Cyber Cartography
نویسنده
چکیده
In this paper, I discuss how mapmaking has changed in the context of database structures, networks, the Internet, and virtual worlds. I examine what the mapping of cyberspaces can show us by considering recent cartographic projects, especially within a media arts context. When we attempt to draw a map of an unseen or previously unexamined, digitally-mediated territory, we are giving a visual form to an abstract system. As with any map, selecting the territory and the viewpoint from which to chart the territory represents the fi rst and most important step in creating the cyber map. This selectivity and subjectivity can often be the most interesting and useful aspect of the map.
منابع مشابه
Configurable IP-space maps for large-scale, multi-source network data visual analysis and correlation
The need to scale visualization of cyber (IP-space) data sets and analytic results as well as to support a variety of data sources and missions have proved challenging requirements for the development of a cyber common operating picture. Typical methods of visualizing IP-space data require unreliable domain conversions such as IP geolocation, network topology that is difficult to discover, or d...
متن کاملEnabling New Technologies for Cyber Security Defense with the ICAS Cyber Security Ontology
Distribution Statement ”A” (Approved for Public Release, Distribution Unlimited) Abstract—Incident response teams that are charged with breach discovery and containment face several challenges, the most important of which is access to pertinent data. Our TAPIO (Targeted Attack Premonition using Integrated Operational data) tool is designed to solve this problem by automatically extracting data ...
متن کاملCyber Risk Exposure and Prospects for Cyber Insurance
This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...
متن کاملThe Model of Structural Relationships of Cyber-Aggression Based on Family Communication Pattern with the Mediating Role of Addiction to Internet
Introduction: Family relationships play an incredibly important role in the lives of individuals and these relationships represent the most enduring social institution This study aimed the model of structural relations of cyber-aggression based on family communication pattern with the mediating role of addiction to Internet. Methods: This study was descriptive-correlational and the statistical...
متن کاملApplication of Stochastic Optimal Control, Game Theory and Information Fusion for Cyber Defense Modelling
The present paper addresses an effective cyber defense model by applying information fusion based game theoretical approaches. In the present paper, we are trying to improve previous models by applying stochastic optimal control and robust optimization techniques. Jump processes are applied to model different and complex situations in cyber games. Applying jump processes we propose some m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003