Skip to main content

Representing a Human-Centric Cyberspace

  • Conference paper
  • First Online:
Advances in Human Factors in Cybersecurity (AHFE 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1219))

Included in the following conference series:

Abstract

There is a lack of consensus when using the term “cyberspace” [1]. Computers and network devices are prominent in definitions of cyberspace; less common is the essential and inclusion of human users. However, the human user is both implicitly integral to and actively part of the cyberspace.

Cyberspace is often conceptualized as three layers of interconnected networks: social, information and geospatial (physical) [2]. These represent an indirect human element within cyberspace. This is characteristic of related fields, such as cybersecurity, where human-centered research has been lagging behind technological aspects. A model that incorporates the human user in cyberspace is needed to direct future research and improve security and usability (navigation).

A new human-centric model of cyberspace is proposed (the HCCM), with the user as a physical and integral entity, together with recognition of the cognitive representation of cyberspace. It focuses on boundaries and transformation points between objects and spaces and offers a platform for future human-centric research in cybersecurity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Lexico dictionary [32]: “The notional environment in which communication over computer networks occurs”. Collin’s English Dictionary [36]: “In computer technology, cyberspace refers to data banks and networks, considered as a place”.

References

  1. Kademi, A.M.A., Koltuksuz, A.: Formal characterization of cyberspace for cyber lexicon development. In: ECCWS 2017 16th European Conference on Cyber Warfare and Security, p. 200 (2017)

    Google Scholar 

  2. Bayne, J.: Cyberspatial mechanics. IEEE Trans. Syst. Man Cybern. Part B 38(3), 629–644 (2008)

    Article  Google Scholar 

  3. Johnston, R.: Salvation or destruction: metaphors of the Internet. First Monday 14(4) (2009)

    Google Scholar 

  4. Gibson, W.: Neuromancer. Berkley Publishing group, New York (1989)

    Google Scholar 

  5. Madnick, S.E., Choucri, N., Camiña, S., Woon, W.L.: Tow (ards better understanding Cybersecurity: or are “Cyberspace” and “Cyber Space” the same? mit.edu (2014)

    Google Scholar 

  6. Mayer, M., Martino, L., Mazurier, P., Tzvetkova, G.: How would you define Cyberspace, First Draft Pisa, 19 (2014)

    Google Scholar 

  7. Kramer, F.D., Starr, S.H., Wentz, L.K.: Cyberpower and national security, Potomac Books Inc. Nebraska (2009)

    Google Scholar 

  8. Kautz (2010). https://www.slideshare.net/study4cyberwar/cyberspace-model. Accessed 1 Nov 2019

  9. Rheingold, H.: The Virtual Community: Finding Connection in a Computerized World. Addison-Wesley Longman Publishing Co., Inc., Boston (1993)

    Google Scholar 

  10. Clement, J.: Facebook: number of monthly active users worldwide 2008–2019, Statista, 19 November 2019. https://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/. Accessed 7 Jan 2020

  11. McLuhan, M.: Understanding Media: The Extensions of Man. MIT Press, Cambridge (1994)

    Google Scholar 

  12. Zylinska, J.: The Cyborg Experiments: The Extensions of the Body in the Media Age. A & C Black, London (2002)

    Google Scholar 

  13. Clark, A., Chalmers, D.J.: The extended mind. Analysis 58, 10–23 (1998)

    Google Scholar 

  14. Lessig, L.: The zones of cyberspace. Stanf. Law Rev. 48, 1403 (1995)

    Article  Google Scholar 

  15. Ivkovic, D., Lotherington, H.: Multilingualism in cyberspace: conceptualising the virtual linguistic landscape. Int. J. Multilingualism 6(1), 17–36 (2009)

    Article  Google Scholar 

  16. Leuprecht, C., Skillicorn, D.B., Tait, V.E.: Beyond the Castle Model of cyber-risk and cyber-security. Gov. Inf. Quart. 33(2), 250–257 (2016)

    Article  Google Scholar 

  17. Wiener, N.: Cybernetics or Control and Communication in the Animal and the Machine. MIT Press, Cambridge (2019)

    Book  Google Scholar 

  18. Duffy, P.R.: Cybernetics. J. Bus. Commun. 21(1), 33–41 (1984)

    Article  Google Scholar 

  19. Vinnakota, T.: A cybernetics paradigms framework for cyberspace: key lens to cybersecurity. In: IEEE International Conference on Computational Intelligence and Cybernetics, pp. 85–91 (2013)

