Works Cited
- Agency France Press . 2008 . 38 Charged in Romania-US Internet Fraud Bust . Yahoo! News , 19 May Web. 15 June 2008
- Ahmad , Muneer . 2002 . Homeland Insecurities: Racial Violence the Day after September 11 . Social Text , 72 : 101 – 15 .
- Ahmed , Sara . 2004 . The Cultural Politics of Emotion , New York : Routledge .
- Baake , Ken . 2003 . Metaphor and Knowledge: The Challenges of Writing Science , Albany : State U of New York P .
- Biesecker , Barbara . 2007 . No Time for Mourning: The Rhetorical Production of the Melancholic Citien-Subject in the War on Terror . Philosophy and Rhetoric , 40 ( 1 ) : 147 – 67 .
- Blair , Kristine and Pamela , Takayoshi , eds. 1999 . Feminist Cyberscapes: Mapping Gendered Academic Spaces , Stamford, CT : Ablex .
- Briscoe, Tom. “Phishing Phear.” Cartoon. Small World 19 Sept. 2005. Web. 15 June 2008. http://www.briscoe.org/index.cfm?comic=20050919 (http://www.briscoe.org/index.cfm?comic=20050919)
- Burke , Kenneth . 1965 . Permanence and Change: An Anatomy of Purpose , New York : Bobbs-Merrill .
- Devoss , Dànielle Nicole and Porter , James E. 2006 . Why Napster Matters to Writing: Filesharing as a New Ethic of Digital Delivery . Computers and Composition , 23 ( 2 ) : 178 – 210 .
- Dhamija , Rachna , Tygar , J. D. and Hearst , Marti . 2006 . Why Phishing Works . Conference on Human Factors in Computing Systems , : 1 – 10 . 25 April 2006. Web. 13 June 2008
- Downs , Julie S. , Mandy , B. Holbrook and Lorrie , Faith Cranor . 2006 . Decision Strategies and Susceptibility to Phishing . Symposium on Usable Privacy and Security , : 1 – 12 . 14 July 2006. Web. 13 June 2008
- Fahnestock , Jeanne . 1999 . Rhetorical Figures in Science , New York : Oxford UP .
- George , Ann and Selzer , Jack . 2007 . Kenneth Burke in the 1930s , Columbia : U of South Carolina P .
- Gurak , Laura . 1997 . Persuasion and Privacy in Cyberspace: The Online Protests over Lotus Marketplace and the Clipper Chip , New Haven : Yale UP .
- Holdstein , Deborah . 1996 . Power, Genre, and Technology . College Composition and Communication , 47 ( 2 ) : 279 – 84 .
- Ivie , Robert L. 2006 . Democracy and America's War on Terror , Tuscaloosa : U of Alabama P .
- Jakobsson , Markus and Steven , Myers , eds. 2007 . Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft , Hoboken, NJ : Wiley .
- James , Lance . 2005 . Phishing Exposed: Uncover Secrets from the Dark Side , Rockland, MA : Syngress .
- Jenkins , Henry . 2006 . Convergence Culture: Where Old and New Media Collide , New York : New York UP .
- Lininger , Rachel and Russell , Dean Vines . 2005 . Phishing: Cutting the Identity Theft Line , Indianapolis : Wiley .
- McCall , Tom . Gartner Survey Shows Phishing Attacks Escalated in 2007; More than $3 Billion Lost to These Attacks . Gartner Media Relations: 2007 Press Releases , 17 Dec. 2007. Web. 13 June 2008
- Miller , Robert C. and Wu , Min . “ Fighting Phishing at the User Interface ” . In Security and Usability: Designing Secure Systems that People Can Use , Edited by: Lorrie , Faith Cranor and Simson , Garfinkel . 275 – 92 . Sebastopol, CA : O'Reilly .
- Moses , Myra G. and Katz , Steven B. 2006 . “ The Phantom Machine: The Invisible Ideology of Email (A Cultural Critique) ” . In Critical Power Tools: Technical Communication and Cultural Studies , Edited by: Blake Scott , J. , Longo , Bernadette and Wills , Katherine V. 71 – 105 . Albany : State U of New York P .
- Moxley , Joseph . 2008 . Datagogies, Writing Spaces, and the Age of Peer Production . Computers and Composition , 25 ( 2 ) : 182 – 202 .
- Prendergast , Catherine and Shor , Ira . 2005 . When Whiteness is Visible, the Stories We Tell about Whiteness . Rhetoric Review , 24 ( 4 ) : 377 – 84 .
- Quensenberry, Torria Jo, Kelly Barnes, and Eve Faulks. “Phishing Is in Season Year Round: Don't Take the Bait!” West Virginia University Information Security. Web http://infosecurity.wvu.edu/awareness/posters/2006posters (http://infosecurity.wvu.edu/awareness/posters/2006posters) (Accessed: 13 June 2008 ).
- Robb , John . 2007 . Brave New War: The Next Stage of Terrorism and the End of Globalization , Hoboken, NJ : Wiley .
- Robillard , Amy E. and Fortune , Ron . 2007 . Toward a New Content for Writing Courses: Literary Forgery, Plagiarism, and the Production of Belief . JAC , 27 ( 1–2 ) : 183 – 210 .
- Ruthven , K.K. 2001 . Faking Literature , Cambridge : Cambridge UP .
- University of Ballarat Information Services. “Hook, Line and … Sunk.” ICT Security Awareness http://www.ballarat.edu.au/aasp/is/ict/security/images/poster_phish.jpg> (http://www.ballarat.edu.au/aasp/is/ict/security/images/poster_phish.jpg>) (Accessed: 21 April 2007 ).
- Warnick , Barbara . 2007 . Rhetoric Online: Persuasion and Politics on the World Wide Web , New York : Peter Lang .
- West , Thomas R. 2005 . White Power, White Fear . Rhetoric Review , 24 ( 4 ) : 385 – 88 .
- Whitney, Lance. “Symantec: Phishing Activity Up in July . CNET News , 6 Aug 2009. Web. 10 Aug. 2009
- Wolin , Ross . 2001 . The Rhetorical Imagination of Kenneth Burke , Columbia : U of South Carolina P .
- Worsham , Lynn . 1998 . Going Postal: Pedagogic Violence and the Schooling of Emotion . JAC , 18 ( 2 ) : 213 – 46 .