dc.contributor.author |
Jansen van Vuuren, JC
|
|
dc.contributor.author |
Leenen, L
|
|
dc.contributor.author |
Grobler, MM
|
|
dc.contributor.author |
Chan, Ka Fai P
|
|
dc.contributor.author |
Dawood, Zubeida C
|
|
dc.date.accessioned |
2015-11-12T07:40:29Z |
|
dc.date.available |
2015-11-12T07:40:29Z |
|
dc.date.issued |
2015-03 |
|
dc.identifier.citation |
Jansen van Vuuren, JC, Leenen, L, Grobler, MM, Chan, KFP and Khan, ZA. 2015. Modelling the cybersecurity environment using morphological ontology design engineering. In: Proceedings of the 10th International Conference on Cyber Warfare and Security (ICCWS 2015), Skukuza Conference Centre, Kruger National Park, South Africa, 24-25 March 2015, 10pp. |
en_US |
dc.identifier.uri |
http://hdl.handle.net/10204/8270
|
|
dc.description |
Abstract Only. |
en_US |
dc.description.abstract |
Acquiring, representing, and managing knowledge effectively has a considerable impact on constructing accurate and intelligent systems. A challenge faced by domain experts is the manner in which information about the cybersecurity environment can be extracted and represented, seeing that it is messy problem with great uncertainty within the environment. To address this problem, this article presents a new methodology to model the cybersecurity environment: Morphological Ontology Design Engineering (MODE). This methodology is based on the combination of three different research methods, i.e. design science, general morphological analysis, and ontology based representation. General morphological analysis offers a solution for extracting meaningful information from domain experts, while ontology based representation is used to logically and accurately represent such information. On a high level, the design science methodology guides the entire process. When applied to the cybersecurity environment, the results reveal that the approach of using mixed methods is beneficial. The new hybrid methodology allows domain experts to solve a messy problem that has quantitative and qualitative information, long term and short term goals, as well as logical and empirical evidence. The main benefit of the general morphological analysis aspect of the methodology is the acquisition of meaningful information, and the main benefit of the ontological aspect of the methodology is the semantic representation of the information. This article demonstrates the new methodology by applying it to the cybersecurity domain, resulting in a cybersecurity ontology which can be used in support of implementing a South African cybersecurity policy. |
en_US |
dc.language.iso |
en |
en_US |
dc.relation.ispartofseries |
Worklist;15263 |
|
dc.subject |
Cybersecurity |
en_US |
dc.subject |
Design science |
en_US |
dc.subject |
General morphological analysis |
en_US |
dc.subject |
Morphological Ontology Design Engineering |
en_US |
dc.subject |
MODE |
en_US |
dc.subject |
Ontologies |
en_US |
dc.subject |
Research methodologies |
en_US |
dc.title |
Modelling the cybersecurity environment using morphological ontology design engineering |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Jansen van Vuuren, J., Leenen, L., Grobler, M., Chan, K., & Khan, Z. (2015). Modelling the cybersecurity environment using morphological ontology design engineering. http://hdl.handle.net/10204/8270 |
en_ZA |
dc.identifier.chicagocitation |
Jansen van Vuuren, JC, L Leenen, MM Grobler, KFP Chan, and ZA Khan. "Modelling the cybersecurity environment using morphological ontology design engineering." (2015): http://hdl.handle.net/10204/8270 |
en_ZA |
dc.identifier.vancouvercitation |
Jansen van Vuuren J, Leenen L, Grobler M, Chan K, Khan Z, Modelling the cybersecurity environment using morphological ontology design engineering; 2015. http://hdl.handle.net/10204/8270 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Jansen van Vuuren, JC
AU - Leenen, L
AU - Grobler, MM
AU - Chan, KFP
AU - Khan, ZA
AB - Acquiring, representing, and managing knowledge effectively has a considerable impact on constructing accurate and intelligent systems. A challenge faced by domain experts is the manner in which information about the cybersecurity environment can be extracted and represented, seeing that it is messy problem with great uncertainty within the environment. To address this problem, this article presents a new methodology to model the cybersecurity environment: Morphological Ontology Design Engineering (MODE). This methodology is based on the combination of three different research methods, i.e. design science, general morphological analysis, and ontology based representation. General morphological analysis offers a solution for extracting meaningful information from domain experts, while ontology based representation is used to logically and accurately represent such information. On a high level, the design science methodology guides the entire process. When applied to the cybersecurity environment, the results reveal that the approach of using mixed methods is beneficial. The new hybrid methodology allows domain experts to solve a messy problem that has quantitative and qualitative information, long term and short term goals, as well as logical and empirical evidence. The main benefit of the general morphological analysis aspect of the methodology is the acquisition of meaningful information, and the main benefit of the ontological aspect of the methodology is the semantic representation of the information. This article demonstrates the new methodology by applying it to the cybersecurity domain, resulting in a cybersecurity ontology which can be used in support of implementing a South African cybersecurity policy.
DA - 2015-03
DB - ResearchSpace
DP - CSIR
KW - Cybersecurity
KW - Design science
KW - General morphological analysis
KW - Morphological Ontology Design Engineering
KW - MODE
KW - Ontologies
KW - Research methodologies
LK - https://researchspace.csir.co.za
PY - 2015
T1 - Modelling the cybersecurity environment using morphological ontology design engineering
TI - Modelling the cybersecurity environment using morphological ontology design engineering
UR - http://hdl.handle.net/10204/8270
ER - |
en_ZA |