10,761
Views
10
CrossRef citations to date
0
Altmetric
Articles

Cyber-noir: Cybersecurity and popular culture

ORCID Icon

References list

  • Adler, E., & Pouliot, V. (Eds.). (2011). International practices. Cambridge: Cambridge University Press.
  • Amoore, L. (2007). Vigilant visualities: The watchful politics of the war on terror. Security Dialogue, 38, 215–232. doi: 10.1177/0967010607078526
  • Andersen, R. S., & Möller, F. (2013). Engaging the limits of visibility: Photography, security and surveillance. Security Dialogue, 44, 203–221. doi: 10.1177/0967010613484955
  • Andersen, R. S., Vuori, J. A., & Guillaume, X. (2015). Chromatology of security: Introducing colours to visual security studies. Security Dialogue, 46, 440–457. doi: 10.1177/0967010615585106
  • Balzacq, T. (Ed.). (2010). Securitization theory. Oxford: Routledge.
  • Balzacq, T., & Cavelty, M. D. (2016). A theory of actor-network for cyber-security. European Journal of International Security, 1, 176–198. doi: 10.1017/eis.2016.8
  • Bandler, J., Tsui, A., & Burke, D. (2019). How Amazon and Silicon Valley Seduced the Pentagon [Text/html]. Retrieved from https://perma.cc/G5PK-4753
  • Barkin, J. S., & Sjoberg, L. (2019). International relations’ last synthesis?: Decoupling constructivist and critical approaches. New York, NY: Oxford University Press.
  • Barlow, J. P. (1996). A Declaration of the Independence of Cyberspace. Retrieved from https://perma.cc/B757-954D
  • Barnard-Wills, D., & Ashenden, D. (2012). Securing virtual space cyber war, cyber terror, and risk. Space and Culture, 15, 110–123. doi: 10.1177/1206331211430016
  • Bartholomew, B., & Guerrero-Saade, J. (2016). Wave your false flags! Deception tactics muddying attribution in targeted attacks. Virus Bulletin Conference.
  • Baudrillard, J. (1995). The Gulf war did not take place. Translated by P. Patton. Bloomington: Indiana University Press.
  • Baudrillard, J. (2012 [1994]). Simulacra and simulation. Translated by S. F. Glaser. Ann Arbor, MI: University of Michigan Press.
  • Bendrath, R. (2001). The Cyberwar debate: Perception and politics in US critical Infrastructure protection. Information&Security, 7, 80–103.
  • Betz, D. J., & Stevens, T. (2013). Analogical reasoning and cyber security. Security Dialogue, 44, 147–164. doi: 10.1177/0967010613478323
  • Bigo, D. (2002). Security and immigration: Toward a critique of the governmentality of unease. Alternatives, 27, 63–92. doi: 10.1177/03043754020270S105
  • Bigo, D. (2008). Globalized (in)security: The field and the ban-opticon. In D. Bigo, & A. Tsoukala (Eds.), Terror, insecurity and liberty: Illiberal practices of liberal regimes after 9/11 (pp. 10–49). London; New York, NY: Routledge.
  • Bleiker, R. (2001). The aesthetic turn in International political theory. Millennium, 30, 509–533. doi: 10.1177/03058298010300031001
  • Borde, R., & Chaumeton, E. (1996). Toward a definition of film noir. In R. B. Palmer (Ed.), Perspectives on film noir (pp. 59–65). London: G. K. Hall.
  • Bould, M. (2005). Film noir: From Berlin to Sin City. London: Wallflower Press.
  • Bronk, C., & Tikk-Ringas, E. (2013). The cyber attack on Saudi Aramco. Survival, 55(2), 81–96. doi: 10.1080/00396338.2013.784468
  • Brown, J. A., & Workman, R. S. (1976). How a computer system works. New York, NY: ARCO.
  • Buzan, B., Waever, O., & Wilde, J. d. (1997). Security: A new framework for analysis. Boulder, CO: Lynne Rienner Publishers.
