Towards better understanding cybersecurity: Or are "cyberspace" and "cyber space" the same?

Although there are many technology challenges and approaches to attaining cybersecurity, human actions (or inactions) also often pose large risks. There are many reasons, but one problem is whether we all “see the world” the same way. That is, what does “cybersecurity” actually mean – as well as the...

Full description

Bibliographic Details
Main Authors: Madnick, Stuart E., Camiña, Steven, Choucri, Nazli, Woon, Wei Lee
Format: Article
Language:en_US
Published: © Elsevier B.V. 2022
Online Access:https://aisel.aisnet.org/wisp2012/27/
https://hdl.handle.net/1721.1/141751
_version_ 1826193612595003392
author Madnick, Stuart E.
Camiña, Steven
Choucri, Nazli
Woon, Wei Lee
author_facet Madnick, Stuart E.
Camiña, Steven
Choucri, Nazli
Woon, Wei Lee
author_sort Madnick, Stuart E.
collection MIT
description Although there are many technology challenges and approaches to attaining cybersecurity, human actions (or inactions) also often pose large risks. There are many reasons, but one problem is whether we all “see the world” the same way. That is, what does “cybersecurity” actually mean – as well as the many related concepts, such as “cyberthreat,” “cybercrime,” etc. Although dictionaries, glossaries, and other sources tell you what words/phrases are supposed to mean (somewhat complicated by the fact that they often contradict each other), they do not tell you how people are actually using them. If we are to have an effective solution, it is important that all the parties understand each other – or, at least, understand that there are different perspectives. For the purpose of this poster and to demonstrate our methodology, we consider the case of the words, “cyberspace” and “cyber space.” We had developed techniques and algorithms for the automated generation of taxonomies for chosen “seed terms” (such as “cyberspace” and “cyber space”) based on the co-occurrence of those words in the list of keywords of documents in large document repositories, such as Compendex and Inspec. The system that we had developed and used in this experiment employed the Heymann algorithm, closeness centrality, cosine similarity metric (which we refer to as H-CC). When we started, we assumed that “cyberspace” and “cyber space” were essentially the same word with just a minor variation in punctuation (i.e., the space, or lack thereof, between “cyber” and “space”) and that the choice of the punctuation was a rather random occurrence. With that assumption in mind, we would expect that the usage of these words would be basically the same and would produce roughly similar taxonomies. As it turned out, the taxonomies generated were quite different, both in overall shape and groupings within the taxonomy. Since the overall field of cybersecurity is so new, understanding the field and how people think about it (as evidenced by their actual usage of terminology, and how usage changes over time) is an important goal. Our approach helps to illuminate these understandings.
first_indexed 2024-09-23T09:41:52Z
format Article
id mit-1721.1/141751
institution Massachusetts Institute of Technology
language en_US
last_indexed 2024-09-23T09:41:52Z
publishDate 2022
publisher © Elsevier B.V.
record_format dspace
spelling mit-1721.1/1417512022-05-05T15:37:19Z Towards better understanding cybersecurity: Or are "cyberspace" and "cyber space" the same? Madnick, Stuart E. Camiña, Steven Choucri, Nazli Woon, Wei Lee Although there are many technology challenges and approaches to attaining cybersecurity, human actions (or inactions) also often pose large risks. There are many reasons, but one problem is whether we all “see the world” the same way. That is, what does “cybersecurity” actually mean – as well as the many related concepts, such as “cyberthreat,” “cybercrime,” etc. Although dictionaries, glossaries, and other sources tell you what words/phrases are supposed to mean (somewhat complicated by the fact that they often contradict each other), they do not tell you how people are actually using them. If we are to have an effective solution, it is important that all the parties understand each other – or, at least, understand that there are different perspectives. For the purpose of this poster and to demonstrate our methodology, we consider the case of the words, “cyberspace” and “cyber space.” We had developed techniques and algorithms for the automated generation of taxonomies for chosen “seed terms” (such as “cyberspace” and “cyber space”) based on the co-occurrence of those words in the list of keywords of documents in large document repositories, such as Compendex and Inspec. The system that we had developed and used in this experiment employed the Heymann algorithm, closeness centrality, cosine similarity metric (which we refer to as H-CC). When we started, we assumed that “cyberspace” and “cyber space” were essentially the same word with just a minor variation in punctuation (i.e., the space, or lack thereof, between “cyber” and “space”) and that the choice of the punctuation was a rather random occurrence. With that assumption in mind, we would expect that the usage of these words would be basically the same and would produce roughly similar taxonomies. As it turned out, the taxonomies generated were quite different, both in overall shape and groupings within the taxonomy. Since the overall field of cybersecurity is so new, understanding the field and how people think about it (as evidenced by their actual usage of terminology, and how usage changes over time) is an important goal. Our approach helps to illuminate these understandings. This material is based on work supported by the U.S. Office of Naval Research, Grant No. N00014-09-1-0597. Any opinions, findings, conclusions or recommendations therein are those of the author(s) and do not necessarily reflect the views of the Office of Naval Research. 2022-04-07T16:35:28Z 2022-04-07T16:35:28Z 2012-12-15 Article https://aisel.aisnet.org/wisp2012/27/ https://hdl.handle.net/1721.1/141751 Madnick, S., Camiña, S., Choucri, N., & Woon, W. L. (2012). Towards better understanding cybersecurity: Or are "cyberspace" and "cyber space" the same? Proceedings of the Workshop on Information Security & Privacy (WISP2012), 27. en_US Attribution-NonCommercial-NoDerivs 3.0 United States http://creativecommons.org/licenses/by-nc-nd/3.0/us/ application/pdf application/pdf © Elsevier B.V.
spellingShingle Madnick, Stuart E.
Camiña, Steven
Choucri, Nazli
Woon, Wei Lee
Towards better understanding cybersecurity: Or are "cyberspace" and "cyber space" the same?
title Towards better understanding cybersecurity: Or are "cyberspace" and "cyber space" the same?
title_full Towards better understanding cybersecurity: Or are "cyberspace" and "cyber space" the same?
title_fullStr Towards better understanding cybersecurity: Or are "cyberspace" and "cyber space" the same?
title_full_unstemmed Towards better understanding cybersecurity: Or are "cyberspace" and "cyber space" the same?
title_short Towards better understanding cybersecurity: Or are "cyberspace" and "cyber space" the same?
title_sort towards better understanding cybersecurity or are cyberspace and cyber space the same
url https://aisel.aisnet.org/wisp2012/27/
https://hdl.handle.net/1721.1/141751
work_keys_str_mv AT madnickstuarte towardsbetterunderstandingcybersecurityorarecyberspaceandcyberspacethesame
AT caminasteven towardsbetterunderstandingcybersecurityorarecyberspaceandcyberspacethesame
AT choucrinazli towardsbetterunderstandingcybersecurityorarecyberspaceandcyberspacethesame
AT woonweilee towardsbetterunderstandingcybersecurityorarecyberspaceandcyberspacethesame