What is cybersecurity? Explorations in automated knowledge generation

This paper addresses a serious impediment to theory and policy for cybersecurity: Trivial as it might appear on the surface, there is no agreed upon understanding of the issue, no formal definition, and not even a consensus on the mere spelling of the terms –– so that efforts to develop policies and...

Full description

Bibliographic Details
Main Authors: Choucri, Nazli, Elbait, Gihan Daw, Madnick, Stuart E.
Format: Working Paper
Language:en_US
Published: © Massachusetts Institute of Technology 2022
Online Access:https://hdl.handle.net/1721.1/141765
_version_ 1826193149135945728
author Choucri, Nazli
Elbait, Gihan Daw
Madnick, Stuart E.
author_facet Choucri, Nazli
Elbait, Gihan Daw
Madnick, Stuart E.
author_sort Choucri, Nazli
collection MIT
description This paper addresses a serious impediment to theory and policy for cybersecurity: Trivial as it might appear on the surface, there is no agreed upon understanding of the issue, no formal definition, and not even a consensus on the mere spelling of the terms –– so that efforts to develop policies and postures, or capture relevant knowledge are seriously hampered. In this context, we present a “proof of concept” for a new research strategy based on a close examination of a large corpus of scholarly knowledge, and the extent to which it enables us to generate new knowledge about cybersecurity of relevance to international relations and to national security relevant to the nation’s security and to international relations. Given the new cyber realities, this paper is also a “proof” of how to create new knowledge through automated investigations of the record to date.
first_indexed 2024-09-23T09:34:29Z
format Working Paper
id mit-1721.1/141765
institution Massachusetts Institute of Technology
language en_US
last_indexed 2024-09-23T09:34:29Z
publishDate 2022
publisher © Massachusetts Institute of Technology
record_format dspace
spelling mit-1721.1/1417652022-05-05T16:16:15Z What is cybersecurity? Explorations in automated knowledge generation Choucri, Nazli Elbait, Gihan Daw Madnick, Stuart E. This paper addresses a serious impediment to theory and policy for cybersecurity: Trivial as it might appear on the surface, there is no agreed upon understanding of the issue, no formal definition, and not even a consensus on the mere spelling of the terms –– so that efforts to develop policies and postures, or capture relevant knowledge are seriously hampered. In this context, we present a “proof of concept” for a new research strategy based on a close examination of a large corpus of scholarly knowledge, and the extent to which it enables us to generate new knowledge about cybersecurity of relevance to international relations and to national security relevant to the nation’s security and to international relations. Given the new cyber realities, this paper is also a “proof” of how to create new knowledge through automated investigations of the record to date. This material is based on work supported by the U.S. Office of Naval Research, Grant No. N00014-09-1-0597. Any opinions, findings, conclusions or recommendations therein are those of the author(s) and do not necessarily reflect the views of the Office of Naval Research. 2022-04-07T18:19:55Z 2022-04-07T18:19:55Z 2012-11-06 Working Paper https://hdl.handle.net/1721.1/141765 Choucri, N., Elbait, G. D., Madnick, S. E. (2012). What is cybersecurity? Explorations in automated knowledge generation (ECIR Working Paper No. 2012-4). MIT Political Science Department. en_US ECIR Working Paper No. 2012-4 Attribution-NonCommercial-NoDerivs 3.0 United States http://creativecommons.org/licenses/by-nc-nd/3.0/us/ application/pdf © Massachusetts Institute of Technology
spellingShingle Choucri, Nazli
Elbait, Gihan Daw
Madnick, Stuart E.
What is cybersecurity? Explorations in automated knowledge generation
title What is cybersecurity? Explorations in automated knowledge generation
title_full What is cybersecurity? Explorations in automated knowledge generation
title_fullStr What is cybersecurity? Explorations in automated knowledge generation
title_full_unstemmed What is cybersecurity? Explorations in automated knowledge generation
title_short What is cybersecurity? Explorations in automated knowledge generation
title_sort what is cybersecurity explorations in automated knowledge generation
url https://hdl.handle.net/1721.1/141765
work_keys_str_mv AT choucrinazli whatiscybersecurityexplorationsinautomatedknowledgegeneration
AT elbaitgihandaw whatiscybersecurityexplorationsinautomatedknowledgegeneration
AT madnickstuarte whatiscybersecurityexplorationsinautomatedknowledgegeneration