MIT Libraries logoDSpace@MIT

MIT
View Item 
  • DSpace@MIT Home
  • Engineering Systems Division
  • Engineering Systems Division (ESD) Working Paper Series
  • View Item
  • DSpace@MIT Home
  • Engineering Systems Division
  • Engineering Systems Division (ESD) Working Paper Series
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Towards better understanding Cybersecurity: Or are "Cyberspace" and "Cyber Space" the same?

Author(s)
Madnick, Stuart E.; Choucri, Nazli; Camina, Steven; Woon, Wei Lee
Thumbnail
Downloadesd-wp-2014-28.pdf (530.4Kb)
Metadata
Show full item record
Abstract
Although there are many technology challenges and approaches to attaining cybersecurity, human actions (or inactions) also often pose large risks. There are many reasons, but one problem is whether we all “see the world” the same way. That is, what does “cybersecurity” actually mean – as well as the many related concepts, such as “cyberthreat,” “cybercrime,” etc. Although dictionaries, glossaries, and other sources tell you what words/phrases are supposed to mean (somewhat complicated by the fact that they often contradict each other), they do not tell you how people are actually using them. If we are to have an effective solution, it is important that all the parties understand each other – or, at least, understand that there are different perspectives. For the purpose of this paper and to demonstrate our methodology, we consider the case of the words, “cyberspace” and “cyber space.” When we started, we assumed that “cyberspace” and “cyber space” were essentially the same word with just a minor variation in punctuation (i.e., the space, or lack thereof, between “cyber” and “space”) and that the choice of the punctuation was a rather random occurrence. With that assumption in mind, we would expect that the usage of these words (as determined by the taxonomies that would be constructed by our algorithms) would be basically the same. As it turned out, they were quite different, both in overall shape and groupings within the taxonomy. Since the overall field of cybersecurity is so new, understanding the field and how people think about it (as evidenced by their actual usage of terminology, and how usage changes over time) is an important goal. Our approach helps to illuminate these understandings.
Date issued
2014-10
URI
http://hdl.handle.net/1721.1/103021
Publisher
Massachusetts Institute of Technology. Engineering Systems Division
Series/Report no.
ESD Working Papers;ESD-WP-2014-28

Collections
  • Engineering Systems Division (ESD) Working Paper Series

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

Login

Statistics

OA StatisticsStatistics by CountryStatistics by Department
MIT Libraries
PrivacyPermissionsAccessibilityContact us
MIT
Content created by the MIT Libraries, CC BY-NC unless otherwise noted. Notify us about copyright concerns.