    Google Scholar 

  20. Bada, M., Sasse, A.M., Nurse, J.R.C.: Cyber security awareness campaigns: why do they fail to change behaviour? arXiv preprint arXiv:1901.02672 (2019)

  21. Rayne Reid. V.N.J.: From information security to cyber security cultures. Inf. Secur. South Afr. IEEE 1–7 (2014)

    Google Scholar 

  22. Tonge, A.M.K.S.S.C.S.R.: Cyber security: challenges for society-literature review. IOSR J. Comput. Eng. 2(12), 67–75 (2013)

    Article  Google Scholar 

  23. Zhuge, H.: Multi-Dimensional Summarization in Cyber-Physical Society. Morgan Kaufman, Burlingtonn (2016)

    Google Scholar 

  24. Zhuge, H., Shi, X.: Toward the eco-grid: a harmoniously evolved interconnection environment. Commun. ACM 47(9), 78–83 (2004)

    Article  Google Scholar 

  25. Zhuge, H.: Future interconnection environment. Computer 38(4), 27–33 (2005)

    Article  Google Scholar 

  26. Zhuge, H.: Future interconnection environment–dream, principle, challenge and practice. In: International Conference on Web-Age Information Management, Berlin, Heidelberg: Springer (2004)

    Google Scholar 

  27. Jinhua, L., Xu, H., Zhou, X., Lin, F., An, J.: Research of cyberspace architecture. In: International Conference on Cyberspace Technology (CCT 2013), pp. 367–369 (2013)

    Google Scholar 

  28. Zhuge, H.: arXiv (2018). https://arxiv.org/abs/1805.00434. Accessed 12 Dec 2019

  29. Miller, R.A., Kuehl, D.T.: Cyberspace and the “First Battle” in 21st-century War. Defense Horizons 68(1), 1–6 (2009)

    Google Scholar 

  30. Czosseck, C., Geers, K.: Borders in cyberspace: can sovereignty adapt to the challenges of cyber security. In: The Virtual Battlefield: Perspectives on Cyber Warfare, vol. 3, no. 88 (2009)

    Google Scholar 

  31. Hao, Y., Guo, S., Zhao, H., Chen, Z.: Study on the modeling and analyzing of the role-based threats in the cyberspace. In: IEEE 2nd International Conference on Cloud Computing and Intelligence Systems 3, 1302–1306 (2012)

    Google Scholar 

  32. Security, I.: ZXForce Threat Intelligence Index. IBM Corporation, Armonk (2019)

    Google Scholar 

  33. Tàbara D., Saurí, D., Cerdan, R.: Forest fire risk management and public participation in changing socioenvironmental conditions: a case study in a Mediterranean region. Risk Anal. Int. J. 23(2), 249–260 (2003)

    Google Scholar 

  34. Lexico. https://www.lexico.com. Accessed 3 Dec 2019

  35. Techopedia Dictionary, https://www.techopedia.com/dictionary. Accessed 3 Dec 2019

  36. Merriam-Webster Dictionary. https://www.merriam-webster.com. Accessed 3 Dec 2019

  37. Oxford Learner’s Dictionary. https://www.oxfordlearnersdictionaries.com. Accessed 3 Dec 2019

  38. “Collin’s English Dictionary. https://www.collinsdictionary.com/dictionary/english. Accessed 3 Dec 2019

Download references

Acknowledgments

The research and Airbus Accelerator in Human-Centric Cyber Security (H2CS) is further supported by Endeavr Wales and Cardiff University. The second author (Dr Phillip Morgan) as Technical Lead, and the first author (Dr Phoebe Asquith) as a Cardiff University Research Associate working at Airbus.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Phillip L. Morgan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Asquith, P.M., Morgan, P.L. (2020). Representing a Human-Centric Cyberspace. In: Corradini, I., Nardelli, E., Ahram, T. (eds) Advances in Human Factors in Cybersecurity. AHFE 2020. Advances in Intelligent Systems and Computing, vol 1219. Springer, Cham. https://doi.org/10.1007/978-3-030-52581-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-52581-1_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-52580-4

  • Online ISBN: 978-3-030-52581-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics