What is cybersecurity? Explorations in automated knowledge generation
This paper addresses a serious impediment to theory and policy for cybersecurity: Trivial as it might appear on the surface, there is no agreed upon understanding of the issue, no formal definition, and not even a consensus on the mere spelling of the terms –– so that efforts to develop policies and...
Main Authors: | , , |
---|---|
Format: | Working Paper |
Language: | en_US |
Published: |
© Massachusetts Institute of Technology
2022
|
Online Access: | https://hdl.handle.net/1721.1/141765 |
_version_ | 1826193149135945728 |
---|---|
author | Choucri, Nazli Elbait, Gihan Daw Madnick, Stuart E. |
author_facet | Choucri, Nazli Elbait, Gihan Daw Madnick, Stuart E. |
author_sort | Choucri, Nazli |
collection | MIT |
description | This paper addresses a serious impediment to theory and policy for cybersecurity: Trivial as it might appear on the surface, there is no agreed upon understanding of the issue, no formal definition, and not even a consensus on the mere spelling of the terms –– so that efforts to develop policies and postures, or capture relevant knowledge are seriously hampered. In this context, we present a “proof of concept” for a new research strategy based on a close examination of a large corpus of scholarly knowledge, and the extent to which it enables us to generate new knowledge about cybersecurity of relevance to international relations and to national security relevant to the nation’s security and to international relations. Given the new cyber realities, this paper is also a “proof” of how to create new knowledge through automated investigations of the record to date. |
first_indexed | 2024-09-23T09:34:29Z |
format | Working Paper |
id | mit-1721.1/141765 |
institution | Massachusetts Institute of Technology |
language | en_US |
last_indexed | 2024-09-23T09:34:29Z |
publishDate | 2022 |
publisher | © Massachusetts Institute of Technology |
record_format | dspace |
spelling | mit-1721.1/1417652022-05-05T16:16:15Z What is cybersecurity? Explorations in automated knowledge generation Choucri, Nazli Elbait, Gihan Daw Madnick, Stuart E. This paper addresses a serious impediment to theory and policy for cybersecurity: Trivial as it might appear on the surface, there is no agreed upon understanding of the issue, no formal definition, and not even a consensus on the mere spelling of the terms –– so that efforts to develop policies and postures, or capture relevant knowledge are seriously hampered. In this context, we present a “proof of concept” for a new research strategy based on a close examination of a large corpus of scholarly knowledge, and the extent to which it enables us to generate new knowledge about cybersecurity of relevance to international relations and to national security relevant to the nation’s security and to international relations. Given the new cyber realities, this paper is also a “proof” of how to create new knowledge through automated investigations of the record to date. This material is based on work supported by the U.S. Office of Naval Research, Grant No. N00014-09-1-0597. Any opinions, findings, conclusions or recommendations therein are those of the author(s) and do not necessarily reflect the views of the Office of Naval Research. 2022-04-07T18:19:55Z 2022-04-07T18:19:55Z 2012-11-06 Working Paper https://hdl.handle.net/1721.1/141765 Choucri, N., Elbait, G. D., Madnick, S. E. (2012). What is cybersecurity? Explorations in automated knowledge generation (ECIR Working Paper No. 2012-4). MIT Political Science Department. en_US ECIR Working Paper No. 2012-4 Attribution-NonCommercial-NoDerivs 3.0 United States http://creativecommons.org/licenses/by-nc-nd/3.0/us/ application/pdf © Massachusetts Institute of Technology |
spellingShingle | Choucri, Nazli Elbait, Gihan Daw Madnick, Stuart E. What is cybersecurity? Explorations in automated knowledge generation |
title | What is cybersecurity? Explorations in automated knowledge generation |
title_full | What is cybersecurity? Explorations in automated knowledge generation |
title_fullStr | What is cybersecurity? Explorations in automated knowledge generation |
title_full_unstemmed | What is cybersecurity? Explorations in automated knowledge generation |
title_short | What is cybersecurity? Explorations in automated knowledge generation |
title_sort | what is cybersecurity explorations in automated knowledge generation |
url | https://hdl.handle.net/1721.1/141765 |
work_keys_str_mv | AT choucrinazli whatiscybersecurityexplorationsinautomatedknowledgegeneration AT elbaitgihandaw whatiscybersecurityexplorationsinautomatedknowledgegeneration AT madnickstuarte whatiscybersecurityexplorationsinautomatedknowledgegeneration |