Skip to main content

Don’t Tell Me the Cybersecurity Moon Is Shining…

Cybersecurity Show and Tell

  • Chapter
  • First Online:
Imagine Math 8

Abstract

“Show, don’t tell” has become the literary commandment for any writer. It applies to all forms of fiction, and to non-fiction, including scientific writing, where it lies at the heart of many scientific communication and storytelling approaches. In this chapter, I discuss how “show and tell” is actually often the best approach when one wants to present, teach, or explain complicated ideas such as those underlying notions and results in mathematics and science and in particular in cybersecurity. I discuss how different kinds of artworks can be used to explain cybersecurity, and I illustrate how telling (i.e., explaining notions in a formal technical way) can be paired with showing through visual storytelling or other forms of storytelling. I also discuss four categories of artworks and the explanations they help provide.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    See also Edge.org, the website of the Edge Foundation, Inc., which was launched in 1996 as the online version of “The Reality Club” to display the activities of “The Third Culture.”

  2. 2.

    In 1921, the advertising trade journal “Printer’s Ink” published an article by Frederick R. Barnard titled “One Look is Worth a Thousand Words” in which Barnard claims that the phrase has Japanese origin. But in 1927, “Printer’s Ink” published an advert by Barnard with the phrase “One Picture Worth Ten Thousand Words,” where it is labeled a Chinese proverb. The Japanese and Chinese attributions were meant to give it more credibility, a sense of gravitas and a touch of mystery and philosophy, so much so that the proverb is nowadays commonly, and wrongly, attributed to the Chinese philosopher and politician Confucius.

  3. 3.

    “Show and tell” is also the name of a common classroom activity in elementary schools, especially in English-speaking countries, in which a child brings an item from home and explains to the class why he/she chose that item and other relevant information. This activity is useful also for adults [17], but it is quite different from the show and tell that Roam champions and the one that I discuss here.

  4. 4.

    This is an homage to another great car chase, the one in “To Live and Die in L.A.” [27].

  5. 5.

    This is reminiscent of the way in which a musical score adds an emotional layer to the images of a film, thus contributing in a fundamental way to the storytelling. This has been explained brilliantly by Stewart Copeland in the second episode, aptly titled “Telling Tales,” of the documentary [28], in which Copeland discusses music in films with composer Danny Elfman:

    Copeland::

    Why do the directors need this? They’re telling a perfectly good story, with a perfectly terrifying antagonist, a handsome protagonist, a beautiful love interest. Why do they need music?

    Elfman::

    Because music does something they learned very early on, that the pictures couldn’t do.

    Copeland::

    Take the decidedly lukewarm chills of early horror movies, for example.

    Elfman::

    In the very first Frankenstein and the first Dracula, no music. All music was, in the first films, was opening and closing, like a play, and then they figured out a few years later, 1933 and 1935, “Why don’t we take it up a level?” If you put this dramatic music, it really raises the stakes.

    Copeland::

    As shown in in the pioneering movie King Kong.

    Elfman::

    And if you put something heartbreaking when, you know, your hero or heroine is going to die, it really raises the stakes. […] It goes straight to the heart.

    In addition to “Frankenstein” [29], “Dracula,” [30] and “King Kong” [31], Copeland and Elfman then also discuss on how Bernard Herrmann’s score punctuates and amplifies Alfred Hitchcock’s images in the movie “Vertigo.”

  6. 6.

    I have also some experience with this: in the early Noughties, I wrote a play about the French mathematician Évariste Galois, who was killed in a duel at age 20 in 1832 [33,34,35]. The Teatro Stabile di Genova, which produced the play, had the brilliant idea to schedule morning performances for middle and high school students, and I have been told by many of them that they had never thought that mathematics could be thrilling and moving.

  7. 7.

    That quote was inspired by the article “The Conscience of a Hacker” written by the real-life hacker “The Mentor” shortly after his arrest [44]. The article ends with the following words:

    This is our world now…the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn’t run by profiteering gluttons, and you call us criminals. We explore…and you call us criminals. We seek after knowledge…and you call us criminals. We exist without skin color, without nationality, without religious bias…and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it’s for our own good, yet we’re the criminals.

    Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for.

    I am a hacker, and this is my manifesto. You may stop this individual, but you can’t stop us all…after all, we’re all alike.

  8. 8.

