loading
Documents

Research.Publish.Connect.

Paper

Paper Unlock

Authors: James Geller 1 ; Soon Ae Chun 2 and Arwa Wali 3

Affiliations: 1 New Jersey Institute of Technology, United States ; 2 CUNY-CSI, United States ; 3 New Jersey Institute of Technology and King Abdulaziz University, United States

ISBN: 978-989-758-035-2

Keyword(s): Cyber Security Ontology; Security Knowledge Acquisition Tool, Security Learning Objects, Textbook, Index Terms, Augmented Ontology.

Related Ontology Subjects/Areas/Topics: Artificial Intelligence ; Data and Application Security and Privacy ; Data Engineering ; Data Privacy and Security ; Databases and Data Security ; Enterprise Information Systems ; Information and Systems Security ; Information Systems Analysis and Specification ; Knowledge Engineering and Ontology Development ; Knowledge-Based Systems ; Ontologies and the Semantic Web ; Ontology Engineering ; Symbolic Systems

Abstract: The process of developing an ontology cannot be fully automated at the current state-of-the-art. However, leaving the tedious, time-consuming and error-prone task of ontology development entirely to humans has problems of its own, including limited staff budgets and semantic disagreements between experts. Thus, a hybrid computer/expert approach is advocated. The research challenge is how to minimize and optimally organize the task of the expert(s) while maximally leveraging the power of the computer and of existing computer-readable documents. The purpose of this paper is two-fold. First we present such a hybrid approach by describing a knowledge acquisition tool that we have developed. This tool makes use of an existing Bootstrap Ontology and proposes likely locations of concepts and semantic relationships, based on a text book, to a domain expert who can decide on them. The tool is attempting to minimize the number of interactions. Secondly we are proposing the notion of an augmente d ontology specifically for pedagogical use. The application domain of this work is cyber-security education, but the ontology development methods are applicable to any educational topic. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 34.204.176.189

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Geller, J.; Ae Chun, S. and Wali, A. (2014). A Hybrid Approach to Developing a Cyber Security Ontology.In Proceedings of 3rd International Conference on Data Management Technologies and Applications - Volume 1: DATA, ISBN 978-989-758-035-2, pages 377-384. DOI: 10.5220/0005111503770384

@conference{data14,
author={James Geller. and Soon Ae Chun. and Arwa Wali.},
title={A Hybrid Approach to Developing a Cyber Security Ontology},
booktitle={Proceedings of 3rd International Conference on Data Management Technologies and Applications - Volume 1: DATA,},
year={2014},
pages={377-384},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005111503770384},
isbn={978-989-758-035-2},
}

TY - CONF

JO - Proceedings of 3rd International Conference on Data Management Technologies and Applications - Volume 1: DATA,
TI - A Hybrid Approach to Developing a Cyber Security Ontology
SN - 978-989-758-035-2
AU - Geller, J.
AU - Ae Chun, S.
AU - Wali, A.
PY - 2014
SP - 377
EP - 384
DO - 10.5220/0005111503770384

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.