Internet-related prefixes such as e- , i- , cyber- , info- , techno- and net- are added to a wide range of existing words to describe new, Internet- or computer-related flavors of existing concepts, often electronic products and services that already have a non-electronic counterpart. The adjective virtual is often used in a similar manner. [1] [2]
Cyber- is derived from "cybernetic", from the Greek κυβερνητικός 'steersman'. Examples: cyberspace , cyberlaw , cyberbullying , cybercrime , cyberwarfare , cyberterrorism , cybersex , and cyberdelic . It is commonly used for policies and politics regarding computer systems and networks (as in the above cases), but also for information technology products and services. Further examples:
E-, standing for electronic, is used in the terms e-mail , e-commerce , e-business , e-banking , e-sports , e-paper , e-cigarette , e-car , e-girl , e-reservation , and e-book . [1] [3]
The lowercase initial e prefix was used as early as 1994 by eWorld , Apple's online service.
i-, standing for internet, was used as early as 1994 by iVillage , an internet community site by and for women. [4] More recent examples include the BBC's iPlayer, and Google's former iGoogle service. It has even been used by companies not in the IT sector for their websites, such as Coca-Cola's now-defunct icoke.com.
Apple Inc. is especially connected to the i- prefix. They first employed it for the iMac line of computers starting in 1998, [5] and have since used it in many of their other product names, including iCal, iSync, iChat, iBook, iDVD, iLife, iMessage, iPod (and iPod Socks), iSight, iPhone , iWeb, iTunes , iCloud , and others. They have said it stands for "Internet". [6]
Promotional materials for the 2004 film I, Robot , inspired by Isaac Asimov's short-story collection of the same name, utilized a lowercase i as a cultural reference to the rising popularity at that time of the prefix in product names. [7]
The letter "i" was also used in the popular Nickelodeon show iCarly , as that show primarily uses the internet as its main theme, and to parodize the fact that Apple uses "i-" in almost all its products.[ citation needed ]
The word virtual is used in a similar way to the prefixes above, but it is an adjective instead of a prefix. For example, it is used in the terms virtual reality , virtual world , and virtual sex .
These prefixes are productive. Michael Quinion notes that most of these formations are nonce words that will never be seen again. He writes that new terms such as "e-health" are unneeded; in this case telemedicine already exists to describe the application of telecommunications to medicine. He similarly points out the redundancy of e-tail, e-commerce, and e-business. [3] Martin likewise characterizes many of these words as "fad words" and believes many will disappear once the technology that resulted in their coinage becomes better accepted and understood. For example, he writes, "when using computers becomes the standard way to do business, there will be no need to call it 'e-business' — it may be just 'business.'" [8]
There is some confusion over whether these prefixes should be hyphenated and/or in upper case. In the case of e-mail, it was originally hyphenated and lowercase in general usage, but the hyphen is no longer common. [9]
In 1999, Michael Quinion attributed the forms "email", "E-mail" and "Email" to uncertainty on the parts of newer Internet users. [3] In 2003, Ronald Smith prescribed that the e- should always be lowercase and hyphenated. [10] In 2013, the Associated Press Stylebook removed the hyphen from "e-mail", following the general usage of the word. [9]
The term 'cybernetics' was used in Norbert Wiener's book Cybernetics or Control and Communication in the Animal and the Machine (MIT Press, 1948). Wiener used the term in reference to the control of complex systems in the animal world and in mechanical networks, in particular self-regulating control systems. By 1960, doctors were performing research into surgically or mechanically augmenting humans or animals to operate machinery in space, leading to the coining of the term "cyborg", for "cybernetic organism".
In 1965, the ABPC The Avengers television series introduced artificial humanoids called Cybernauts. In 1966, the BBC Doctor Who serial The Tenth Planet introduced a monster called cybermen.
Fred J Cook (Winner of the 1961 Hillman Award) in his 1966 book "The Corrupted Land : The Social Morality of Modern America" introduces his book with "such ideals as free enterprise, 'rugged individualism' and laissez faire are anachronisms in this age of CYBERNATION."
