Internet-related prefixes

Last updated

Internet-related prefixes such as e- , i- , cyber- , info- , techno- and net- are added to a wide range of existing words to describe new, Internet- or computer-related flavors of existing concepts, often electronic products and services that already have a non-electronic counterpart. The adjective virtual is often used in a similar manner. [1] [2]

Contents

Cyber-, e-, i, and virtual

"Cyber-"

Cyber- is derived from "cybernetic", from the Greek κυβερνητικός 'steersman'. Examples: cyberspace , cyberlaw , cyberbullying , cybercrime , cyberwarfare , cyberterrorism , cybersex , and cyberdelic . It is commonly used for policies and politics regarding computer systems and networks (as in the above cases), but also for information technology products and services. Further examples:

"E-"

E-, standing for electronic, is used in the terms e-mail , e-commerce , e-business , e-banking , e-sports , e-paper , e-cigarette , e-car , e-girl , e-reservation , and e-book . [1] [3]

The lowercase initial e prefix was used as early as 1994 by eWorld , Apple's online service.

"i-"

The i- prefix was used in 1964 in In Watermelon Sugar, Richard Brautigan's American postmodern post-apocalyptic novel published in 1968. Set in the aftermath of a fallen civilization, it focuses on a commune organized around a central gathering house which is named "iDEATH" [4] [ circular reference ] [5] The i- prefix was used as early as 1994 by iVillage , an internet community site by and for women. [6] More recent examples include the BBC's iPlayer, and Google's former iGoogle service. It has even been used by companies not in the IT sector for their websites, such as Coca-Cola's now-defunct icoke.com.

Apple Inc. is especially connected to the i- prefix. They first employed it for the iMac line of computers starting in 1998, [7] and have since used it in many of their other product names, including iCal, iSync, iChat, iBook, iDVD, iLife, iMessage, iPod (and iPod Socks), iSight, iPhone , iWeb, iTunes , iCloud , and others. They have said it stands for "Internet". [8]

Promotional materials for the 2004 film I, Robot , inspired by Isaac Asimov's short-story collection of the same name, utilized a lowercase i as a cultural reference to the rising popularity at that time of the prefix in product names. [9]

The letter "i" was also used in the popular Nickelodeon show iCarly , as that show primarily uses the internet as its main theme and to parodize the fact that Apple uses "i-" in almost all its products.

"Virtual"

The word virtual is used in a similar way to the prefixes above, but it is an adjective instead of a prefix. For example, it is used in the terms virtual reality , virtual world , and virtual sex .

Linguistic behaviour

These prefixes are productive. Michael Quinion notes that most of these formations are nonce words that will never be seen again. He writes that new terms such as "e-health" are unneeded; in this case telemedicine already exists to describe the application of telecommunications to medicine. He similarly points out the redundancy of e-tail, e-commerce, and e-business. [3] Martin likewise characterizes many of these words as "fad words" and believes many will disappear once the technology that resulted in their coinage becomes better accepted and understood. For example, he writes, "when using computers becomes the standard way to do business, there will be no need to call it 'e-business' it may be just 'business.'" [10]

Spelling controversies

There is some confusion over whether these prefixes should be hyphenated and/or in upper case. In the case of e-mail, it was originally hyphenated and lowercase in general usage, but the hyphen is no longer common. [11]

In 1999, Michael Quinion attributed the forms "email", "E-mail" and "Email" to uncertainty on the parts of newer Internet users. [3] In 2003, Ronald Smith prescribed that the e- should always be lowercase and hyphenated. [12] In 2013, the Associated Press Stylebook removed the hyphen from "e-mail", following the general usage of the word. [11]

History

The term 'cybernetics' was used in Norbert Wiener's book Cybernetics or Control and Communication in the Animal and the Machine (MIT Press, 1948). Wiener used the term in reference to the control of complex systems in the animal world and in mechanical networks, in particular self-regulating control systems. By 1960, doctors were performing research into surgically or mechanically augmenting humans or animals to operate machinery in space, leading to the coining of the term "cyborg", for "cybernetic organism".

