical theory of Communication</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">E</forename><surname>Shannon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Bell System Technical Journal</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="623" to="656" />
			<date type="published" when="1948">1948. 1948</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<title level="m" type="main">The Mathematical Theory of Communication</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">E</forename><surname>Shannon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Weaver</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1949">1949. 1949</date>
			<publisher>Univ of Illinois Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Environmental Issues in Chemical Perspective</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">G</forename><surname>Spiro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M</forename><surname>Stigliani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Rechnender Raum. Elektronische Datenverarbeitung</title>
		<editor>Rechnender Raum. Friedrich Vieweg &amp; Sohn. Zuse, K.</editor>
		<imprint>
			<biblScope unit="page" from="336" to="344" />
			<date type="published" when="1967">1980. 1969. 1967. 1967</date>
			<publisher>Suny Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Cybernetics or Control and Communication in the Animal and the Machine</title>
		<author>
			<persName><forename type="first">N</forename><surname>Wiener</surname></persName>
		</author>
		<author>
			<persName><surname>Williams</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Representation = Grounded Information. PRICAI</title>
				<editor>
			<persName><forename type="first">M</forename><forename type="middle">A</forename></persName>
		</editor>
		<imprint>
			<publisher>MIT Press</publisher>
			<date type="published" when="1948">1948. 2008. 2008</date>
			<biblScope unit="page" from="473" to="484" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