By the 1970s, the Control Data Corporation (CDC) sold the "Cyber" range of supercomputers, establishing the word cyber- as synonymous with computing. Robert Trappl credits William Gibson and his novel Neuromancer with triggering a "cyber- prefix flood" in the 1980s. [11]
McFedries observes that a backlash against the use of e- and cyber- can be traced to the late 1990s, quoting Hale and Scanlon requesting writers in 1999 to "resist the urge to use this vowel-as-cliché" when it comes to e- and calling cyber- "terminally overused". [2] [12]
A comparable usage from outside the English language is the Japanese prefix denki (電気), meaning electricity, which was used in Meiji-era Japan to denote products exhibiting a Western sensibility. [13]
Cyberspace is an interconnected digital environment. It is a type of virtual world popularized with the rise of the Internet. The term entered popular culture from science fiction and the arts but is now used by technology strategists, security professionals, governments, military and industry leaders and entrepreneurs to describe the domain of the global technology environment, commonly defined as standing for the global network of interdependent information technology infrastructures, telecommunications networks and computer processing systems. Others consider cyberspace to be just a notional environment in which communication over computer networks occurs. The word became popular in the 1990s when the use of the Internet, networking, and digital communication were all growing dramatically; the term cyberspace was able to represent the many new ideas and phenomena that were emerging. As a social experience, individuals can interact, exchange ideas, share information, provide social support, conduct business, direct actions, create artistic media, play games, engage in political discussion, and so on, using this global network. Cyberspace users are sometimes referred to as cybernauts.
The hyphen‐ is a punctuation mark used to join words and to separate syllables of a single word. The use of hyphens is called hyphenation.
Cybersex, also called computer sex, Internet sex, netsex, e-sex and, colloquially, cyber or cybering, is a virtual sex encounter in which two or more people have long distance sex via electronic video communication and other electronics connected to a computer network.
Teledildonics is the name coined for virtual sex encounters using networked electronic sex toys to mimic and extend human sexual interaction. The term became known after technology critic and writer Howard Rheingold used it in his 1991 book Virtual Reality. In the publication, Rheingold made futuristic conclusions and summaries surrounding technology and used the term 'teledildonics' to refer to remote sexual activity using technology. Nowadays, the term is commonly used to describe remote sex, where tactile sensations are communicated over a remote connection between the participants. The term can also refer to the integration of telepresence with sexual activity that these interfaces make possible and can be used in conjunction or interchangeably with sex-technology. The term has also been used less accurately to refer to robotic sex, i.e., computer-controlled sex toys that aim to substitute for or improve upon sex with a human partner. Nowadays, it is commonly used to refer to Bluetooth-enabled sex toys.
Computer-mediated communication (CMC) is defined as any human communication that occurs through the use of two or more electronic devices. While the term has traditionally referred to those communications that occur via computer-mediated formats, it has also been applied to other forms of text-based interaction such as text messaging. Research on CMC focuses largely on the social effects of different computer-supported communication technologies. Many recent studies involve Internet-based social networking supported by social software.
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.
Cyber- is a prefix derived from 'cybernetic,' used in terms relating to computers, technology, networks, and others.
Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. Emerging alongside the development of information technology, cyberterrorism involves acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet by means of tools such as computer viruses, computer worms, phishing, malicious software, hardware methods, and programming scripts can all be forms of internet terrorism. Some authors opt for a very narrow definition of cyberterrorism, relating to deployment by known terrorist organizations of disruption attacks against information systems for the primary purpose of creating alarm, panic, or physical disruption. Other authors prefer a broader definition, which includes cybercrime. Participating in a cyberattack affects the terror threat perception, even if it isn't done with a violent approach. By some definitions, it might be difficult to distinguish which instances of online activities are cyberterrorism or cybercrime.
The Australian High Tech Crime Centre (AHTCC) are hosted by the Australian Federal Police (AFP) at their headquarters in Canberra. Under the auspices of the AFP, the AHTCC is party to the formal Joint Operating Arrangement established between the AFP, the Australian Security Intelligence Organisation and the Computer Network Vulnerability Team of the Australian Signals Directorate.
