•  
  •  
 

Prior Publisher

The Association of Digital Forensics, Security and Law (ADFSL)

Abstract

In recent years, ‘Cyber Security’ has emerged as a widely-used term with increased adoption by practitioners and politicians alike. However, as with many fashionable jargon, there seems to be very little understanding of what the term really entails. Although this is may not be an issue when the term is used in an informal context, it can potentially cause considerable problems in context of organizational strategy, business objectives, or international agreements. In this work, we study the existing literature to identify the main definitions provided for the term ‘Cyber Security’ by authoritative sources. We then conduct various lexical and semantic analysis techniques in an attempt to better understand the scope and context of these definitions, along with their relevance. Finally, based on the analysis conducted, we propose a new improved definition that we then demonstrate to be a more representative definition using the same lexical and semantic analysis techniques.

References

Androutsopoulos, I., & Malakasiotis, P. (2010). A survey of paraphrasing and textual entailment methods. J. Artif. Int. Res., 38(1), 135-187.

Barzilay, M. (2013, 2013-08-05). A simple definition of cybersecurity. Retrieved from http://www.isaca.org/Knowledge- Center/Blog/Lists/Posts/Post.aspx?ID=29 6

Baylon, C. (2014). Challenges at the Intersection of Cyber Security and Space Security: Country and International Institution Perspectives. Retrieved from London: http://www.chathamhouse.org/publication /challenges-intersection-cyber-security-andspace- security-country-and-international

Choi, H., & Varian, H. A. L. (2012). Predicting the Present with Google Trends. Economic Record, 88, 2-9. doi:10.1111/j.1475-4932.2012.00809.x

Congressional Research Service. (2014). Cybersecurity Issues and Challenges: In Brief. (R43831). Retrieved from https://www.fas.org/sgp/crs/misc/R43831. pdf.

Corley, C., & Mihalcea, R. (2005). Measuring the semantic similarity of texts. Paper presented at the Proceedings of the ACL Workshop on Empirical Modeling of Semantic Equivalence and Entailment, Ann Arbor, Michigan.

Cornell University. (2016). Critically Analyzing Information Sources: Critical Appraisal and Analysis. Retrieved from http://guides.library.cornell.edu/c.php?g= 31866&p=201757

Couto, F. M., Silva, M. J., & Coutinho, P. M. (2007). Measuring semantic similarity between Gene Ontology terms. Data & Knowledge Engineering, 61(1), 137-152. doi:http://dx.doi.org/10.1016/j.datak.2006. 05.003

Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining Cybersecurity. Technology Innovation Management Review, 4(10).

Creasey, J. (2013). Cyber Security Incident Response Guide, 56. Retrieved from http://www.crest-approved.org/guidanceand- standards/cyber-security-incidentresponse- guide/index.html

De Marneffe, M.-C., MacCartney, B., & Manning, C. D. (2006). Generating typed dependency parses from phrase structure parses. Paper presented at the Proceedings of LREC.

Eig, L. M. (2011). Statutory Interpretation: General Principles and Recent Trends (97- 589). Retrieved from https://fas.org/sgp/crs/misc/97-589.pdf

Falessi, N., Gavrila, R., Klejnstrup Ritter, M., & Moulinos, K. (2012). Practical Guide on Development and Execution. Retrieved from Heraklion: http://www.enisa.europa.eu/activities/Resi lience-and-CIIP/national-cyber-securitystrategies- ncsss/national-cyber-securitystrategies- an-implementation-guide

Giles, K., & Hagestad, W. (2013, 4-7 June 2013). Divided by a common language: Cyber definitions in Chinese, Russian and English. Paper presented at the Cyber Conflict (CyCon), 2013 5th International Conference on.

Godwin III, J. B., Kulpin, A., Rauscher, K. F., & Yaschenko, V. (2014). Critical Terminology Foundations 2. Retrieved from New York: http://www.ewi.info/idea/criticalterminology- foundations-2

Gomaa, W. H., & Fahmy, A. A. (2013). A survey of text similarity approaches. International Journal of Computer Applications, 68(13), 13-18. Government of Montenegro. (2013). National Cyber Security Strategy for Montenegro 2013-2017. Podgorica Retrieved from http://www.mid.gov.me/ResourceManager /FileDownload.aspx?rid=165416&rType=2 &file=Cyber%20Security%20Strategy%20fo r%20Montenegro.pdf.