    See also the collection of stories of code and ciphers edited by Raymond T. Bond [77].

  9. 9.

    There is no such thing as a professor of symbology in real life, but it is tightly connected to the actual discipline of semiotics, which in turn has been investigated also in the context of cryptography [88].

  10. 10.

    “Con Air,” “National Treasure,” “Windtalkers,” “Face/Off”, …, Nicolas Cage has starred in so many cybersecurity-related movies that he would deserve a dedicated paper, perhaps titled “Explaining Cybersecurity with Nicolas Cage” or even better “Nicolas Cage is the Center of the Cybersecurity Universe.” In fact, since writing the first draft of this chapter, I have published precisely such a paper [98].

  11. 11.

    Multi-factor authentication (MFA) is an authentication solution that aims to augment the security of the basic username–password authentication by exploiting two or more authentication factors. In [101], MFA is for instance defined as:

    a procedure based on the use of two or more of the following elements—categorised as knowledge, ownership and inherence: (i) something only the user knows, e.g., static password, code, personal identification number; (ii) something only the user possesses, e.g., token, smart card, mobile phone; (iii) something the user is, e.g. a biometric characteristic, such as a fingerprint. In addition, the elements selected must be mutually independent […] at least one of the elements should be non-reusable and non-replicable.

    The underlying idea is that the more factors are used during the authentication process, the more confidence a service has that the user is correctly identified.

  12. 12.

    Collegno is a small town in the North-West of Italy and the case is known in Italy more colloquially as the “Smemorato di Collegno,” i.e., the amnesiac of Collegno.

References

  1. Yarmolinsky, A.: The Unknown Chekhov: Stories and Other Writings Hitherto Untranslated. Noonday Press, New York (1954)

    Google Scholar 

  2. Lubbock, P.: The Craft of Fiction. Jonathan Cape, London (1921)

    Google Scholar 

  3. King, S.: On Writing: A Memoir of the Craft. Scribner’s, New York (2000)

    Google Scholar 

  4. Brockman, J.: The Third Culture: Beyond the Scientific Revolution. Simon & Schuster (1995). See also the website of the Edge Foundation, Inc. at https://www.edge.org

  5. Capozucca, A.: Comunicare la matematica. Egea, Milan (2018)

    Google Scholar 

  6. Erwig, M.: Once Upon an Algorithm: How Stories Explain Computing. MIT Press, Cambridge (2011)

    Google Scholar 

  7. Gouthier, D.: Scrivere di scienza. Codice (2019)

    Google Scholar 

  8. Harding, A.: Storytelling for tertiary mathematics students. In: Invited Lectures from the 13th International Congress on Mathematical Education, pp. 195–207. Springer, Berlin (2018)

    Google Scholar 

  9. Mehlmann, A.: The Game’s Afoot!: Game Theory in Myth and Paradox. American Mathematical Society, Providence (2000)

    MATH  Google Scholar 

  10. Haven, K.F.: Super Simple Storytelling: A Can-do Guide for Every Classroom. Teacher Ideas Press, New York (2000)

    Google Scholar 

  11. Zazkis, R., Liljedahl, P.: Teaching Mathematics As Storytelling. Sense Publishers, Rotterdam (2009)

    Book  Google Scholar 

  12. Bella, G., Viganò, L.: Security is beautiful. In: Security Protocols XXIII, Revised Selected Papers, LNCS 9379, pp. 247–250. Springer, Berlin (2015). https://doi.org/10.1007/978-3-319-26096-9_25

  13. Bella, G., Renaud, K., Sempreboni, D., Viganò, L.: An investigation into the "Beautification" of security ceremonies. In: Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, ICETE 2019, Vol.2: SECRYPT, 16th International Conference on Security and Cryptography, pp. 125–136. Scitepress Digital Library, Portugal (2019). https://doi.org/10.5220/0007921501250136

  14. Egan, K.: Teaching as Story Telling: An Alternative Approach to Teaching and Curriculum in the Elementary School. University of Chicago Press, Chicago (1986)

    Google Scholar 

  15. Roam, D.: The Back of the Napkin: Solving Problems and Selling Ideas With Pictures. Portfolio Hardcover, London (2008)