  • Campbell, D. (2003). Cultural governance and pictorial resistance: Reflections on the imaging of war. Review of International Studies, 29(S1), 57–73. doi: 10.1017/S0260210503005977
  • Chen, K.-H. (1987). The masses and the media: Baudrillard’s implosive postmodernism. Theory, Culture & Society, 4, 71–88. doi: 10.1177/026327687004001004
  • Coleman, G. (2014). Hacker, hoaxer, whistleblower, spy: The many faces of anonymous. London: Verso.
  • Coleman, G., & Golub, A. (2008). Hacker practice: Moral genres and the cultural articulation of liberalism. Anthropological Theory, 8, 255–277. doi: 10.1177/1463499608093814
  • Committee on Homeland Security. (2013). Cyber threats from China, Russia, and Iran: Protecting American critical infrastructure (Hearing No. Serial No. 113-9). Washington, DC: U.S. House of Representatives.
  • Cox, J. (2016). Think Stock Photos of Hackers Are Cheesy? Blame This Guy. Retrieved from https://perma.cc/Y4NR-ZK2C
  • Crowdstrike. (2019). Fancy Bear Hackers—Aliases, Targets, & Methods. Retrieved from https://perma.cc/2PYH-NSU7
  • Deibert, R. J. (2018). Toward a human-centric approach to cybersecurity. Ethics & International Affairs, 32, 411–424. doi: 10.1017/S0892679418000618
  • Deibert, R., Palfrey, J., Rohozinski, R., & Zittrain, J. (2011). Access contested: Security, identity, and resistance in Asian cyberspace. Cambridge, MA: The MIT Press.
  • Derian, J. D. (2005). Imaging terror: Logos, pathos and ethos. Third World Quarterly, 2, 23–37. doi: 10.1080/0143659042000322883
  • Derian, J. d., & Shapiro, M. J. (eds.). (1989). International/intertextual relations: Postmodern readings of world politics. Lexington, MA: Lexington Books.
  • Dunn Cavelty, M. (2008a). Cyber-security and threat politics. London: Routledge.
  • Dunn Cavelty, M. (2008b). Cyber-terror—Looming threat or Phantom Menace? The framing of the US cyber-threat debate. Journal of Information Technology & Politics, 4, 19–36. doi: 10.1300/J516v04n01_03
  • Dunn Cavelty, M. (2013). From cyber-bombs to political fallout: Threat representations with an impact in the cyber-security discourse. International Studies Review, 15, 105–122. doi: 10.1111/misr.12023
  • Ellis, R., Huang, K., Siegel, M., Moussouris, K., & Houghton, J. (2018). Fixing a hole: The labor market for bugs. In H. Shrobe, D. L. Shrier, & A. Pentland (Eds.), New solutions for cybersecurity (pp. 129–159). Cambridge, MA: MIT Connection Science & Engineering.
  • Erickson, T. (1996). Kill me again: Movement becomes genre. In A. Silver, & J. Ursini (Eds.), Film noir reader (pp. 307–330). New York, NY: Limelight.
  • Fidler, M. (2015). Regulating the Zero-Day Vulnerability Trade: A Preliminary Analysis (SSRN Scholarly Paper No. ID 2706199). Retrieved from Social Science Research Network website: https://papers.ssrn.com/abstract=2706199
  • Flyverbom, M., Deibert, R., & Matten, D. (2017). The governance of digital technology, big data, and the internet: New roles and responsibilities for business. Business & Society, doi: 10.1177/0007650317727540
  • Frank, N. (1996). The crime adventure story: A new kind of detective film. In R. B. Palmer (Ed.), Perspectives on film noir (pp. 21–24). London: G. K. Hall.
  • Garamone, J. (2016). Defense Digital Service Chief Brings Private-Sector Expertise to Job. Retrieved from https://perma.cc/BU4T-Y8A6
  • Gartzke, E., & Lindsay, J. R. (2015). Weaving tangled webs: Offense. Defense, and Deception in Cyberspace. Security Studies, 24, 316–348. doi: 10.1080/09636412.2015.1038188
  • Gibson, W. (2003). Burning chrome. New York, NY: Harper Voyager.
