The Vocabularist: How We Use The Word ‘Cyber’

The prefix "cyber-" is now a handy way of denoting words to do with the Internet - from cybercrime, cyberbullying and cybersecurity to improbable activities such as cybersnogging. It followed an eventful path to reach its modern meaning.

In ancient Greek kubernao meant "steer a ship" and kubernetes was a steersman. Homer tells how the gods smote Odysseus's ship, so that the toppling mast crushed the steersman's head (kuberneteo kephalen).

The normal Latin transliteration of kubernetes gives us "cybernetes" - though practical seafaring Romans worried less about the rules and turned kubernao into guberno, from which we get "govern".

Plato used "kubernetika" to mean skill in steering, and in the 1940s the American mathematician, Norbert Wiener, derived from it "cybernetics" to mean "control and communication theory, whether in the machine or in the animal".

In the popular imagination the term cybernetics and therefore cyber- became associated especially with humanoid robots, or similar controlled creatures such as the Cybermen, who first appeared in Doctor Who in 1966.

Cyber- words became a popular theme to do with robots or near-robots, including Dr Who's enemies the cybermen. In The Hitchhiker's Guide to the Galaxy (1978) the Sirius Cybernetics Corporation calls a robot "Your Plastic Pal Who's Fun To Be With".

The progression from ancient helmsman to comic robot is clear enough and the common theme is control. But how did cyber- go on to its present association with the Internet? The link is the term "cyberspace" - the virtual electronic world in which we explore, play, learn and share information.

Theoreticians of cyberspace such as Howard Rheingold acknowledge that the word comes from the science fiction writing of William Gibson, particularly his 1984 novel Neuromancer.

Its hero longs to return to the online world from which he has been banished, and the book lyrically describes virtual reality folding "through a dozen impossible angles, tumbling away into cyberspace like an origami crane".

But Gibson's account of how he coined the term cyberspace contains a lesson for anyone who reads too much into the derivations of words.

He tells how he needed a "really hot name" for the arena in which his stories would be set, and cyberspace "sounded like it meant something or it might mean something, but as I stared at it, my whole delight was that I knew it meant absolutely nothing".

If he had fancied instead something like "infosphere" or "digiworld", our terminology might be very different.

BBC: http://bbc.in/21t2C6h

« Google's AI Wins Final Go Challenge
AI Is Closer Than We Know… »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CERT.hr

CERT.hr

CERT.hr is the national authority competent for prevention and protection from computer threats to public information systems in the Republic of Croatia.

Beyond Security

Beyond Security

Beyond Security is a leader in automated vulnerability assessment and compliance solutions - enabling customers to accurately assess and manage security weaknesses in their networks and applications.

Secure-NOK

Secure-NOK

Secure-NOK provides products and solutions that detect and remove security attacks and harmful events in industrial networks and control systems.

Salient CRGT

Salient CRGT

Salient CRGT is a leading provider of health, data analytics, cloud, agile software development, mobility, cyber security, and infrastructure solutions.

DirectDefense

DirectDefense

DirectDefense is an information security services and managed services provider.

Valtori

Valtori

Government ICT Centre Valtori provides sector-independent ICT services for the central government, while taking into account the special requirements related to security and preparedness.

Council of Europe Convention on Cybercrime

Council of Europe Convention on Cybercrime

The Council of Europe helps to protect societies worldwide from the threat of cybercrime through the Convention on Cybercrime.

TechBeacon

TechBeacon

TechBeacon.com is a digital hub by and for software engineering, IT and security professionals sharing practical and passionate guidance to real-world challenges.

Red Alert Labs

Red Alert Labs

Red Alert Labs is an IoT security provider. We created an independent security lab with a disruptive business offer to solve the technical and commercial challenges in IoT.

Intechtel

Intechtel

Intechtel is a cyber security company, in addition to providing other internet, technology and telephone services.

Inveteck Global

Inveteck Global

Inveteck Global is a Ghana-based cyber security firm providing strategic guidance and technical solutions to all our clients to best serve their individual needs.

Kiteworks

Kiteworks

Kiteworks (formerly Accellion) creates a dedicated Private Content Network that ensures zero-trust private content protection and compliance.

HiddenLayer

HiddenLayer

HiddenLayer is a provider of security solutions for machine learning algorithms, models and the data that power them.

Core to Cloud

Core to Cloud

Core to Cloud provide consultancy and technical support for the planning and implementation of sustainable security strategies.

Cyber Octet

Cyber Octet

Cyber Octet is an IT Solution, Security, Training and Services company. We provide training and services from Web Application Security to ISO 27001 implementation.

Interlock

Interlock

Interlock are building blockchain-based security products that solve legacy web2 security issues - phishing and social engineering.