    Google Scholar 

  16. Roam, D.: Show and Tell: How Everybody Can Make Remarkable Presentations. Portfolio Hardcover, London (2014)

    Google Scholar 

  17. Nelson, D.H.: D. and E.: Show and Tell, Grown Up. Language Arts 53, 203–205 (1976)

    Google Scholar 

  18. Roam, D.: Authors@Google presents Dan Roam: The Back of the Napkin. https://www.youtube.com/watch?v=kuA_yz7aTo0 (2008). Last Accessed 28 Feb 2021

  19. Viganò, L.: Explaining Cybersecurity with Films and the Arts. In: Emmer, M., Abate, M. (eds.) Imagine Math, vol. 7, pp. 297–309. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-42653-8_18

    Chapter  Google Scholar 

  20. Viganò, L., Magazzeni, D.: Explainable Security. In: IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops 2020, pp. 293–300. IEEE (2020). https://doi.org/10.1109/EuroSPW51379.2020.00045. A preliminary version appeared as Explainable Security. CoRR (2018). http://arxiv.org/abs/1807.04178

  21. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–88 (1981)

    Article  Google Scholar 

  22. Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE J. Select. Areas Commun. 16(4), 482–494 (1998)

    Article  Google Scholar 

  23. Bleumer, G.: Untraceability. In: Van Tilborg, H.C., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security. Springer, Berlin (2011)

    Google Scholar 

  24. Kubrick, S. (directed by): Spartacus (1960). Screenplay by Dalton Trumbo based on the novel by Howard Fast, https://www.imdb.com/title/tt0054331/

  25. McTiernan, J. (directed by): The Thomas Crown Affair (1999). Screenplay by Leslie Dixon and Kurt Wimmer, story by Alan R. Trustman, https://www.imdb.com/title/tt0155267/

  26. Wright, E. (directed by): Baby Driver (2017). Screenplay by Edgar Wright, https://www.imdb.com/title/tt3890160/

  27. Friedkin, W. (directed by): To Live and Die in L.A. (1985). Screenplay by William Friedkin and Gerald Petievich based on the novel by Gerald Petievich, https://www.imdb.com/title/tt0090180/

  28. Wasserman, N. (directed by): Stewart Copeland’s Adventures in Music — Episode 2: “Telling Tales” (2020). Written by Stewart Copeland, https://www.imdb.com/title/tt11676040/

  29. Whale, J. (directed by): Frankenstein (1931). Screenplay by Garrett Fort and Francis Edward Faragoh, from the play by Peggy Webling and John L. Balderston, based on the novel by Mary Shelley, https://www.imdb.com/title/tt0021884/

  30. Browning, T. (directed by), Freund, K. (uncredited): Dracula (1931). Written by Garrett Fort, from the play by Hamilton Deane and John L. Balderston, based on the novel by Bram Stoker, https://www.imdb.com/title/tt0021814/

  31. Cooper, M.C., Schoedsack, E.B. (directed by): King Kong (1933). Screenplay by James Creelman and Ruth Rose, https://www.imdb.com/title/tt0024216/

  32. Viganò, L.: Il mio Galois. In: Emmer, M. (ed.) Matematica e Cultura 2004, pp. 171–178. Springer, Berlin (2004)

    Google Scholar 

  33. Viganò, L.: Galois. Il Nuovo Melangolo, Genoa (2005)

    Google Scholar 

  34. Viganò, L.: Évariste Galois: Un tragico eroe romantico. In: Manaresi, M. (ed.) Matematica e cultura in Europa, pp. 339–348. Springer, Berlin (2005). Extended version of [32]

    Google Scholar 

  35. Viganò, L.: Évariste Galois: a tragic romantic hero. In: Manaresi, M. (ed.) Mathematics and Culture in Europe, pp. 333–344. Springer, Berlin (2007). English translation of [34] and extended version of [36]

    Google Scholar 

  36. Viganò, L.: My Galois. In: Emmer, M. (ed.) Mathematics and Culture IV, pp. 171–178. Springer, Berlin (2007). English translation of [32]

    Google Scholar 

  37. Hofstadter, D.: Gödel, Escher, Bach: An Eternal Golden Braid. Basic Books, New York (1980)

    MATH  Google Scholar 

  38. Softley, I. (directed by): Hackers (1995). Screenplay by Rafael Moreu, https://www.imdb.com/title/tt0113243/

  39. Tyldum, M. (directed by): The Imitation Game (2014). Screenplay by Graham Moore based on the book by Andrew Hodges, https://www.imdb.com/title/tt2084970/

