400
Views
1
CrossRef citations to date
0
Altmetric
Articles

A Matter of Concern: Kenneth Burke, Phishing, and the Rhetoric of National Insecurity

Pages 170-190 | Published online: 26 Mar 2011

Works Cited

  • Agency France Press . 2008 . 38 Charged in Romania-US Internet Fraud Bust . Yahoo! News , 19 May Web. 15 June 2008
  • Ahmad , Muneer . 2002 . Homeland Insecurities: Racial Violence the Day after September 11 . Social Text , 72 : 101 – 15 .
  • Ahmed , Sara . 2004 . The Cultural Politics of Emotion , New York : Routledge .
  • Baake , Ken . 2003 . Metaphor and Knowledge: The Challenges of Writing Science , Albany : State U of New York P .
  • Biesecker , Barbara . 2007 . No Time for Mourning: The Rhetorical Production of the Melancholic Citien-Subject in the War on Terror . Philosophy and Rhetoric , 40 ( 1 ) : 147 – 67 .
  • Blair , Kristine and Pamela , Takayoshi , eds. 1999 . Feminist Cyberscapes: Mapping Gendered Academic Spaces , Stamford, CT : Ablex .
  • Briscoe, Tom. “Phishing Phear.” Cartoon. Small World 19 Sept. 2005. Web. 15 June 2008. http://www.briscoe.org/index.cfm?comic=20050919 (http://www.briscoe.org/index.cfm?comic=20050919)
  • Burke , Kenneth . 1965 . Permanence and Change: An Anatomy of Purpose , New York : Bobbs-Merrill .
  • Devoss , Dànielle Nicole and Porter , James E. 2006 . Why Napster Matters to Writing: Filesharing as a New Ethic of Digital Delivery . Computers and Composition , 23 ( 2 ) : 178 – 210 .
  • Dhamija , Rachna , Tygar , J. D. and Hearst , Marti . 2006 . Why Phishing Works . Conference on Human Factors in Computing Systems , : 1 – 10 . 25 April 2006. Web. 13 June 2008
  • Downs , Julie S. , Mandy , B. Holbrook and Lorrie , Faith Cranor . 2006 . Decision Strategies and Susceptibility to Phishing . Symposium on Usable Privacy and Security , : 1 – 12 . 14 July 2006. Web. 13 June 2008
  • Fahnestock , Jeanne . 1999 . Rhetorical Figures in Science , New York : Oxford UP .
  • George , Ann and Selzer , Jack . 2007 . Kenneth Burke in the 1930s , Columbia : U of South Carolina P .
  • Gurak , Laura . 1997 . Persuasion and Privacy in Cyberspace: The Online Protests over Lotus Marketplace and the Clipper Chip , New Haven : Yale UP .
  • Holdstein , Deborah . 1996 . Power, Genre, and Technology . College Composition and Communication , 47 ( 2 ) : 279 – 84 .
  • Ivie , Robert L. 2006 . Democracy and America's War on Terror , Tuscaloosa : U of Alabama P .
  • Jakobsson , Markus and Steven , Myers , eds. 2007 . Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft , Hoboken, NJ : Wiley .
  • James , Lance . 2005 . Phishing Exposed: Uncover Secrets from the Dark Side , Rockland, MA : Syngress .
  • Jenkins , Henry . 2006 . Convergence Culture: Where Old and New Media Collide , New York : New York UP .
  • Lininger , Rachel and Russell , Dean Vines . 2005 . Phishing: Cutting the Identity Theft Line , Indianapolis : Wiley .
  • McCall , Tom . Gartner Survey Shows Phishing Attacks Escalated in 2007; More than $3 Billion Lost to These Attacks . Gartner Media Relations: 2007 Press Releases , 17 Dec. 2007. Web. 13 June 2008
  • Miller , Robert C. and Wu , Min . “ Fighting Phishing at the User Interface ” . In Security and Usability: Designing Secure Systems that People Can Use , Edited by: Lorrie , Faith Cranor and Simson , Garfinkel . 275 – 92 . Sebastopol, CA : O'Reilly .
  • Moses , Myra G. and Katz , Steven B. 2006 . “ The Phantom Machine: The Invisible Ideology of Email (A Cultural Critique) ” . In Critical Power Tools: Technical Communication and Cultural Studies , Edited by: Blake Scott , J. , Longo , Bernadette and Wills , Katherine V. 71 – 105 . Albany : State U of New York P .
  • Moxley , Joseph . 2008 . Datagogies, Writing Spaces, and the Age of Peer Production . Computers and Composition , 25 ( 2 ) : 182 – 202 .
  • Prendergast , Catherine and Shor , Ira . 2005 . When Whiteness is Visible, the Stories We Tell about Whiteness . Rhetoric Review , 24 ( 4 ) : 377 – 84 .
  • Quensenberry, Torria Jo, Kelly Barnes, and Eve Faulks. “Phishing Is in Season Year Round: Don't Take the Bait!” West Virginia University Information Security. Web http://infosecurity.wvu.edu/awareness/posters/2006posters (http://infosecurity.wvu.edu/awareness/posters/2006posters) (Accessed: 13 June 2008 ).
  • Robb , John . 2007 . Brave New War: The Next Stage of Terrorism and the End of Globalization , Hoboken, NJ : Wiley .
  • Robillard , Amy E. and Fortune , Ron . 2007 . Toward a New Content for Writing Courses: Literary Forgery, Plagiarism, and the Production of Belief . JAC , 27 ( 1–2 ) : 183 – 210 .
  • Ruthven , K.K. 2001 . Faking Literature , Cambridge : Cambridge UP .
  • University of Ballarat Information Services. “Hook, Line and … Sunk.” ICT Security Awareness http://www.ballarat.edu.au/aasp/is/ict/security/images/poster_phish.jpg> (http://www.ballarat.edu.au/aasp/is/ict/security/images/poster_phish.jpg>) (Accessed: 21 April 2007 ).
  • Warnick , Barbara . 2007 . Rhetoric Online: Persuasion and Politics on the World Wide Web , New York : Peter Lang .
  • West , Thomas R. 2005 . White Power, White Fear . Rhetoric Review , 24 ( 4 ) : 385 – 88 .
  • Whitney, Lance. “Symantec: Phishing Activity Up in July . CNET News , 6 Aug 2009. Web. 10 Aug. 2009
  • Wolin , Ross . 2001 . The Rhetorical Imagination of Kenneth Burke , Columbia : U of South Carolina P .
  • Worsham , Lynn . 1998 . Going Postal: Pedagogic Violence and the Schooling of Emotion . JAC , 18 ( 2 ) : 213 – 46 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.