Works Cited
Ashenden, D. (2021). The future human and behavioural challenges of cybersecurity. In P. Cornish (Ed.), The Oxford handbook of cybersecurity. (pp.723-734). Oxford: Oxford University Press.
Cap, P. (2017). Threats in cyberspace. The language of fear: Communicating threat in public discourse. (pp. 53-66). London: Palgrave Macmillan
Cvetkovich, A. (2003). An archive of feelings: trauma, sexuality, and lesbian public cultures. Duke University Press.
Couldry, N. (2004). Theorising media as practice. Social Semiotics, 14(2), 115–132. https://doi.org/10.1080/1035033042000238295
Debashi, M. (2018). Interactive sonification of network traffic to support cyber security situational awareness. Doctoral thesis. Northumbria University. http://nrl.northumbria.ac.uk/id/eprint/39458
Dunn Cavelty, M. (2018). Cybersecurity research meets science and technology studies. Politics and Governance, 6(2), 22-20. https://doi.org/10.17645/pag.v6i2.1385
Eidsheim, N. S. (2015). Sensing sound: Singing and listening as vibrational practice. Durham, NC: Duke University
Falk, C., & Dykstra, J. (2019). Sonification with music for cybersecurity situational awareness. Proceedings of the 25th International Conference on Auditory Display. 23-27 June 2019, Northumbria University. https://doi.org/10.21785/icad2019.014
Foucault, M. (1978). The history of sexuality: Volume I. New York: Random House.
Foucault, M. (1972). The archaeology of knowledge. Trans. A. Sheridan Smith. New York: Pantheon Books.
Gitelman, L., & Jackson, V. (2013). Introduction. In L. Gitelman and V. Jackson (Eds.), “Raw data” Is an oxymoron (pp. 1-14). Cambridge, MA: MIT Press.
Gjesvik, L., and Szulecki, K, (2022) Interpreting cyber-energy-security events: experts, social imaginaries, and policy discourses around the 2016 Ukraine blackout, European Security, 32(1). https://doi.org/10.1080/09662839.2022.2082838
Hayles, N. K. (2012). How we think: Digital media and contemporary technogenesis. University of Chicago Press.
Helmreich, S. (2000). Flexible infections: Computer viruses, human bodies, nation-states, evolutionary capitalism. Science, Technology, & Human Values, 25(4), 472–491. https://doi.org/10.1177/016224390002500404
Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen School. International Studies Quarterly, 53, 1155–1175.
Karlin, F., & Wright, R. (2004). On the track: A guide to contemporary film scoring. Taylor & Francis Group.
McKinney, C. and Mulvin, D. (2019). Bugs: Rethinking the history of computing. Communication, Culture and Critique, 12(4), 476–49.
Nissembaum, H. (2005). When computer security meets national security. Ethics in Information Technology (7), 61-73.
Parent, M. (2019 December 4). Growth in data breaches shows need for government regulations. The Conversation. https://theconversation.com/growth-in-data-breaches-shows-need-for-government-regulations-127600
Parrika, J. (2005). Digital Monsters, binary aliens—computer viruses, capitalism and the flow of information. Fibreculture Journal 4. https://four.fibreculturejournal.org/fcj-019-digital-monsters-binary-aliens-%E2%80%93-computer-viruses-capitalism-and-the-flow-of-information/
Posner, M., & Klein, L.F. (2017). “Editor’s introduction: Data as media.” Feminist Media Histories, 3(3), 1-8. https://escholarship.org/uc/item/3ng7f0rf
Richardson, L., & St. Pierre, E. A. (2005). Writing: A method of inquiry. In N. K. Denzin & Y. S. Lincoln (Eds.), The Sage handbook of qualitative research (pp. 959–978). Sage Publications.
Ross, A. (1991). Hacking away at the counterculture. In C. Penley & A. Ross (Eds.), Technoculture, (pp. 107–34). Minneapolis, MN: University of Minnesota Press.
Rothschild, E. (1995). What is security? Daedalus, 124(3), 52-98.
Rushkoff, D. (1994). Media virus! Hidden agendas in popular culture. New York: Ballantine.
Steblin, R. (1983). A history of key characteristics in the 18th and early 19th centuries. UMI Research Press.
Vishnevsky, A., Ruff-Escobar, C., Ruiz-Toledo, M., & Abbas, N.Y., (2022). Sonification of information security events in auditory display: text vocalization, navigation, and event flow representation. Journal of Accessibility and Design for All 12(1), 116-133. https://doi.org/10.17411/jacces.v12i1.359
Zeffiro, Andrea., Niessen, Gil, Oberst, Clementine, McEwan, Sam, Cochrane, Alexis, Carlota, Durand, Joshua. (2023). “Discourses on cybersecurity: The politics of the data breach as a security crisis.” Rivista di Digital Politics. pp. 369-398. https://www.rivisteweb.it/doi/10.53227/106451
Zeffiro, Andrea. (2022). “Breach.” Heliotrope. https://www.heliotropejournal.net/helio/breach