/rhetsec_

/other_writing

/visaudio

/eva

references

  • 97% Of People Globally Unable to Correctly Identify Phishing Emails. (2015). Retrieved from https://www.businesswire.com/news/home/20150512005245/en/97-People-Globally-Unable-Correctly-Identify-Phishing.
  • Amoroso, E. (2011). Cyber Attacks: Protecting National Infrastructure. Burlington, MA: Butterworth-Heinemann.
  • Ang, M., Mendoza, E., Yaneza, J. (06 August 2019). LokiBot Gains New Persistence Mechanism, Uses Steganography to Hide Its Tracks. Trend Micro: Security Intelligence Blog. Retrieved from https://blog.trendmicro.com/trendlabs-security-intelligence/lokibot-gains-new-persistence-mechanism-uses-steganography-to-hide-its-tracks/.
  • Aristotle, Roberts, W. Rhetoric. (1994). Rhetoric, by Aristotle. Retrieved from http://classics.mit.edu/Aristotle/rhetoric.html
  • Burke, K. (2013). A rhetoric of motives. Berkeley, CA: Univ. of California Press.
  • Baudrillard, J., & Glaser, S. F. (1995). Simulacra and simulation. Ann Arbor: University of Michigan Press.
  • Bawarshi, A. S., & Reiff, M. J. (2010). Genre: an introduction to history, theory, research, and pedagogy. West Lafayette, IN: Parlor Press.
  • Brewington, A. et al. Russia Indictment 2.0: What to Make of Mueller's Hacking Indictment. (2019, January 4). Retrieved from https://www.lawfareblog.com/russia-indictment-20-what-make-muellers-hacking-indictment.
  • Brinton, A. (1986). Ēthotic Argument. History of Philosophy Quarterly, 3(3), 245-258. Retrieved from www.jstor.org/stable/27743772
  • Carpenter, P., Budge, J., O’Malle, C. (26 September 2019). In the Hot Seat: Three Experts Tackle 10 Critical Security Awareness Issues. KnowBe4. Retrieved from https://event.on24.com/wcc/r/2090640/094544FEFFA8D253A355F792E87DC543.
  • Cheney, G., Christensen, L., Conrad, C., Lair, D. (2004). The sage handbook of organizational discourse. Corporate Rhetoric as Organizational Discourse. London: SAGE Publications.
  • CISA. (2019). Retrieved from https://www.us-cert.gov/.
  • Clancy, J. P. (2016, November 23). John Podesta and Colin Powells Email Accounts Hacked – And How. Retrieved from https://www.offsiteit.com/john-podesta-and-colin-powells-email-accounts-hacked-and-how.
  • Cline, C. (2019). [September Live Demo] PhishER Demo: Identify and Respond to Email Threats Faster with PhishER. KnowBe4. Retreived from https://event.on24.com/wcc/r/2062212/4A9B17B9C64957A7B1F2978728999287.
  • Cohen, Joseph Paul, and Henry Z. Lo. (2014). Academic Torrents: A Community-Maintained Distributed Repository. Annual Conference of the Extreme Science and Engineering Discovery Environment. doi: 10.1145/2616498.2616528.
  • Dulaney, E. A. (2014). CompTIA security study guide: exam syo-401. Hoboken: John Wiley & Sons.
  • Erickson, J. (2008). Hacking: the art of exploitation. San Francisco: No Starch Press.
  • Franceschi-Bicchierai, L. (2016, October 20). How Hackers Broke Into John Podesta and Colin Powell's Gmail Accounts. Retrieved from https://www.vice.com/en_us/article/mg7xjb/how-hackers-broke-into-john-podesta-and-colin-powells-gmail-accounts.
  • Giltrow, J., & Stein, D. (2009). Genres in the internet: issues in the theory of genre (New Series, 188). Amsterdam: Benjamins.
  • Goud, N. Cybersecurity Insiders (2019, May 8). Verizon survey confirms C-Suite employees are vulnerable to Cyber Attacks. Retrieved from https://www.cybersecurity-insiders.com/verizon-survey-confirms-c-suite-employees-are-vulnerable-to-cyber-attacks/.
  • Linsky, R. H. M., Meyerson, D., Kegan, R., Lahey, L., Kotter, J. P., & Nayar, V. (2016, January 21). A Survival Guide for Leaders. Retrieved from https://hbr.org/2002/06/a-survival-guide-for-leaders.