In 1965, the ABPC The Avengers television series introduced artificial humanoids called Cybernauts. In 1966, the BBC Doctor Who serial The Tenth Planet introduced a monster called cybermen.

Fred J Cook (Winner of the 1961 Hillman Award) in his 1966 book "The Corrupted Land : The Social Morality of Modern America" introduces his book with "such ideals as free enterprise, 'rugged individualism' and laissez faire are anachronisms in this age of CYBERNATION."

By the 1970s, the Control Data Corporation (CDC) sold the "Cyber" range of supercomputers, establishing the word cyber- as synonymous with computing. Robert Trappl credits William Gibson and his novel Neuromancer with triggering a "cyber- prefix flood" in the 1980s. [13]

McFedries observes that a backlash against the use of e- and cyber- can be traced to the late 1990s, quoting Hale and Scanlon requesting writers in 1999 to "resist the urge to use this vowel-as-cliché" when it comes to e- and calling cyber- "terminally overused". [2] [14]

A comparable usage from outside the English language is the Japanese prefix denki (電気), meaning electricity, which was used in Meiji-era Japan to denote products exhibiting a Western sensibility. [15]

Related Research Articles

<span class="mw-page-title-main">Camel case</span> Writing words with internal uppercase letters

Camel case is the practice of writing phrases without spaces or punctuation and with capitalized words. The format indicates the first word starting with either case, then the following words having an initial uppercase letter. Common examples include YouTube, PowerPoint, HarperCollins, FedEx, iPhone, eBay, and LaGuardia. Camel case is often used as a naming convention in computer programming. It is also sometimes used in online usernames such as JohnSmith, and to make multi-word domain names more legible, for example in promoting EasyWidgetCompany.com.

<span class="mw-page-title-main">Cyberspace</span> Concept describing a widespread, interconnected digital technology

Cyberspace is an interconnected digital environment. It is a type of virtual world popularized with the rise of the Internet. The term entered popular culture from science fiction and the arts but is now used by technology strategists, security professionals, governments, military and industry leaders and entrepreneurs to describe the domain of the global technology environment, commonly defined as standing for the global network of interdependent information technology infrastructures, telecommunications networks and computer processing systems. Others consider cyberspace to be just a notional environment in which communication over computer networks occurs. The word became popular in the 1990s when the use of the Internet, networking, and digital communication were all growing dramatically; the term cyberspace was able to represent the many new ideas and phenomena that were emerging. As a social experience, individuals can interact, exchange ideas, share information, provide social support, conduct business, direct actions, create artistic media, play games, engage in political discussion, and so on, using this global network. Cyberspace users are sometimes referred to as cybernauts.

Cybersex, also called computer sex, Internet sex, netsex, e-sex and, colloquially, cyber or cybering, is a virtual sex encounter in which two or more people have long distance sex via electronic video communication and other electronics connected to a computer network.

Teledildonics is the name coined for virtual sex encounters using networked electronic sex toys to mimic and extend human sexual interaction. The term became known after technology critic and writer Howard Rheingold used it in his 1991 book Virtual Reality. In the publication, Rheingold made futuristic conclusions and summaries surrounding technology and used the term 'teledildonics' to refer to remote sexual activity using technology. Nowadays, the term is commonly used to describe remote sex, where tactile sensations are communicated over a remote connection between the participants. The term can also refer to the integration of telepresence with sexual activity that these interfaces make possible and can be used in conjunction or interchangeably with sex-technology. The term has also been used less accurately to refer to robotic sex, i.e., computer-controlled sex toys that aim to substitute for or improve upon sex with a human partner. Nowadays, it is commonly used to refer to Bluetooth-enabled sex toys.

