Abstract
There is a lack of consensus when using the term “cyberspace” [1]. Computers and network devices are prominent in definitions of cyberspace; less common is the essential and inclusion of human users. However, the human user is both implicitly integral to and actively part of the cyberspace.
Cyberspace is often conceptualized as three layers of interconnected networks: social, information and geospatial (physical) [2]. These represent an indirect human element within cyberspace. This is characteristic of related fields, such as cybersecurity, where human-centered research has been lagging behind technological aspects. A model that incorporates the human user in cyberspace is needed to direct future research and improve security and usability (navigation).
A new human-centric model of cyberspace is proposed (the HCCM), with the user as a physical and integral entity, together with recognition of the cognitive representation of cyberspace. It focuses on boundaries and transformation points between objects and spaces and offers a platform for future human-centric research in cybersecurity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kademi, A.M.A., Koltuksuz, A.: Formal characterization of cyberspace for cyber lexicon development. In: ECCWS 2017 16th European Conference on Cyber Warfare and Security, p. 200 (2017)
Bayne, J.: Cyberspatial mechanics. IEEE Trans. Syst. Man Cybern. Part B 38(3), 629–644 (2008)
Johnston, R.: Salvation or destruction: metaphors of the Internet. First Monday 14(4) (2009)
Gibson, W.: Neuromancer. Berkley Publishing group, New York (1989)
Madnick, S.E., Choucri, N., Camiña, S., Woon, W.L.: Tow (ards better understanding Cybersecurity: or are “Cyberspace” and “Cyber Space” the same? mit.edu (2014)
Mayer, M., Martino, L., Mazurier, P., Tzvetkova, G.: How would you define Cyberspace, First Draft Pisa, 19 (2014)
Kramer, F.D., Starr, S.H., Wentz, L.K.: Cyberpower and national security, Potomac Books Inc. Nebraska (2009)
Kautz (2010). https://www.slideshare.net/study4cyberwar/cyberspace-model. Accessed 1 Nov 2019
Rheingold, H.: The Virtual Community: Finding Connection in a Computerized World. Addison-Wesley Longman Publishing Co., Inc., Boston (1993)
Clement, J.: Facebook: number of monthly active users worldwide 2008–2019, Statista, 19 November 2019. https://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/. Accessed 7 Jan 2020
McLuhan, M.: Understanding Media: The Extensions of Man. MIT Press, Cambridge (1994)
Zylinska, J.: The Cyborg Experiments: The Extensions of the Body in the Media Age. A & C Black, London (2002)
Clark, A., Chalmers, D.J.: The extended mind. Analysis 58, 10–23 (1998)
Lessig, L.: The zones of cyberspace. Stanf. Law Rev. 48, 1403 (1995)
Ivkovic, D., Lotherington, H.: Multilingualism in cyberspace: conceptualising the virtual linguistic landscape. Int. J. Multilingualism 6(1), 17–36 (2009)
Leuprecht, C., Skillicorn, D.B., Tait, V.E.: Beyond the Castle Model of cyber-risk and cyber-security. Gov. Inf. Quart. 33(2), 250–257 (2016)
Wiener, N.: Cybernetics or Control and Communication in the Animal and the Machine. MIT Press, Cambridge (2019)
Duffy, P.R.: Cybernetics. J. Bus. Commun. 21(1), 33–41 (1984)
Vinnakota, T.: A cybernetics paradigms framework for cyberspace: key lens to cybersecurity. In: IEEE International Conference on Computational Intelligence and Cybernetics, pp. 85–91 (2013)
Bada, M., Sasse, A.M., Nurse, J.R.C.: Cyber security awareness campaigns: why do they fail to change behaviour? arXiv preprint arXiv:1901.02672 (2019)
Rayne Reid. V.N.J.: From information security to cyber security cultures. Inf. Secur. South Afr. IEEE 1–7 (2014)
Tonge, A.M.K.S.S.C.S.R.: Cyber security: challenges for society-literature review. IOSR J. Comput. Eng. 2(12), 67–75 (2013)
Zhuge, H.: Multi-Dimensional Summarization in Cyber-Physical Society. Morgan Kaufman, Burlingtonn (2016)
Zhuge, H., Shi, X.: Toward the eco-grid: a harmoniously evolved interconnection environment. Commun. ACM 47(9), 78–83 (2004)
Zhuge, H.: Future interconnection environment. Computer 38(4), 27–33 (2005)
Zhuge, H.: Future interconnection environment–dream, principle, challenge and practice. In: International Conference on Web-Age Information Management, Berlin, Heidelberg: Springer (2004)
Jinhua, L., Xu, H., Zhou, X., Lin, F., An, J.: Research of cyberspace architecture. In: International Conference on Cyberspace Technology (CCT 2013), pp. 367–369 (2013)
Zhuge, H.: arXiv (2018). https://arxiv.org/abs/1805.00434. Accessed 12 Dec 2019
Miller, R.A., Kuehl, D.T.: Cyberspace and the “First Battle” in 21st-century War. Defense Horizons 68(1), 1–6 (2009)
Czosseck, C., Geers, K.: Borders in cyberspace: can sovereignty adapt to the challenges of cyber security. In: The Virtual Battlefield: Perspectives on Cyber Warfare, vol. 3, no. 88 (2009)
Hao, Y., Guo, S., Zhao, H., Chen, Z.: Study on the modeling and analyzing of the role-based threats in the cyberspace. In: IEEE 2nd International Conference on Cloud Computing and Intelligence Systems 3, 1302–1306 (2012)
Security, I.: ZXForce Threat Intelligence Index. IBM Corporation, Armonk (2019)
Tàbara D., Saurí, D., Cerdan, R.: Forest fire risk management and public participation in changing socioenvironmental conditions: a case study in a Mediterranean region. Risk Anal. Int. J. 23(2), 249–260 (2003)
Lexico. https://www.lexico.com. Accessed 3 Dec 2019
Techopedia Dictionary, https://www.techopedia.com/dictionary. Accessed 3 Dec 2019
Merriam-Webster Dictionary. https://www.merriam-webster.com. Accessed 3 Dec 2019
Oxford Learner’s Dictionary. https://www.oxfordlearnersdictionaries.com. Accessed 3 Dec 2019
“Collin’s English Dictionary. https://www.collinsdictionary.com/dictionary/english. Accessed 3 Dec 2019
Acknowledgments
The research and Airbus Accelerator in Human-Centric Cyber Security (H2CS) is further supported by Endeavr Wales and Cardiff University. The second author (Dr Phillip Morgan) as Technical Lead, and the first author (Dr Phoebe Asquith) as a Cardiff University Research Associate working at Airbus.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Asquith, P.M., Morgan, P.L. (2020). Representing a Human-Centric Cyberspace. In: Corradini, I., Nardelli, E., Ahram, T. (eds) Advances in Human Factors in Cybersecurity. AHFE 2020. Advances in Intelligent Systems and Computing, vol 1219. Springer, Cham. https://doi.org/10.1007/978-3-030-52581-1_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-52581-1_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-52580-4
Online ISBN: 978-3-030-52581-1
eBook Packages: EngineeringEngineering (R0)