  40. Apted, M. (directed by): Enigma (2001). Screenplay by Tom Stoppard based on the novel by Robert Harris, https://www.imdb.com/title/tt0157583/

  41. Howard, R. (directed by): A Beautiful Mind (2001). Screenplay by Akiva Goldsman based on the book by Sylvia Nasar, https://www.imdb.com/title/tt0268978/

  42. Blair, G. (directed by): Secrets of Scotland Yard (1944). Screenplay by Denison Clift adapted from the novel “Room 40, O.B.”, https://www.imdb.com/title/tt0037255/

  43. Greene, D. (directed by): Sebastian (1968). Screenplay by Gerald Vaughan-Hughes, original story by Leo Marks, https://www.imdb.com/title/tt0063570/

  44. The Mentor: The conscience of a hacker. Phrack Inc., vol. 1, Issue 7, Phile 3 of 10, http://phrack.org/issues/7/3.html (last accessed May 2021) (January 8, 1986)

  45. Robinson, P.A. (directed by): Sneakers (1992). Screenplay by Phil Alden Robinson, Lawrence Lasker and Walter F. Parkes, https://www.imdb.com/title/tt0105435/

  46. Badham, J. (directed by): Wargames (1983). Screenplay by Lawrence Lasker and Walter F. Parkes, https://www.imdb.com/title/tt0086567/

  47. Sena, D. (directed by): Swordfish (2001). Screenplay by Skip Woods, https://www.imdb.com/title/tt0244244/

  48. Winkler (directed by), I.: The Net (1995). Screenplay by John Brancato and Michael Ferris, https://www.imdb.com/title/tt0113957/

  49. Gordon, S. (directed by): Fortress (1992). Screenplay by Troy Neighbors, Steven Feinberg, David Venable and Terry Curtis Fox, https://www.imdb.com/title/tt0106950/

  50. Wiseman, L. (directed by): Live Free or Die Hard (2007). Screenplay by Mark Bomback based on a story by Mark Bomback and David Marconi, on an article by John Carlin and on characters by Roderick Thorp, https://www.imdb.com/title/tt0337978/

  51. Esmail, S. (created by): Mr. Robot (2015–2019). 4 seasons, 45 episodes, https://www.imdb.com/title/tt4158110/

  52. Burt, G. (created by): The Bletchley Circle (2012–2014). 2 seasons, 7 episodes, https://www.imdb.com/title/tt2275990/

  53. Good, L. (created by): The Bletchley Circle: San Francisco (2018). 1 season, 8 episodes, https://www.imdb.com/title/tt7978912/

  54. Donahue, A., Mendelsohn, C., Zuiker, A.E. (created by): CSI: Cyber (2015–2016). 2 seasons, 31 episodes, https://www.imdb.com/title/tt3560060/

  55. Mann, M. (directed by): Blackhat (2015). Screenplay by Morgan Davis Foehl, https://www.imdb.com/title/tt2717822/

  56. Stone, O. (directed by): Snowden (2016). Screenplay by Kieran Fitzgerald and Oliver Stone based on the book by Luke Harding and Anatoly Kucherena, https://www.imdb.com/title/tt3774114/

  57. Price, T.: Teh Internet Is Serious Business. Bloomsbury Methuen Drama, London (2014)

    Google Scholar 

  58. Eisenberg, M.: Hackers. Samuel French, New York (1999)

    Google Scholar 

  59. Haley, J.: The Nether. Faber & Faber (2014)

    Google Scholar 

  60. Gibson, W.: Sprawl trilogy: Neuromancer, Count Zero, Mona Lisa Overdrive. Victor Gollancz Ltd (1984–1988)

    Google Scholar 

  61. Stephenson, N.: Snow Crash. Bantam Books, New York (1992)

    Google Scholar 

  62. Stephenson, N.: Cryptonomicon. Avon, New York (1999)

    Google Scholar 

  63. Brown, D.: Digital Fortress. St. Martin’s Press, New York (1998)

    Google Scholar 

  64. Larsson, S.: Millennium Trilogy: The Girl with the Dragon Tattoo, The Girl Who Played with Fire, The Girl Who Kicked the Hornet’s Nest. Knopf, New York (2008)