  • Guzzini, S. (2000). A reconstruction of constructivism in international relations. European Journal of International Relations, 6, 147–182. doi: 10.1177/1354066100006002001
  • Hall, P., Heath, C., & Coles-Kemp, L. (2015). Critical visualization: A case for rethinking how we visualize risk and security. Journal of Cybersecurity, 1, 93–108. doi: 10.1093/cybsec/tyv004
  • Hallberg, R. V. (2015). The Maltese falcon to body of lies: Spies, noirs, and trust. Albuquerque, NM: University of New Mexico Press.
  • Hansen, L. (2006). Security as practice: Discourse analysis and the Bosnian War. New York, NY: Routledge.
  • Hansen, L. (2011). Theorizing the image for security studies: Visual securitization and the Muhammad cartoon crisis. European Journal of International Relations, 17, 51–74. doi: 10.1177/1354066110388593
  • Hansen, L. (2015). How images make world politics: International icons and the case of Abu Ghraib. Review of International Studies, 41, 263–288. doi: 10.1017/S0260210514000199
  • Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen School. International Studies Quarterly, 53, 1155–1175. doi: 10.1111/j.1468-2478.2009.00572.x
  • Haskins, C. (2019). Revealed: This Is Palantir’s Top-Secret User Manual for Cops. Retrieved from https://perma.cc/R7ZD-RRQK
  • Heck, A., & Schlag, G. (2013). Securitizing images: The female body and the war in Afghanistan. European Journal of International Relations, 19, 891–913. doi: 10.1177/1354066111433896
  • Hern, A. (2014). What GCHQ’s geeky and misogynistic code names tell us about its coders. The Guardian. Retrieved from https://perma.cc/RQS9-CBEQ
  • The Intercept. (2014). JTRIG Tools and Techniques. Retrieved from https://perma.cc/8ZEV-UB4Q
  • Jones, C. W., & Paris, C. (2018). It’s the end of the world and they know it: How dystopian fiction shapes political attitudes. Perspectives on Politics, 16, 969–989. doi: 10.1017/S1537592718002153
  • Kaplan, F. (2017). Dark territory: The secret history of cyber war. New York, NY: Simon & Schuster.
  • Kelley, T., & Bertenthal, B. (2015). Tracking Risky Behavior On The Web: Distinguishing Between What Users “Say’’ And “Do’’. Presented at the International Symposium on Human Aspects of Information Security & Assurance (HAISA), Mytilene, Greece.
  • Kello, L. (2019). Private sector cyberweapons: An adequate response to the sovereignty gap? In H. Lin, & A. Zegart (Eds.), Bytes bombs and spies: The strategic dimensions of offensive cyber operations (pp. 357–378). Washington, DC: Brookings Institution Press.
  • Kiersey, N. J., & Neumann, I. B. (Eds.). (2013). Battlestar galactica and international relations. New York, NY: Routledge.
  • Know Your Meme. (2016). Hacker Stock Photos. Retrieved from https://perma.cc/9JE4-PAU5
  • Krebs, B. (2015). Who’s Attacking Whom? Realtime Attack Trackers. Retrieved from https://perma.cc/U7VX-UXCE
  • Krebs, B. (2017). Who Is Marcus Hutchins? Retrieved from https://perma.cc/2N53-MSWJ
  • Kubitschko, S. (2015). Hackers’ media practices: Demonstrating and articulating expertise as interlocking arrangements. Convergence, 21, 388–402. doi: 10.1177/1354856515579847
  • Kumar, M. (2017). Shadow Brokers Group Releases More Stolen NSA Hacking Tools & Exploits. Retrieved from https://perma.cc/68QE-65S9
  • Laskow, S. (2017). The Counterintuitive History of Black Hats, White Hats, And Villains. Retrieved from Atlas Obscura website: https://perma.cc/7VRH-8KRW
  • Lawson, S. (2013). Beyond cyber-doom: Assessing the limits of hypothetical scenarios in the framing of cyber-threats. Journal of Information Technology & Politics, 10, 86–103. doi: 10.1080/19331681.2012.759059
  • Lee, R. M., & Rid, T. (2014). OMG cyber! The RUSI Journal, 159(5), 4–12. doi: 10.1080/03071847.2014.969932
  • Libicki, M. C. (2010). Conquest in cyberspace: National security and information warfare. New York, NY: Cambridge University Press.
  • Luhr, W. (2012). Film noir. Chichester: Wiley-Blackwell.
  • Lundborg, T. (2016). The virtualization of security: Philosophies of capture and resistance in Baudrillard, Agamben and Deleuze. Security Dialogue, 47, 255–270. doi: 10.1177/0967010615625474
  • Macleod, A. (2014). The contemporary fictional police detective as critical security analyst: Insecurity and immigration in the novels of Henning Mankell and Andrea Camilleri. Security Dialogue, 45, 515–529. doi: 10.1177/0967010614543584
  • McQueen, S. (2016). Deleuze and Baudrillard: From Cyberpunk to Biopunk. Edinburgh: Edinburgh University Press.
  • Methmann, C. (2014). Visualizing climate-refugees: Race, vulnerability, and resilience in global liberal politics. International Political Sociology, 8, 416–435. doi: 10.1111/ips.12071
  • Milliken, J. (1999). The study of discourse in international relations: A critique of research and methods. European Journal of International Relations, 5, 225–254. doi: 10.1177/1354066199005002003
  • Musgrave, P. (2019). IR Theory and ‘Game of Thrones’ Are Both Fantasies. Retrieved from https://foreignpolicy.com/2019/05/23/ir-theory-and-game-of-thrones-are-both-fantasies/
  • Naremore, J. (2008). More than night: Film noir in Its contexts. Berkeley: University of California Press.
  • Naremore, J. (2013). Foreword. In A. Spicer, & H. Hanson (Eds.), A companion to film noir (pp. xix–xxx). Malden, MA: Wiley-Blackwell.
  • Ness, R. R. (2008). A lotta night music: The sound of film noir. Cinema Journal, 47(2), 52–73. doi: 10.1353/cj.2008.0011
  • Neumann, I. B., & Nexon, D. H. (eds.). (2006). Harry potter and international relations. Lanham, MD: Rowman & Littlefield Publishers.
  • Nissenbaum, H. (2004). Hackers and the contested ontology of cyberspace. New Media & Society, 6, 195–217. doi: 10.1177/1461444804041445
  • OASIS Cyber Threat Intelligence. (2019). Defining Campaigns vs. Threat Actors vs. Intrusion Sets. Retrieved from https://perma.cc/475Q-EZKG
  • Paletta, D. (2015). Former CIA Chief Says Government Data Breach Could Help China Recruit Spies. Wall Street Journal. Retrieved from https://perma.cc/T5L6-GHL8
  • Palmer, R. B. (Ed.). (1996). Perspectives on film noir. London: G. K. Hall.
  • Paris, R. (2001). Human security: Paradigm shift or hot air? International Security, 26(2), 87–102. doi: 10.1162/016228801753191141
  • Porfirio, R. G. (1976). No way out: Existential motifs in the film noir. Sight and Sound, 45(4), 212–217.
  • Porfirio, R. G. (2013). The Strange case of film noir. In A. Spicer, & H. Hanson (Eds.), A companion to film noir (pp. 17–32). Malden, MA: Wiley-Blackwell.
  • Prince, S. (2009). Firestorm: American film in the age of terrorism. New York, NY: Columbia University Press.
  • Ragan, S. (2017). 8 top cyber attack maps and how to use them. CSO Online. Retrieved from https://perma.cc/U5YQ-MKE8
  • Roth, F. (2018). The Newcomer’s Guide to Cyber Threat Actor Naming. Medium. Retrieved from https://perma.cc/USH2-NESK
  • Schmidle, N. (2018). The Digital Vigilantes Who Hack Back. The New Yorker. Retrieved from https://perma.cc/X7S8-DQSJ
  • Schneier, B. (2017). Who Are the Shadow Brokers? Retrieved from https://perma.cc/F8LM-ED5S
  • Shapiro, M. J. (2008). Cinematic geopolitics. New York, NY: Routledge.
  • Shepherd, L. J. (2012). Gender, violence and popular culture. New York, NY: Routledge.
  • Shires, J. (2018). Enacting expertise: Ritual and risk in cybersecurity. Politics and Governance, 6(2), doi: 10.17645/pag.v6i2.1329
  • Shires, J. (2019). Family resemblance or family argument? Three perspectives of cybersecurity and their interaction. St Anthony’s International Review, 15(1), 18–36.
  • Shires, J. (in press). Ambiguity and appropriation: Cybercrime in Egypt and the Gulf. In D. Broeders (Ed.), Responsible behaviour in cyberspace. London: Rowman & Littlefield Publishers.
  • Shoorbajee, Z. (2018). Playing nice? FireEye CEO says U.S. Malware is more restrained than adversaries. CyberScoop, Retrieved from https://perma.cc/MPB4-BVN9
  • Smolin, J. (2013). Moroccan noir: Police, crime, and politics in popular culture. Bloomington, IN: Indiana University Press.
  • Spicer, A. (ed.). (2007). European film noir. Manchester: Manchester University Press.
  • Stimmer, A. (2019). Star wars or strategic defense initiative: What’s in a name? Journal of Global Security Studies, Advance online publication. doi: 10.1093/jogss/ogz004
  • Sugarman, E., & Wickline, H. (2019). The Sorry State of Cybersecurity Imagery. Lawfare. Retrieved from https://perma.cc/RB6H-YRMP
  • Sulmeyer, M. (2016). Michael Sulmeyer on Cyber Security Sex Appeal. Retrieved from https://perma.cc/5ZC5-QLRL
  • Tanczer, L. M. (2016). Hacktivism and the male-only stereotype. New Media & Society, 18, 1599–1615. doi: 10.1177/1461444814567983
  • Templeton, G. (2016). The “Shadow Brokers” NSA theft puts the Snowden leaks to shame. Retrieved from https://perma.cc/KM7Q-AMHA
  • Unver, H. A. (2017). Do trees fall in cyberspace? Retrieved from https://perma.cc/QY54-KCXR
  • Van Rythoven, E. (2015). Learning to feel, learning to fear? Emotions, imaginaries, and limits in the politics of securitization. Security Dialogue, 46, 458–475. doi: 10.1177/0967010615574766
  • Vuori, J. A. (2010). A timely prophet? The doomsday clock as a visualization of securitization moves with a global referent object. Security Dialogue, 41, 255–277. doi: 10.1177/0967010610370225
  • Walker-Morrison, D. (2018). Classic French noir: Gender and the cinema of fatal desire. London: I.B. Tauris.
  • Wall, D. S. (2008). Cybercrime and the culture of fear. Information, Communication & Society, 11, 861–884. doi: 10.1080/13691180802007788
  • Wasinski, C. (2011). On making war possible: Soldiers, strategy, and military grand narrative. Security Dialogue, 42, 57–76. doi: 10.1177/0967010610393550
  • Weber, C. (2005). Imagining America at war: Morality, politics and film. London: Routledge.
  • Weldes, J. (1999). Going cultural: Star Trek. State Action, and Popular Culture. Millennium, 28, 117–134. doi: 10.1177/03058298990280011201
  • Whittaker, Z. (2019). ‘WannaCry hero’ sentenced for selling Kronos malware. TechCrunch. Retrieved from https://perma.cc/H4GK-UARR
  • Williams, M. C. (2003). Words, images, enemies: Securitization and international politics. International Studies Quarterly, 47, 511–531. doi: 10.1046/j.0020-8833.2003.00277.x
  • x0rz. (2017). Hacking back considered harmful? Medium. Retrieved from https://perma.cc/K8NM-8DZT
  • Young, K. L., & Carpenter, C. (2018). Does science fiction affect political fact? Yes and no: A survey experiment on “killer robots”. International Studies Quarterly, 62, 562–576. doi: 10.1093/isq/sqy028
  • Zajko, M. (2015). Canada’s cyber security and the changing threat landscape. Critical Studies on Security, 3, 147–161. doi: 10.1080/21624887.2015.1071165
  • Zetter, K. (2012). Researchers Connect Flame to US-Israel Stuxnet Attack. Wired. Retrieved from https://perma.cc/ZH4R-89DZ
  • Zizek, S. (1993). “The Thing that Thinks”: The Kantian background of the noir subject. In J. Copjec (Ed.), Shades of noir (pp. 199–226). New York, NY: Verso.