Skip to main content Link Menu Expand (external link) Left Arrow Right Arrow Document Search Copy Copied

Works Cited

Ashenden, D. (2021). The future human and behavioural challenges of cybersecurity. In P. Cornish (Ed.), The Oxford handbook of cybersecurity. (pp.723-734). Oxford: Oxford University Press.

Cap, P. (2017). Threats in cyberspace. The language of fear: Communicating threat in public discourse. (pp. 53-66). London: Palgrave Macmillan

Cvetkovich, A. (2003). An archive of feelings: trauma, sexuality, and lesbian public cultures. Duke University Press.

Couldry, N. (2004). Theorising media as practice. Social Semiotics, 14(2), 115–132. https://doi.org/10.1080/1035033042000238295

Debashi, M. (2018). Interactive sonification of network traffic to support cyber security situational awareness. Doctoral thesis. Northumbria University. http://nrl.northumbria.ac.uk/id/eprint/39458

Dunn Cavelty, M. (2018). Cybersecurity research meets science and technology studies. Politics and Governance, 6(2), 22-20. https://doi.org/10.17645/pag.v6i2.1385

Eidsheim, N. S. (2015). Sensing sound: Singing and listening as vibrational practice. Durham, NC: Duke University

Falk, C., & Dykstra, J. (2019). Sonification with music for cybersecurity situational awareness. Proceedings of the 25th International Conference on Auditory Display. 23-27 June 2019, Northumbria University. https://doi.org/10.21785/icad2019.014

Foucault, M. (1978). The history of sexuality: Volume I. New York: Random House.

Foucault, M. (1972). The archaeology of knowledge. Trans. A. Sheridan Smith. New York: Pantheon Books.

Gitelman, L., & Jackson, V. (2013). Introduction. In L. Gitelman and V. Jackson (Eds.), “Raw data” Is an oxymoron (pp. 1-14). Cambridge, MA: MIT Press.

Gjesvik, L., and Szulecki, K, (2022) Interpreting cyber-energy-security events: experts, social imaginaries, and policy discourses around the 2016 Ukraine blackout, European Security, 32(1). https://doi.org/10.1080/09662839.2022.2082838

Hayles, N. K. (2012). How we think: Digital media and contemporary technogenesis. University of Chicago Press.

Helmreich, S. (2000). Flexible infections: Computer viruses, human bodies, nation-states, evolutionary capitalism. Science, Technology, & Human Values, 25(4), 472–491. https://doi.org/10.1177/016224390002500404

Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen School. International Studies Quarterly, 53, 1155–1175.

Karlin, F., & Wright, R. (2004). On the track: A guide to contemporary film scoring. Taylor & Francis Group.

McKinney, C. and Mulvin, D. (2019). Bugs: Rethinking the history of computing. Communication, Culture and Critique, 12(4), 476–49.

Nissembaum, H. (2005). When computer security meets national security. Ethics in Information Technology (7), 61-73.

Parent, M. (2019 December 4). Growth in data breaches shows need for government regulations. The Conversation. https://theconversation.com/growth-in-data-breaches-shows-need-for-government-regulations-127600

Parrika, J. (2005). Digital Monsters, binary aliens—computer viruses, capitalism and the flow of information. Fibreculture Journal 4. https://four.fibreculturejournal.org/fcj-019-digital-monsters-binary-aliens-%E2%80%93-computer-viruses-capitalism-and-the-flow-of-information/

Posner, M., & Klein, L.F. (2017). “Editor’s introduction: Data as media.” Feminist Media Histories, 3(3), 1-8. https://escholarship.org/uc/item/3ng7f0rf

Richardson, L., & St. Pierre, E. A. (2005). Writing: A method of inquiry. In N. K. Denzin & Y. S. Lincoln (Eds.), The Sage handbook of qualitative research (pp. 959–978). Sage Publications.

Ross, A. (1991). Hacking away at the counterculture. In C. Penley & A. Ross (Eds.), Technoculture, (pp. 107–34). Minneapolis, MN: University of Minnesota Press.

Rothschild, E. (1995). What is security? Daedalus, 124(3), 52-98.

Rushkoff, D. (1994). Media virus! Hidden agendas in popular culture. New York: Ballantine.

Steblin, R. (1983). A history of key characteristics in the 18th and early 19th centuries. UMI Research Press.

Vishnevsky, A., Ruff-Escobar, C., Ruiz-Toledo, M., & Abbas, N.Y., (2022). Sonification of information security events in auditory display: text vocalization, navigation, and event flow representation. Journal of Accessibility and Design for All 12(1), 116-133. https://doi.org/10.17411/jacces.v12i1.359

Zeffiro, Andrea., Niessen, Gil, Oberst, Clementine, McEwan, Sam, Cochrane, Alexis, Carlota, Durand, Joshua. (2023). “Discourses on cybersecurity: The politics of the data breach as a security crisis.” Rivista di Digital Politics. pp. 369-398. https://www.rivisteweb.it/doi/10.53227/106451

Zeffiro, Andrea. (2022). “Breach.” Heliotrope. https://www.heliotropejournal.net/helio/breach