The Vocabularist: How We Use The Word ‘Cyber’

The prefix "cyber-" is now a handy way of denoting words to do with the Internet - from cybercrime, cyberbullying and cybersecurity to improbable activities such as cybersnogging. It followed an eventful path to reach its modern meaning.

In ancient Greek kubernao meant "steer a ship" and kubernetes was a steersman. Homer tells how the gods smote Odysseus's ship, so that the toppling mast crushed the steersman's head (kuberneteo kephalen).

The normal Latin transliteration of kubernetes gives us "cybernetes" - though practical seafaring Romans worried less about the rules and turned kubernao into guberno, from which we get "govern".

Plato used "kubernetika" to mean skill in steering, and in the 1940s the American mathematician, Norbert Wiener, derived from it "cybernetics" to mean "control and communication theory, whether in the machine or in the animal".

In the popular imagination the term cybernetics and therefore cyber- became associated especially with humanoid robots, or similar controlled creatures such as the Cybermen, who first appeared in Doctor Who in 1966.

Cyber- words became a popular theme to do with robots or near-robots, including Dr Who's enemies the cybermen. In The Hitchhiker's Guide to the Galaxy (1978) the Sirius Cybernetics Corporation calls a robot "Your Plastic Pal Who's Fun To Be With".

The progression from ancient helmsman to comic robot is clear enough and the common theme is control. But how did cyber- go on to its present association with the Internet? The link is the term "cyberspace" - the virtual electronic world in which we explore, play, learn and share information.

Theoreticians of cyberspace such as Howard Rheingold acknowledge that the word comes from the science fiction writing of William Gibson, particularly his 1984 novel Neuromancer.

Its hero longs to return to the online world from which he has been banished, and the book lyrically describes virtual reality folding "through a dozen impossible angles, tumbling away into cyberspace like an origami crane".

But Gibson's account of how he coined the term cyberspace contains a lesson for anyone who reads too much into the derivations of words.

He tells how he needed a "really hot name" for the arena in which his stories would be set, and cyberspace "sounded like it meant something or it might mean something, but as I stared at it, my whole delight was that I knew it meant absolutely nothing".

If he had fancied instead something like "infosphere" or "digiworld", our terminology might be very different.

BBC: http://bbc.in/21t2C6h

« Google's AI Wins Final Go Challenge
AI Is Closer Than We Know… »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ForgeRock

ForgeRock

ForgeRock, the leader in digital identity, delivers comprehensive Identity and Access Management solutions for consumers, employees and things to simply and safely access the connected world.

Boxcryptor

Boxcryptor

Boxcryptor encrypts your sensitive files before uploading them to cloud storage services.

ASU Online - Information Technology Program

ASU Online - Information Technology Program

The Information Technology program at ASU Online provides you with the expertise to design, select, implement and administer computer-based information solutions.

Swedish Civil Contingencies Agency (MSB)

Swedish Civil Contingencies Agency (MSB)

MSB's Information Assurance Department is responsible for supporting and coordinating work relating to Sweden's national societal information security.

Ezenta

Ezenta

Ezenta is a Danish IT security consulting firm.

Business Continuity

Business Continuity

Business Continuity delivers integrated IT solutions for cybersecurity, virtualization, cloud platforms and operational security solutions.

4Stop

4Stop

4Stop is a global KYC, compliance and anti-fraud risk management company.

Cloudentity

Cloudentity

Cloudentity combines Identity for all things with API and Application security in a unique deployment model, combining cloud-transformation and legacy systems.

Liberty Mutual

Liberty Mutual

Liberty Specialty Markets offers specialty and commercial insurance and reinsurance products, including Cyber, across the USA, Europe, Middle East and other international locations.

INE

INE

INE is a premier provider of Technical Training for the IT industry.

BridgingMinds Network

BridgingMinds Network

BridgingMinds Network is an industry leading best practices and IT security training provider in Singapore.

Exterro

Exterro

Exterro is a leading provider of e-discovery and information governance software specifically designed for in-house legal, privacy and IT teams at Global 2000 and Am Law 200 organizations.

Logically.ai

Logically.ai

Logically combines artificial intelligence with expert analysts to tackle harmful and manipulative content at speed and scale.

Trojan Horse Security

Trojan Horse Security

Trojan Horse Security are specialists in corporate security. Our services include: Comprehensive Cyber Security Analysis, Penetration Testing, Network Security and Security Audits.

Onum

Onum

Onum helps security and IT leaders focus on the data that's most important. Gain control of your data by cutting through the noise for deep insights in real time.

Advanced IT

Advanced IT

Reliable managed IT Security & support services that will help you take your business operations to the next level without breaking the bank!