Computer-mediated communication (CMC) is defined as any human communication that occurs through the use of two or more electronic devices. While the term has traditionally referred to those communications that occur via computer-mediated formats, it has also been applied to other forms of text-based interaction such as text messaging. Research on CMC focuses largely on the social effects of different computer-supported communication technologies. Many recent studies involve Internet-based social networking supported by social software.

<span class="mw-page-title-main">Cybercrime</span> Type of crime based in computer networks

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.

<span class="mw-page-title-main">Letter case</span> Uppercase or lowercase

Letter case is the distinction between the letters that are in larger uppercase or capitals and smaller lowercase in the written representation of certain languages. The writing systems that distinguish between the upper- and lowercase have two parallel sets of letters: each in the majuscule set has a counterpart in the minuscule set. Some counterpart letters have the same shape, and differ only in size, but for others the shapes are different. The two case variants are alternative representations of the same letter: they have the same name and pronunciation and are typically treated identically when sorting in alphabetical order.

Cyber- is an Internet-related prefix, used in a number of terms.

The Australian High Tech Crime Centre (AHTCC) are hosted by the Australian Federal Police (AFP) at their headquarters in Canberra. Under the auspices of the AFP, the AHTCC is party to the formal Joint Operating Arrangement established between the AFP, the Australian Security Intelligence Organisation and the Computer Network Vulnerability Team of the Australian Signals Directorate.

Hungarian orthography consists of rules defining the standard written form of the Hungarian language. It includes the spelling of lexical words, proper nouns and foreign words (loanwords) in themselves, with suffixes, and in compounds, as well as the hyphenation of words, punctuation, abbreviations, collation, and other information.

<span class="mw-page-title-main">Convention on Cybercrime</span> 2001 international treaty on cybercrime

The Convention on Cybercrime, also known as the Budapest Convention on Cybercrime or the Budapest Convention, is the first international treaty seeking to address Internet and computer crime (cybercrime) by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations. It was drawn up by the Council of Europe in Strasbourg, France, with the active participation of the Council of Europe's observer states Canada, Japan, the Philippines, South Africa and the United States.

<span class="mw-page-title-main">Stuart Umpleby</span>

Stuart Anspach Umpleby is an American cybernetician and professor in the Department of Management and Director of the Research Program in Social and Organizational Learning in the School of Business at the George Washington University.

<span class="mw-page-title-main">Osaka Electro-Communication University</span>

Osaka Electro-Communication University, OECU is a private university in Japan. The main campus is located in Neyagawa-shi, Osaka Prefecture.

There is no commonly agreed single definition of “cybercrime”. It refers to illegal internet-mediated activities that often take place in global electronic networks. Cybercrime is "international" or "transnational" – there are ‘no cyber-borders between countries'. International cybercrimes often challenge the effectiveness of domestic and international law, and law enforcement. Because existing laws in many countries are not tailored to deal with cybercrime, criminals increasingly conduct crimes on the Internet in order to take advantages of the less severe punishments or difficulties of being traced.

<span class="mw-page-title-main">Cybercrime Prevention Act of 2012</span> Law in the Philippines

The Cybercrime Prevention Act of 2012, officially recorded as Republic Act No. 10175, is a law in the Philippines that was approved on September 12, 2012. It aims to address legal issues concerning online interactions and the Internet in the Philippines. Among the cybercrime offenses included in the bill are cybersquatting, cybersex, child pornography, identity theft, illegal access to data and libel.

Pharmacocybernetics is an upcoming field that describes the science of supporting drugs and medications use through the application and evaluation of informatics and internet technologies, so as to improve the pharmaceutical care of patients. It is an interdisciplinary field that integrates the domains of medicine and pharmacy, computer sciences and psychological sciences to design, develop, apply and evaluate technological innovations which improve drugs and medications management, as well as prevent or solve drug-related problems.