Graesser, A. C., Olney, A., Haynes, B. C., & Chipman, P. (2005). AutoTutor: A Cognitive System That Simulates a Tutor Through Mixed-Initiative Dialogue. Cognitive systems: Human cognitive models in systems design, 177.

Hearst, M. A. (1999). Untangling text data mining. Paper presented at the Proceedings of the 37th annual meeting of the Association for Computational Linguistics on Computational Linguistics, College Park, Maryland.

Higuchi, K. (2015). KH_Coder (Version 2). Retrieved from http://khc.sourceforge.net/

International Telecommunication Union. (2008). Overview of cybersecurity SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY (pp. 64).

Internet Society. (2012). Some Perspectives on Cybersecurity, 22. Retrieved from Internet Society website: http://www.internetsociety.org/doc/someperspectives- cybersecurity-2012

ISACA. (2014). European Cybersecurity Implementation: Overview. Retrieved from Rolling Meadows: http://www.isaca.org/Knowledge- Center/Research/ResearchDeliverables/Pa ges/European-Cybersecurity- Implementation-Series.aspx

Jiang, J. J., & Conrath, D. W. (1997). Semantic similarity based on corpus statistics and lexical taxonomy. Paper presented at the In the Proceedings of ROCLING X, Taiwan.

Kitchenham, B., & Charters, S. (2007). Guidelines for performing Systematic Literature Reviews in Software Engineering. Retrieved from http://www.dur.ac.uk/ebse/resources/Syst ematic-reviews-5-8.pdf

Leacock, C., Miller, G. A., & Chodorow, M. (1998). Using corpus statistics and WordNet relations for sense identification. Computational Linguistics, 24(1), 147-165.

Lee, M. C. (2011). A novel sentence similarity measure for semantic-based expert systems. Expert Systems with Applications, 38(5), 6392-6399. doi:http://dx.doi.org/10.1016/j.eswa.2010.1 0.043

Lin, D. (1998). An information-theoretic definition of similarity. Paper presented at the 15th International Conference on Machine Learning, Madison, WI.

Lintean, M. C. (2011). Measuring semantic similarity: representations and methods. The University of Memphis.

Luiijf, E., Besseling, K., & de Graaf, P. (2013). Nineteen national cyber security strategies. International Journal of Critical Infrastructures, 9(1), 3-31. doi:10.1504/IJCIS.2013.051608

Mäntylä, M. V., Adams, B., Khomh, F., Engström, E., & Petersen, K. (2014). On rapid releases and software testing: a case study and a semi-systematic literature review. Empirical Software Engineering, 20(5), 1384-1425. doi:10.1007/s10664-014- 9338-4

Martin, D. I., & Berry, M. W. (2007). Mathematical foundations behind latent semantic analysis. Handbook of latent semantic analysis, 35-56.

Meyer, D., Hornik, K., & Feinerer, I. (2008). Text mining infrastructure in R. Journal of Statistical Software, 25(5), 1-54.

Miller, G. A. (1995). WordNet: a lexical database for English. Commun. ACM, 38(11), 39-41. doi:10.1145/219717.219748

Nakov, P., Popova, A., & Mateev, P. (2001). Weight functions impact on LSA performance. EuroConference RANLP, 187-193.

Pons, P., & Latapy, M. (2005). Computing Communities in Large Networks Using Random Walks. In p. Yolum, T. Güngör, F. Gürgen, & C. Özturan (Eds.), Computer and Information Sciences - ISCIS 2005 (Vol. 3733, pp. 284-293): Springer Berlin Heidelberg.

Porter, M. F. (1997). An algorithm for suffix stripping. In J. Karen Sparck & W. Peter (Eds.), Readings in information retrieval (pp. 313-316): Morgan Kaufmann Publishers Inc.

