ResearchSpace

Modelling the cybersecurity environment using morphological ontology design engineering

Show simple item record

dc.contributor.author Jansen van Vuuren, JC
dc.contributor.author Leenen, L
dc.contributor.author Grobler, MM
dc.contributor.author Chan, Ka Fai P
dc.contributor.author Dawood, Zubeida C
dc.date.accessioned 2015-11-12T07:40:29Z
dc.date.available 2015-11-12T07:40:29Z
dc.date.issued 2015-03
dc.identifier.citation Jansen van Vuuren, JC, Leenen, L, Grobler, MM, Chan, KFP and Khan, ZA. 2015. Modelling the cybersecurity environment using morphological ontology design engineering. In: Proceedings of the 10th International Conference on Cyber Warfare and Security (ICCWS 2015), Skukuza Conference Centre, Kruger National Park, South Africa, 24-25 March 2015, 10pp. en_US
dc.identifier.uri http://hdl.handle.net/10204/8270
dc.description Abstract Only. en_US
dc.description.abstract Acquiring, representing, and managing knowledge effectively has a considerable impact on constructing accurate and intelligent systems. A challenge faced by domain experts is the manner in which information about the cybersecurity environment can be extracted and represented, seeing that it is messy problem with great uncertainty within the environment. To address this problem, this article presents a new methodology to model the cybersecurity environment: Morphological Ontology Design Engineering (MODE). This methodology is based on the combination of three different research methods, i.e. design science, general morphological analysis, and ontology based representation. General morphological analysis offers a solution for extracting meaningful information from domain experts, while ontology based representation is used to logically and accurately represent such information. On a high level, the design science methodology guides the entire process. When applied to the cybersecurity environment, the results reveal that the approach of using mixed methods is beneficial. The new hybrid methodology allows domain experts to solve a messy problem that has quantitative and qualitative information, long term and short term goals, as well as logical and empirical evidence. The main benefit of the general morphological analysis aspect of the methodology is the acquisition of meaningful information, and the main benefit of the ontological aspect of the methodology is the semantic representation of the information. This article demonstrates the new methodology by applying it to the cybersecurity domain, resulting in a cybersecurity ontology which can be used in support of implementing a South African cybersecurity policy. en_US
dc.language.iso en en_US
dc.relation.ispartofseries Worklist;15263
dc.subject Cybersecurity en_US
dc.subject Design science en_US
dc.subject General morphological analysis en_US
dc.subject Morphological Ontology Design Engineering en_US
dc.subject MODE en_US
dc.subject Ontologies en_US
dc.subject Research methodologies en_US
dc.title Modelling the cybersecurity environment using morphological ontology design engineering en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Jansen van Vuuren, J., Leenen, L., Grobler, M., Chan, K., & Khan, Z. (2015). Modelling the cybersecurity environment using morphological ontology design engineering. http://hdl.handle.net/10204/8270 en_ZA
dc.identifier.chicagocitation Jansen van Vuuren, JC, L Leenen, MM Grobler, KFP Chan, and ZA Khan. "Modelling the cybersecurity environment using morphological ontology design engineering." (2015): http://hdl.handle.net/10204/8270 en_ZA
dc.identifier.vancouvercitation Jansen van Vuuren J, Leenen L, Grobler M, Chan K, Khan Z, Modelling the cybersecurity environment using morphological ontology design engineering; 2015. http://hdl.handle.net/10204/8270 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Jansen van Vuuren, JC AU - Leenen, L AU - Grobler, MM AU - Chan, KFP AU - Khan, ZA AB - Acquiring, representing, and managing knowledge effectively has a considerable impact on constructing accurate and intelligent systems. A challenge faced by domain experts is the manner in which information about the cybersecurity environment can be extracted and represented, seeing that it is messy problem with great uncertainty within the environment. To address this problem, this article presents a new methodology to model the cybersecurity environment: Morphological Ontology Design Engineering (MODE). This methodology is based on the combination of three different research methods, i.e. design science, general morphological analysis, and ontology based representation. General morphological analysis offers a solution for extracting meaningful information from domain experts, while ontology based representation is used to logically and accurately represent such information. On a high level, the design science methodology guides the entire process. When applied to the cybersecurity environment, the results reveal that the approach of using mixed methods is beneficial. The new hybrid methodology allows domain experts to solve a messy problem that has quantitative and qualitative information, long term and short term goals, as well as logical and empirical evidence. The main benefit of the general morphological analysis aspect of the methodology is the acquisition of meaningful information, and the main benefit of the ontological aspect of the methodology is the semantic representation of the information. This article demonstrates the new methodology by applying it to the cybersecurity domain, resulting in a cybersecurity ontology which can be used in support of implementing a South African cybersecurity policy. DA - 2015-03 DB - ResearchSpace DP - CSIR KW - Cybersecurity KW - Design science KW - General morphological analysis KW - Morphological Ontology Design Engineering KW - MODE KW - Ontologies KW - Research methodologies LK - https://researchspace.csir.co.za PY - 2015 T1 - Modelling the cybersecurity environment using morphological ontology design engineering TI - Modelling the cybersecurity environment using morphological ontology design engineering UR - http://hdl.handle.net/10204/8270 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record