A Master of Science in Cyber Security is a type of postgraduate academic master's degree awarded by universities in many countries. This degree is typically studied for in cyber security. What is offered by many institutions is actually called a Master in Strategic Cyber Operations and Information Management (SCOIM) which is commonly understood to be a Master in Cybersecurity. This degree is offered by at least some universities in their Professional Studies program so that it can be accomplished while students are employed - in other words it allows for "distance learning" or online attendance. Requirements for the Professional Studies program include: 3.0 or better undergrad GPA, professional recommendations letters and an essay.

<span class="mw-page-title-main">Magna Carta for Philippine Internet Freedom</span>

The Magna Carta for Philippine Internet Freedom is an internet law bill filed in the Congress of the Philippines. The bill contains provisions promoting civil and political rights and Constitutional guarantees for Philippine internet users, such as freedom of expression, as well as provisions on information and communications technology (ICT) policy, ICT4D, internet governance, e-governance, cybersecurity, cyberwarfare, cyberterrorism, and cybercrime.

Cybernetic art is contemporary art that builds upon the legacy of cybernetics, where feedback involved in the work takes precedence over traditional aesthetic and material concerns. The relationship between cybernetics and art can be summarised in three ways: cybernetics can be used to study art, to create works of art or may itself be regarded as an art form in its own right.

Cybersex trafficking, live streaming sexual abuse, webcam sex tourism/abuse or ICTs -facilitated sexual exploitation is a cybercrime involving sex trafficking and the live streaming of coerced sexual acts and/or rape on webcam.

References

  1. 1 2 Straubhaar, Joseph; LaRose, Robert (2004). Media Now: Understanding Media, Culture, and Technology. Thomson Learning. p. 6. ISBN   7-302-09576-0.
  2. 1 2 McFedries, Paul (2004-07-30). "The (Pre) Fix Is In". IEEE Spectrum.
  3. 1 2 3 Quinion, Michael (1999-01-16). "THE E- netcsPREFIX". World Wide Words.
  4. "In Watermelon Sugar".
  5. "In Watermelon Sugar | novel by Brautigan".
  6. "The Most Influential Women in Technology 2010 - Tina Sharkey". Fast Company. 25 March 2010. Retrieved 11 December 2013.
  7. Vaughn, Paul, "The Mac Guy: Potential buyer wants big sound, and he can have it," Archived 2007-09-29 at the Wayback Machine April 21, 2007 at mysanantonio.com
  8. Manjoo, Farhad, "Grads Want to Study on EMacs, Too," April 30, 2002, wired.com
  9. I, Robot at IMDb OOjs UI icon edit-ltr-progressive.svg
  10. Martin, Rodney (2004). Young Writers Guide. Era Publications. p. 150. ISBN   1-74120-040-7.
  11. 1 2 "AP Removes Hyphen From 'Email' In Style Guide". TheHuffingtonPost.com. TheHuffingtonPost.com. 18 March 2011. Retrieved 2 May 2015.
  12. Smith, Ronald D. (2003). Becoming a Public Relations Writer: A Writing Process Workbook for the Profession . Lawrence Erlbaum Associates. p.  402. ISBN   0-8058-4260-8.
  13. Trappl, Robert (February 1998). "Preface". 14th European Meeting on Cybernetics and Systems Research (EMCSR'98), April 14 17, 1998 at the University of Vienna. Austrian Society for Cybernetic Studies. ISBN   3-85206-139-3.
  14. Hale, Constance; Scanlon, Jessie (1999). Wired Style: Principles of English Usage in the Digital Age . New York: Broadway Books. ISBN   9780767903721.
  15. デンキブランとは [What is Denki Bran?]. Kamiya Bar. Retrieved 25 August 2020. 電気がめずらしい明治の頃、目新しいものというと"電気○○○"などと呼ばれ、舶来のハイカラ品と人々の関心を集めていました [In the Meiji era, when electricity was uncommon, the word for electricity (denki) was used as a prefix for new products to give them a stylish, imported feel.]

Further reading