  • Herzfeld, N. (2002). Creating in Our Own Image: Artificial Intelligence and the Image of God. Zygon, 37(2), 303–316. doi: 10.1111/0591-2385.00430.
  • Hoskins, Brittany Noel. (2015) The Rhetoric of Commoditized Vulnerabilities: Ethical Discourses in Cybersecurity. Virginia Tech.
  • Jensen, K. (2011). A Matter of Concern: Kenneth Burke, Phishing, and the Rhetoric of National Insecurity. Rhetoric Review, 30(2), 170–190. doi: 10.1080/07350198.2011.552378.
  • Krug, S. (2006). Dont make me think: a common sense approach to Web usability. Berkeley, Calif: New Riders Pub.
  • Lakoff, G., & Johnson, M. (1981). Metaphors we live by. Chicago: University of Chicago Press.
  • Malware Bytes Blog. (2019) Retrieved from https://blog.malwarebytes.com.
  • McLuhan, M. (1969). Counterblast. Harcourt, CT:Brace & World, inc.
  • McLuhan, M. & Fiore, Q. (2008) The Medium is the Massage. London: Penguin.
  • Mead, J. (2015) Understanding Enthymeme and Warrants Through Syllogism For English 191.
  • Miller, C. (1084) Genre as Social Action. Quarterly Journal of Speech. Vol 70.
  • Mills, G. & Petrie, H. (1968) The role of logic in rhetoric. Quarterly Journal of Speech, 54:3. 260-267. doi: 10.1080/00335636809382899.
  • Myerson, G. (2001). Heidegger, Habermas and the mobile phone. Duxford: Icon.
  • キーワードで動画検索 ミク. (2019). Retrieved from https://www.nicovideo.jp/search/%E3%83%9F%E3%82%AF.
  • Pfleeger, C. & Pfleeger, S. (2007). Security in Computing. Upper Saddle River, NJ: Prentice Hall.
  • Ramage, J. (2005) Rhetoric: a user's guide. New York: Pearson.
  • Ramage, J., Bean, J., & Johnson, J. (2007). Writing Arguments: A Rhetoric with Readings. New York: Pearson/Longman.
  • Ray, V., Duncan, B. (07 February 2018). "Compromised Servers & Fraud Accounts: Recent Hancitor Attacks." Retreived from https://unit42.paloaltonetworks.com/unit42-compromised-servers-fraud-accounts-recent-hancitor-attacks/.
  • Rosenfeld, L. (1969) Set theory: key to the understanding of Kenneth Burke's use of the term “identification”. Western Speech, 33:3 175-183. doi: 10.1080/10570316909384575.
  • Ross, D. G. (2009) ARS Dictaminis Perverted: The Personal Solicitation E-Mail as a Genre. Journal of Technical Writing and Communication. 39(1). 25-41.
  • Searles, C. (2015). Please stop sending passwords via email! Retrieved from https://www.searlesgraphics.com/blog/2120/please-stop-sending-passwords-via-email.
  • Sipser, M. (2006). Introduction to the Theory of Computation. Boston, MA: Thomson Course Technology.
  • Sloane, T. O. (2001). Encyclopedia of rhetoric. New York, NY: Oxford University Press.
  • Spinello, R. & Tavani, H. (2004). Readings in Cyberethics. Boston, MA: Jones and Bartlett Publishers.
  • Toulmin, S. (2008). The uses of argument. Cambridge: Cambridge University Press.
  • Virus Total. (2019) Retrieved from https://www.virustotal.com.
  • Wall, D. (2008) Cybercrime and the Culture of Fear. Information, Communication & Society, 11(6). 861-884.
  • Wall, D. (2008) Cybercrime, media and insecurity: The shaping of public perceptions of cybercrime. International Review of Law, Computers and Technology. 22(1-2). 45-63.
  • Wei, Y. (2002) Corporate image as collective ethos: a poststructuralist approach. Corporate Communications: An International Journal. 7(4). 269-276.
  • Wall, L. (1995) Perl & Linguistics. Retrieved from http://www.wall.org/~larry/natural.html.
  • Williams, J. (2003) The Craft of Argument, Concise Edition. New York:Longman.
  • YouTube. (2016) Tech insider: japanese popstar is a hologram. Retreieved from https://www.youtube.com/watch?v=Nfhuj60cJjk.
Activate Windows
Go to Settings to activate Windows.