    Google Scholar 

  65. Oplev, N.A. (directed by): The Girl with the Dragon Tattoo (2009). Screenplay by Nikolaj Arcel and Rasmus Heisterberg based on the novel by Stieg Larsson, https://www.imdb.com/title/tt1132620/

  66. Alfredson, D. (directed by): The Girl Who Played with Fire (2009). Screenplay by Jonas Frykberg based on the novel by Stieg Larsson, https://www.imdb.com/title/tt1216487/

  67. Alfredson, D. (directed by): The Girl Who Kicked the Hornet’s Nest (2009). Screenplay by Jonas Frykberg based on the novel by Stieg Larsson, https://www.imdb.com/title/tt1343097/

  68. Fincher, D. (directed by): The Girl with the Dragon Tattoo (2011). Screenplay by Steven Zaillian based on the novel by Stieg Larsson, https://www.imdb.com/title/tt1568346/

  69. Lagercrantz, D.: The Girl in the Spider’s Web. MacLehose Press, London (2015)

    Google Scholar 

  70. Alvarez, F. (directed by): The Girl in the Spider’s Web (2018). Screenplay by Jay Basu, Fede Alvarez and Steven Knight based on the novel by David Lagercrantz, with characters introduced in the Millenium series by Stieg Larsson, https://www.imdb.com/title/tt1568346/

  71. Poe, E.: The Gold Bug. The Dollar (1843)

    Google Scholar 

  72. Fincher, D. (directed by): Zodiac (2007). Screenplay by James Vanderbilt from the book by Robert Graysmith, https://www.imdb.com/title/tt0443706/

  73. West, S. (directed by): Con Air (1997). Screenplay by Scott Rosenberg, https://www.imdb.com/title/tt0118880/

  74. Falacci, N., Heuton, C. (created by): NUMB3RS (2005–2010). 6 seasons, 119 episodes, https://www.imdb.com/title/tt0433309/

  75. Dooley, J.F.: Codes and ciphers in fiction: an overview. Cryptologia 29, 290–328 (2005)

    Article  Google Scholar 

  76. Dooley, J.F.: Codes and villains and mystery: the best stories with codes and ciphers 1843–1920. CreateSpace Independent Publishing Platform (2016). See also the “Cryptology in Fiction” document at https://www.johnfdooley.com

  77. Bond, R.T. (ed.): Famous Stories of Code and Cipher. Rinehart (1947)

    Google Scholar 

  78. Poe, E.: A Few Words on Secret Writing (1841). Graham’s Magazine, 19

    Google Scholar 

  79. Doyle, A.C.: The Adventure of the Dancing Men. The Strand Magazine (1903)

    Google Scholar 

  80. Doyle, A.C.: The Valley of Fear. The Strand Magazine (1914–1915)

    Google Scholar 

  81. Springer, N.: The Enola Holmes Mysteries. Penguin Young Readers, London (2006–2010)

    Google Scholar 

  82. Fisher, T. (directed by): Sherlock Holmes and the Deadly Necklace (1962). Screenplay by Curt Siodmak based on the novel [78] by Arthur Conan Doyle, https://www.imdb.com/title/tt0056480/

  83. Bradbeer, H. (directed by): Enola Holmes (2020). Screenplay by Jack Thorne based on the novel “The Case of the Missing Marquess: An Enola Holmes Mystery” by Nancy Springer, https://www.imdb.com/title/tt7846844/

  84. Thompson, S. (episode written by), Gatiss and Steven Moffat, M. (“Sherlock” series created by): The Blind Banker (2015–2019). https://www.imdb.com/title/tt1664529/

  85. Sayers, D.L.: Have His Carcase. Victor Gollancz, London (1932)

    Google Scholar 

  86. Turteltaub, J. (directed by): National Treasure (2004). Screenplay by Jim Kouf, Cormac Wibberley and Marianne Wibberley, https://www.imdb.com/title/tt0368891/

  87. Turteltaub, J. (directed by): National Treasure: Book of Secrets (2007). Screenplay by Marianne Wibberley and Cormac Wibberley, https://www.imdb.com/title/tt0465234/

  88. Marrone, C.: I Segni Dell’Inganno – Semiotica della Crittografia. Stampa Alternativa, Rome (2010)

    Google Scholar 

  89. