2019
DOI: 10.1080/13523260.2019.1670006
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-noir: Cybersecurity and popular culture

Abstract: Cybersecurity experts foster a perception of cybersecurity as a gloomy underworld in which the good guys must resort to unconventional tactics to keep at bay a motley group of threats to the digital safety of unsuspecting individuals, businesses, and governments. This article takes this framing seriously, drawing on film studies scholarship that identifies certain aesthetic themes as associated with moral ambiguity in noir films. This article introduces the term "cyber-noir" to describe the incorporation of no… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(2 citation statements)
references
References 63 publications
(45 reference statements)
0
2
0
Order By: Relevance
“…Cybercrime costs include damage and destruction of data, forensic investigation, restoration and deletion of hacked data and systems, fraud, post-attack disruption to the normal course of business, stolen money, lost productivity, theft of personal and financial data, embezzlement, and reputational harm and theft of intellectual property (Ahmad, 2020). At the same time, the deepest difficulty in maintaining the legitimate/malicious binary -and therefore constructing a stable foundation for cybersecurity itself -is not the range of technological, social, and economic pressures explicitly recognized by cybersecurity experts, but their implicit embrace of cyber-noir (Shires, 2020). Thus, on the one hand, the use of technologies in a digital world is a present need of reality.…”
Section: Currents Issues and Prospects Of Cybersecurity Under The Fight Of Corruption As Its Threatmentioning
confidence: 99%
“…Cybercrime costs include damage and destruction of data, forensic investigation, restoration and deletion of hacked data and systems, fraud, post-attack disruption to the normal course of business, stolen money, lost productivity, theft of personal and financial data, embezzlement, and reputational harm and theft of intellectual property (Ahmad, 2020). At the same time, the deepest difficulty in maintaining the legitimate/malicious binary -and therefore constructing a stable foundation for cybersecurity itself -is not the range of technological, social, and economic pressures explicitly recognized by cybersecurity experts, but their implicit embrace of cyber-noir (Shires, 2020). Thus, on the one hand, the use of technologies in a digital world is a present need of reality.…”
Section: Currents Issues and Prospects Of Cybersecurity Under The Fight Of Corruption As Its Threatmentioning
confidence: 99%
“…It is true that, in computer security specifically, there is a broad literature of fiction about "hackers", where cybersecurity plays an important role in the story. However, and this is very important, in most of them, narrative licences prevail over technical accuracy [12], which goes against any educational purpose.…”
Section: Introductionmentioning
confidence: 99%