Inducing Six-Word Stories From Curated Text Sets to Anticipate Cyberwar in 4IR

Inducing Six-Word Stories From Curated Text Sets to Anticipate Cyberwar in 4IR

DOI: 10.4018/978-1-5225-4763-1.ch015
(Individual Chapters)
No Current Special Offers


From curated “cyberwar” text sets (from government, mainstream journalism, academia, and social media), six-word stories are computationally induced (using word frequency counts, text searches, word network analysis, word clustering, and other means), supported by post-induction human writing. The resulting inducted six-word stories are used to (1) describe and summarize the underlying textual information (to enable a bridge to a complex topic); (2) produce insights about the underlying textual information and related in-world phenomena; and (3) answer particular research questions. These resulting six-word stories are analyzed along multiple dimensions: data sources (government, journalism, academia, and social media), expert calls-and-crowd responses, and by time periods (pre-cyberwar and cyberwar periods). The efficacy of this six-word story induction process is evaluated, and the extracted six-word stories are applied to cyberwar potentials during the Fourth Industrial Revolution (4IR).
Chapter Preview


A cyberwar collection of six-word stories follows:

  • Cyberwar rules ≠ defined clear explicit

  • Cyberwar: Milliseconds are of the essence

  • Cyberwar: Stealth weapons to exploit weaknesses

  • Cyberwar: Stealthy devastating fast, mysterious complex

  • Cyberwar Salvo: Damage done b4 uknowit

  • 4IR Cyberwar: Humans in the loop

  • All-Seasons Cyberwar: Running “hot” and “cold”

  • Cyberwar: On/off toggle, high-low dial, no-switch

  • Cyberwar:

    • o


    • o


    • o


    • o


    • o


  • Cyberwar Cyber-Physical Confluence: Code to boom!

  • Cyberwar: ID who & return address

  • Cyberwar Source: Fingerprinted seeable legally-responsible

  • Cyberwar Collateral Damage: You and me

  • Cyberwarriors: Professionally paranoid, sub rosa, attentive

  • Cyberweapons Design: Compartmented, precise, tested ad nauseam

  • Cyberweapons Design: Working with industry occasionally

  • Cyberweapons: Getting ahead of response curve

  • #Cyberwar: Exploring “dog that doesn’t bark.”

  • Stuxnet ≥ hard-power violence and mayhem

  • Stuxnet: Hit || on nuclear ambitions

  • Stuxnet: Cyberwar Rubicon crossed…with style

  • Realpolitik Cyberthreat Modeling: Advanced persistent threats

  • States militaries corporations media = hard targets;

  • You and me = just a means-to-an-end

The above six-word stories about cyberwar and the harnessing of cyber capabilities for higher-intensity human conflicts between nation-states were drafted after a close human reading of hundreds of documents, research articles, journalistic articles, student research works, and social media accounts about cyberwar, and they focus on particular facets of cyberwar. These pithy stories were manually created as a back-of-the-napkin exercise to partially represent the objectives of this chapter, namely, the creation of partially computer-induced six-word stories from curated “cyberwar” text sets. More formally, cyberwar refers to the following:

Key Terms in this Chapter

Induction: Extraction of text sets from computational means.

Six-Word Story: A brief literary form of six-word “narratives” that originated in the 1980s.

Netwar: Information warfare among non-state actors, including citizens and social activists.

Cold War: A state of heightened antagonism between nation-states that is expressed as suppressed and somewhat-restrained hostilities; stops short of open warfare.

Cyberwar: The uses of computer technology to advance nation-state interests against an adversary.

“Found” Six-Word Stories: Fragments of sentences or full sentences comprised of six words that may be read insightfully as authored/designed six-word stories.

Machine Reading: Uses of computers to create meaning from text sets, also referred to as auto-coding in some contexts.

Soft Cyber Power: Information warfare, public diplomacy, propaganda.

Cyber Hard Power: The use of cyber to cause physical damage, injuries, and death (as in an escalatory war situation).

Hot War: Human conflict with destructive attacks on physical infrastructure and peoples; open warfare.

Sociograph: A visualization of nodes (entities) and links (relationships) showing interrelationships (such as between individuals/groups on a social media platform).

Hard Cyber Power: Uses of cyberweapons to destroy physical infrastructure.

Great Unread: A notional and practical collection of texts which do not attract human attention for reading.

Fourth Industrial Revolution (4IR): A label of the current and near-future of impending changes and disruptions due to advancements in cyber and biological and other technologies; a concept by Klaus Schwab.

Cyber Soft Power: The use of cyber to convey information in a strategic way.

Narrative: A story about connected events.

Internet of Things (IoT): Internet-based connections between computing devices (“things”), such as those in cars, homes, commercial spaces, bodies (health devices), smart phones, and others.

Cybersecurity: Freedom from potential compromise and potential harm stemming from unauthorized access to computers and computer networks.

Infrastructure: Physical facilities needed for the maintenance of society.

Stealth: Something hidden or invisible (often based on design and deployment); surreptitious.

Complete Chapter List

Search this Book: