Recent from talks
All channels
Be the first to start a discussion here.
Be the first to start a discussion here.
Be the first to start a discussion here.
Be the first to start a discussion here.
Welcome to the community hub built to collect knowledge and have discussions related to Information flow.
Nothing was collected or created yet.
Information flow
View on Wikipediafrom Wikipedia
This article needs additional citations for verification. (February 2017) |
In discourse-based grammatical theory, information flow is any tracking of referential information by speakers. Information may be new, i.e., just introduced into the conversation; given, i.e., already active in the speakers' consciousness; or old, i.e., no longer active.[1] The various types of activation, and how these are defined, are model-dependent.
Information flow affects grammatical structures such as:
- Word order (topic, focus, and afterthought constructions).
- Active, passive, or middle voice.
- Choice of deixis, such as articles; "medial" deictics such as Spanish ese and Japanese sore are generally determined by the familiarity of a referent rather than by physical distance[citation needed].
- Overtness of information, such as whether an argument of a verb is indicated by a lexical noun phrase, a pronoun, or not mentioned at all.
- Clefting: Splitting a single clause into two clauses, each with its own verb, e.g. ‘The chicken turtles tasted like chicken.’ becomes ‘It was the chicken turtle | that tasted like chicken.’ In this case, clefting is used to shift the focus of the sentence to the subject, the chicken turtle.
- Front focus: Placing at the start (front) of a sentence information that would normally occur later in the sentence, to give it extra prominence. For example, in pop culture, Yoda's speech often utilizes such syntactic construction, such as when he says 'much to learn you still have' to Luke Skywalker.
- End focus (or end weight): Given or familiar information followed by new information. This gives prominence to the final part of the sentences and can enable suspense to build, e.g. ‘Through the door came a gigantic wolf’.(Umer Prince)
References
[edit]- ^ Chafe, Wallace (1976). "Givenness, contrastiveness, definiteness, subjects, topics, and point of view". In Li, Charles (ed.). Subject and topic. Academic Press. pp. 25–55.
Information flow
View on Grokipediafrom Grokipedia
Information flow refers to the movement and exchange of information within and across systems, encompassing computational, organizational, theoretical, linguistic, and biological domains. In computer science, it is extensively studied to track how data propagates through programs and hardware, aiding in the detection and prevention of unintended leaks that could compromise sensitive information.[1]
A cornerstone of information flow analysis is the principle of non-interference, which guarantees that high-security (confidential) inputs do not influence low-security (public) outputs, thereby preventing observers from inferring secrets through observable effects.[1] This concept underpins information flow control (IFC) mechanisms, which use static program analysis, type systems, and runtime tracking to enforce policies across software and hardware.[1] Early foundations trace to the 1970s, with seminal work on confinement and mandatory access control by researchers like Butler Lampson and the Bell-LaPadula model, evolving into modern language-based approaches for end-to-end security in domains such as military, finance, and healthcare.[1]
Beyond computing, information flow is examined in information theory as the transfer of information between variables, quantified using entropy-based measures such as transfer entropy.[2] In organizational communication, it involves directional exchanges—downward from management to subordinates, upward from employees to leaders, horizontal among peers, and sometimes diagonal—to support decision-making and coordination.[3] The concept also applies in linguistics for tracking referential information in discourse and in biological systems for genetic information propagation and neural signaling. Significant applications of information flow analysis include securing complex systems against covert channels and side-channel attacks, with ongoing research addressing challenges like declassification of secrets and integration with other security paradigms.[1]
Overview
Definition and Core Concepts
