or are "Cyberspace" and "Cyber Space" the same?

Slides:



Advertisements
Similar presentations
Brief Overview of Aspects of the Scientific & Technical Literature.
Advertisements

Copyright © 2003 by The McGraw-Hill Companies, Inc. All rights reserved. Business and Administrative Communication SIXTH EDITION.
MIT-Harvard Conference Cyber International Relations (ECIR)
1 MIT-Harvard Conference Explorations in Cyber International Relations (ECIR) Closing Remarks – Next Steps Nazli Choucri Professor of Political Science.
1 MIT-Harvard Conference Explorations in Cyber International Relations (ECIR) Introduction to the ECIR Initiative Nazli Choucri Professor of Political.
Engineering Design Process ETP 2005 – Brian Vance This material is based upon work supported by the National Science Foundation under Grant No
Dr. MaLinda Hill Advanced English C1-A Designing Essays, Research Papers, Business Reports and Reflective Statements.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Course Flow Diagrams May 2-3, 2013 Support.
Latent Semantic Analysis Hongning Wang Recap: vector space model Represent both doc and query by concept vectors – Each concept defines one dimension.
Where are the Academic Jobs ? Interactive Exploration of Job Advertisements in Geospatial and Topical Space Angela M. Zoss 1, Michael Conover 2 and Katy.
Systems Realization Laboratory The Role and Limitations of Modeling and Simulation in Systems Design Jason Aughenbaugh & Chris Paredis The Systems Realization.
Title Authors Introduction Text, text, text, text, text, text Background Information Text, text, text, text, text, text Observations Text, text, text,
Thinking in Parallel – Domain Decomposition New Mexico Supercomputing Challenge in partnership with Intel Corp. and NM EPSCoR.
Leader Interviews Name, PhD Title, Organization University This project is funded by the National Science Foundation (NSF) under award numbers ANT
 Wind Power TEAK – Traveling Engineering Activity Kits Partial support for the TEAK Project was provided by the National Science Foundation's Course,
Thinking in Parallel - Introduction New Mexico Supercomputing Challenge in partnership with Intel Corp. and NM EPSCoR.
METHODS IN ANTHROPOLOGY SCIENCE AND INTERPRETATION.
Real-time aspects June 19, 2016
Data Mining for Expertise: Using Scopus to Create Lists of Experts for U.S. Department of Education Discretionary Grant Programs Good afternoon, my name.
Ch. 2: Planning a Study.
What is a Hidden Markov Model?
Lesson Overview 1.2 Science in Context.
Achievement Growth and Gaps for Students with Disabilities
Statistical NLP: Lecture 7
Time Series Consistency
Making “Open Data” Work: Challenges for Data Integration in Genomics Research
How to Get Your Paper Published in a Highly Ranked Journal
The Binary Number System
Compare/Contrast Essay - Brainstorm
Discussion and Conclusion
How does a Requirements Package Vary from Project to Project?
RESEARCH REPORTS Professional Writing
Lesson Overview 1.2 Science in Context.
Institute for Leadership in Education Development (I-LED)
Numeracy in Science – Lines of best fit
CAREER: Intelligent Generation of Text and Information Graphics*
Nanotechnology & Society
Institutional Developments, CERTS & CyberData, and ECIR Data Dashboard
Nanotechnology & Society
Title of Poster Site Visit 2017 Introduction Results
READING A PAPER.
Nanotechnology & Society
CSCD 506 Research Methods for Computer Science
Great Project Project 13 Lead investigator: I. Dunno, University of E. Missions Project manager: O. Perations, FAA September 27 & 28, 2018 Alexandria,
Use Cases CS/SWE 421 Introduction to Software Engineering Dan Fleck
Paper title Abstract Discussion and Conclusions Introduction Results
Lesson Overview 1.2 Science in Context.
Technical Writing Abstract Writing.
Lesson Overview 1.2 Science in Context.
Adding Secondary Sources and Conclusions
Nanotechnology & Society
Lesson Overview 1.2 Science in Context.
Use Cases CS/SWE 421 Introduction to Software Engineering Dan Fleck
Lesson Overview 1.2 Science in Context.
Lesson Overview 1.2 Science in Context.
The Format of Scientific Literature
Lesson Overview 1.2 Science in Context.
Title of Poster Site Visit 2018 Introduction Results
LabVenture! Redesigning to Maximize Transfer Inside/Outside School
Mental Health in the Correctional System
Lesson Overview 1.2 Science in Context.
1: Playing to your audience
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
Use Cases CS/SWE 421 Introduction to Software Engineering Dan Fleck
The Essay.
Exploring Exploratory Testing
Latent Semantic Analysis
Title of Poster Usually Up Top (Recommend 80pt – 115 pt)
Lesson Overview 1.2 Science in Context.
By Ken Hyland Journal of English for Academic Purposes (2010)
Presentation transcript:

or are "Cyberspace" and "Cyber Space" the same? Towards better understanding Cybersecurity: or are "Cyberspace" and "Cyber Space" the same? Stuart Madnick1, Nazli Choucri1, Steven Camina1, Wei Lee Woon2 1Massachusetts Institute of Technology; 2Masdar Institute of Science and Technology Many technological and technical challenges affect cybersecurity. However, human actions (or inactions) can sometimes pose the largest risks. One problem: we often don’t “see the world” the same way. For a start, what does “cybersecurity” actually mean? How is it related to “cyberthreat,” “cybercrime,” etc.? Dictionaries, glossaries and other sources tell you what words/phrases are supposed to mean, but may not accurately reflect what they actually mean, or how they are used in practice. Introduction “Cyberspace” “Cyber Space” To demonstrate this point, consider the case of “cyberspace” vs “cyber space” It might be assumed that “cyberspace” and “cyber space” are essentially the same word, with just a minor variation in punctuation. But is this necessarily true? Objectives We have developed techniques for automatically generating taxonomies for selected “seed terms” using large document repositories, such as Compendex and Inspec, based on co-occurrence. These taxonomies reflect relationship amongst terms, and help to elucidate broad usage patterns. We can use this to test the previous assumption - if “cyberspace” and “cyber space” are indeed the same, we expect roughly similar taxonomies. Method Discussion The taxonomies above are very different. Possible reasons: Authors of papers in different fields use different terms Usage of terms vary across geographical regions Different words may have been favored in different time periods Lots of scope for future research, including: Detailed study of reasons behind observed differences (we do know some) Different “seed terms” (e.g., “cyberthreat”) Alternative text databases/source types Different taxonomy generation algorithms “Face validity” via consultation with domain experts Acknowledgements: This work was supported, in part, by the MIT-Harvard “Explorations in Cyber International Relations” (ECIR) Project, which is funded by the Office of Naval Research under award number N00014-09-1-0597. Any opinion or findings, and conclusions or recommendations expressed in this publication are those of the authors and do not necessarily reflect the views of the Office of Naval Research.