The Convention on Cybercrime, also known as the Budapest Convention on Cybercrime or the Budapest Convention, is the first international treaty seeking to address Internet and computer crime (cybercrime) harmonizing national laws, improving investigative techniques, and increasing cooperation among nations. It was drawn up by the Council of Europe in Strasbourg, France, with the active participation of the Council of Europe's observer states Canada, Japan, the Philippines, South Africa and the United States.
Stuart Anspach Umpleby is an American cybernetician and professor in the Department of Management and Director of the Research Program in Social and Organizational Learning in the School of Business at the George Washington University.
Osaka Electro-Communication University, OECU is a private university in Japan. The main campus is located in Neyagawa-shi, Osaka Prefecture.
There is no commonly agreed single definition of “cybercrime”. It refers to illegal internet-mediated activities that often take place in global electronic networks. Cybercrime is "international" or "transnational" – there are ‘no cyber-borders between countries'. International cybercrimes often challenge the effectiveness of domestic and international law, and law enforcement. Because existing laws in many countries are not tailored to deal with cybercrime, criminals increasingly conduct crimes on the Internet in order to take advantages of the less severe punishments or difficulties of being traced.
The Cybercrime Prevention Act of 2012, officially recorded as Republic Act No. 10175, is a law in the Philippines that was approved by President Benigno Aquino III on September 12, 2012. It aims to address legal issues concerning online interactions and the Internet in the Philippines. Among the cybercrime offenses included in the bill are cybersquatting, cybersex, child pornography, identity theft, illegal access to data and libel.
Pharmacocybernetics is an upcoming field that describes the science of supporting drugs and medications use through the application and evaluation of informatics and internet technologies, so as to improve the pharmaceutical care of patients. It is an interdisciplinary field that integrates the domains of medicine and pharmacy, computer sciences and psychological sciences to design, develop, apply and evaluate technological innovations which improve drugs and medications management, as well as prevent or solve drug-related problems.
A Master of Science in Cyber Security is a type of postgraduate academic master's degree awarded by universities in many countries. This degree is typically studied for in cyber security. What is offered by many institutions is actually called a Master in Strategic Cyber Operations and Information Management (SCOIM) which is commonly understood to be a Master in Cybersecurity. This degree is offered by at least some universities in their Professional Studies program so that it can be accomplished while students are employed - in other words it allows for "distance learning" or online attendance. Requirements for the Professional Studies program include: 3.0 or better undergrad GPA, professional recommendations letters and an essay.
The Magna Carta for Philippine Internet Freedom is an internet law bill filed in the Congress of the Philippines. The bill contains provisions promoting civil and political rights and Constitutional guarantees for Philippine internet users, such as freedom of expression, as well as provisions on information and communications technology (ICT) policy, ICT4D, internet governance, e-governance, cybersecurity, cyberwarfare, cyberterrorism, and cybercrime.
Cybernetic art is contemporary art that builds upon the legacy of cybernetics, where feedback involved in the work takes precedence over traditional aesthetic and material concerns. The relationship between cybernetics and art can be summarised in three ways: cybernetics can be used to study art, to create works of art or may itself be regarded as an art form in its own right.
Ghana has one of the highest rates of cybercrime in the world, ranking 7th in a 2008 Internet Crime Survey. The most popular form of cybercrime in Ghana is cyberfraud and is typically achieved via credit card fraud. However, recent decreases in universal credit card usage has seen the expansion of other cybercrimes such as blackmail and hacking. This growth in crime has warranted a government response, with policies specifically addressing the cyberspace being developed. This has necessitated various studies including a cyber security maturity study which was inaugurated by the Ministry of Communications and conducted by the Global Cyber Security Capacity Center (GCSCC) of the University of Oxford in collaboration with the World Bank.
Cybersex trafficking, live streaming sexual abuse, webcam sex tourism/abuse or ICTs -facilitated sexual exploitation is a cybercrime involving sex trafficking and the live streaming of coerced sexual acts and/or rape on webcam.
電気がめずらしい明治の頃、目新しいものというと"電気○○○"などと呼ばれ、舶来のハイカラ品と人々の関心を集めていました [In the Meiji era, when electricity was uncommon, the word for electricity (denki) was used as a prefix for new products to give them a stylish, imported feel.]