The Vocabularist: How We Use The Word ‘Cyber’

The prefix "cyber-" is now a handy way of denoting words to do with the Internet - from cybercrime, cyberbullying and cybersecurity to improbable activities such as cybersnogging. It followed an eventful path to reach its modern meaning.

In ancient Greek kubernao meant "steer a ship" and kubernetes was a steersman. Homer tells how the gods smote Odysseus's ship, so that the toppling mast crushed the steersman's head (kuberneteo kephalen).

The normal Latin transliteration of kubernetes gives us "cybernetes" - though practical seafaring Romans worried less about the rules and turned kubernao into guberno, from which we get "govern".

Plato used "kubernetika" to mean skill in steering, and in the 1940s the American mathematician, Norbert Wiener, derived from it "cybernetics" to mean "control and communication theory, whether in the machine or in the animal".

In the popular imagination the term cybernetics and therefore cyber- became associated especially with humanoid robots, or similar controlled creatures such as the Cybermen, who first appeared in Doctor Who in 1966.

Cyber- words became a popular theme to do with robots or near-robots, including Dr Who's enemies the cybermen. In The Hitchhiker's Guide to the Galaxy (1978) the Sirius Cybernetics Corporation calls a robot "Your Plastic Pal Who's Fun To Be With".

The progression from ancient helmsman to comic robot is clear enough and the common theme is control. But how did cyber- go on to its present association with the Internet? The link is the term "cyberspace" - the virtual electronic world in which we explore, play, learn and share information.

Theoreticians of cyberspace such as Howard Rheingold acknowledge that the word comes from the science fiction writing of William Gibson, particularly his 1984 novel Neuromancer.

Its hero longs to return to the online world from which he has been banished, and the book lyrically describes virtual reality folding "through a dozen impossible angles, tumbling away into cyberspace like an origami crane".

But Gibson's account of how he coined the term cyberspace contains a lesson for anyone who reads too much into the derivations of words.

He tells how he needed a "really hot name" for the arena in which his stories would be set, and cyberspace "sounded like it meant something or it might mean something, but as I stared at it, my whole delight was that I knew it meant absolutely nothing".

If he had fancied instead something like "infosphere" or "digiworld", our terminology might be very different.

BBC: http://bbc.in/21t2C6h

« Google's AI Wins Final Go Challenge
AI Is Closer Than We Know… »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Quotium

Quotium

Quotium provides automated testing technologies to make business software applications secure and robust.

Aporeto

Aporeto

The Aporeto platform protects cloud applications from attack by authenticating and authorizing all communications with a cryptographically signed identity assigned to every workload.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

Beryllium InfoSec Collaborative

Beryllium InfoSec Collaborative

Beryllium InfoSec Collaborative is an information security and cyber security company with 40-plus years of experience across industry & government.

Augusta HiTech

Augusta HiTech

Augusta Hitech is a focused product development, software services and technology consulting company. Our Vision is to become the most socially impactful and innovative technology company in the world

972VC

972VC

972VC was created to help entrepreneurs find potential funding for their startups. Your guide to the Israeli startup funding ecosystem.

usecure

usecure

usecure is a global provider of computer-based cyber security awareness training, offering the market’s most time-efficient, cost-effective and admin-lite solution for reducing insider threats.

A&O IT Group

A&O IT Group

A&O IT Group provide IT support and services including IT Managed Services, IT Project Services, IT Engineer Services and Cyber Security.

6clicks

6clicks

6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRAMP and many other standards.

GM Sectec

GM Sectec

GM Sectec is the world's largest independent Cyber Defense and Fraud Prevention firm laser focused on payment security.

CyberconIQ

CyberconIQ

CyberconIQ provide an integrated Human Defense Platform that reduces the probability and/or the cost of a cybersecurity breach by measurably improving our clients risk posture and compliance culture.

GetHacked.ca

GetHacked.ca

GetHackded.ca is a certified company offering penetration testing and specialized cybersecurity services.

Socura

Socura

Socura helps make the digital world a safer place; changing the way organisations think about cyber security through a dynamic, innovative, and human approach.

Techmentum

Techmentum

At Techmentum, our mission is to utilize technology to help companies succeed. Our expertise includes fully managed IT services, cybersecurity, cloud, and custom technology solutions.

Kralos

Kralos

Kralos are an experienced team of Software and IT experts, specialized in the development of innovative cybersecurity solutions.

Cybit

Cybit

Cybit is the one-stop-shop for digital transformation that scales in line with your growth.