Republic of South Africa. (2010). Cybersecurity Policy of South Africa. Pretoria.

Rice, R. E., & Danowski, J. A. (1993). Is It Really Just Like a Fancy Answering Machine? Comparing Semantic Networks of Different Types of Voice Mail Users. Journal of Business Communication, 30(4), 369-397. doi:10.1177/002194369303000401

Rus, V. (2014). Opportunities and Challenges in Semantic Similarity. Paper presented at the 2014.

Rus, V., & Lintean, M. (2012). A comparison of greedy and optimal assessment of natural language student input using word-to-word similarity metrics. Paper presented at the Proceedings of the Seventh Workshop on Building Educational Applications Using NLP, Montreal, Canada.

Rus, V., Lintean, M., Moldovan, C., Baggett, W., Niraula, N., & Morgan, B. (2012). The similar corpus: A resource to foster the qualitative understanding of semantic similarity of texts. Paper presented at the Semantic Relations II: Enhancing Resources and Applications, The 8th Language Resources and Evaluation Conference (LREC 2012), May.

Rus, V., Lintean, M. C., Banjade, R., Niraula, N. B., & Stefanescu, D. (2013). SEMILAR: The Semantic Similarity Toolkit. Paper presented at the ACL (Conference System Demonstrations).

Ryan, G. W., & Bernard, H. R. (2003). Techniques to Identify Themes. Field Methods, 15(1), 85-109. doi:10.1177/1525822x02239569

Salton, G. (1963). Associative Document Retrieval Techniques Using Bibliographic Information. J. ACM, 10(4), 440-457. doi:10.1145/321186.321188

Sauper, C., & Barzilay, R. (2009). Automatically generating Wikipedia articles: a structure-aware approach. Paper presented at the Proceedings of the Joint Conference of the 47th Annual Meeting of the ACL and the 4th International Joint Conference on Natural Language Processing of the AFNLP: Volume 1 - Volume 1, Suntec, Singapore.

Sowell, T. (2014). Basic Economics (5th ed.). New York: Basic Books.

Sparck Jones, K. (1972). A statistical interpretatoin of term specificity and its application in retrieval. Journal of Documentation, 28(1), 11-21. doi:doi:10.1108/eb026526

Stubley, D. (2013, 2013-06-07). What is Cyber Security? Retrieved from https://www.7elements.co.uk/resources/blo g/what-is-cyber-security/

The White House. (2009). National Cybersecurity Awareness Month, 2009 [Press release]. Retrieved from https://www.whitehouse.gov/the_press_of fice/Presidential-Proclamation-National- Cybersecurity-Awareness-Month/

Walls, A., Perkins, E., & Weiss, J. (2013). Definition: Cybersecurity, 5. Retrieved from Gartner.com website: https://www.gartner.com/doc/2510116/def inition-cybersecurity

Wamala, F. (2011). ITU National Cybersecurity Strategy Guide. Retrieved from Geneva: http://www.itu.int/ITUD/ cyb/cybersecurity/docs/itu-nationalcybersecurity- guide.pdf

Weiss, S., Indurkhya, N., Zhang, T., & Damerau, F. (2004). Text Mining: Predictive Methods for Analyzing Unstructured Information: SpringerVerlag.

Wu, Z., & Palmer, M. (1994). Verbs semantics and lexical selection. Paper presented at the Proceedings of the 32nd annual meeting on Association for Computational Linguistics, Las Cruces, New Mexico.

Yuhua, L., Bandar, Z. A., & McLean, D. (2003). An approach for measuring semantic similarity between words using multiple information sources. Knowledge and Data Engineering, IEEE Transactions on, 15(4), 871-882. doi:10.1109/TKDE.2003.1209005

Yuhua, L., McLean, D., Bandar, Z. A., O'Shea, J. D., & Crockett, K. (2006). Sentence similarity based on semantic nets and corpus statistics. Knowledge and Data Engineering, IEEE Transactions on, 18(8), 1138-1150. doi:10.1109/TKDE.2006.130

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.