Information flow refers to the directed transfer of informational content from a source to a destination, often involving processes such as encoding at the source, transmission through a channel, and decoding at the destination. This concept encompasses the movement of data, signals, or knowledge between entities or processes, enabling communication, control, and coordination in various systems. The term highlights the structured pathway by which information is conveyed, potentially mediated by intermediaries that transform or filter the content to ensure fidelity or adaptability.[4] Core concepts in information flow include the source, channel, and sink. The source originates the information, typically encoding it into a suitable form for transmission, such as converting thoughts into signals in biological systems or data into packets in technical ones. The channel serves as the medium—physical, like wires or airwaves, or abstract, like neural pathways—through which the encoded information travels, subject to potential distortions or noise. The sink, or destination, receives and decodes the information, interpreting it to produce an effect or response. Directionality is a key attribute: flows can be unidirectional, representing one-way transfers as in broadcasting (e.g., depicted simply as A → B), or bidirectional, allowing reciprocal exchange. Types of flows vary, including sequential flows that proceed linearly from source to sink, parallel flows that distribute information across multiple channels simultaneously, and feedback loops where output from the sink influences the source, enabling self-regulation.[5] The notion of information flow has an interdisciplinary scope, emerging as a unifying idea in cybernetics, where it underpins the study of control and communication in both machines and living organisms. Pioneered by Norbert Wiener in 1948, cybernetics framed information flow within feedback systems to model purposeful behavior across engineering, biology, and beyond, emphasizing how information circulates to maintain stability or adapt to changes. This foundational perspective extends to diverse fields, providing a conceptual bridge for analyzing transmission in complex systems. For instance, in information theory, such flows are quantified to assess efficiency, while applications in computing model program execution and in biology describe signaling in cellular networks.[6][5]Historical Development
The concept of information flow originated in the mid-20th century, rooted in efforts to model communication and control amid technological and wartime advancements. In 1948, Claude Shannon's seminal paper "A Mathematical Theory of Communication" established a framework for analyzing the transmission of information across channels susceptible to noise, quantifying how signals degrade and are reconstructed to preserve meaning.[7] That same year, Norbert Wiener's book Cybernetics: Or Control and Communication in the Animal and the Machine introduced feedback mechanisms as essential to regulating information flow in both mechanical and biological systems, influencing fields from engineering to physiology.[8] Post-World War II developments in the 1950s extended these ideas into broader systems theory, emphasizing information's role in adaptation and stability. W. Ross Ashby's 1956 work An Introduction to Cybernetics articulated the law of requisite variety, positing that effective control in complex systems requires a controller's response diversity to match or exceed the disturbances it faces, thereby directing information flow to achieve regulation.[9] The 1970s and 1980s marked the concept's diversification into social and computational domains. In linguistics, Wallace Chafe's 1976 analysis distinguished "given" information (already known to listeners) from "new" information, illustrating how discourse structures the incremental flow of knowledge to maintain coherence in communication.[10] Concurrently, in computer science, Joseph Goguen and José Meseguer's 1982 paper defined non-interference as a security property preventing high-level inputs from influencing low-level outputs, formalizing controls on information flow within software systems.[11] From the 1990s to the present, information flow has permeated biological and networked systems, reflecting interdisciplinary convergence. In biology, refinements to Francis Crick's central dogma—originally outlining unidirectional genetic information transfer—emerged with the 1993 identification of microRNAs, such as the lin-4 gene product in C. elegans, which demonstrated post-transcriptional regulation altering protein synthesis via small non-coding RNAs.[12] In network analysis, early models of informational cascades by Sushil Bikhchandani, David Hirshleifer, and Ivo Welch in 1992 explained herding behavior through sequential observation; this was adapted to social media in the 2000s, notably in David Kempe, Jon Kleinberg, and Éva Tardos's 2003 study on maximizing influence spread, which modeled diffusion processes in online graphs to predict viral propagation.[13][14] Key milestones in the historical development include:- 1948: Shannon introduces mathematical modeling of information transmission through channels.[7]
- 1948: Wiener pioneers cybernetics, focusing on feedback in information exchange.[8]
- 1956: Ashby formulates the law of requisite variety for system control via information.[9]
- 1976: Chafe differentiates given and new information in linguistic flow.[10]
- 1982: Goguen and Meseguer define non-interference for secure information flows in computing.[11]
- 1993: Lee et al. reveal microRNAs as regulators refining biological information pathways.[12]
- 2003: Kempe, Kleinberg, and Tardos apply cascade models to influence diffusion in social networks.[14]
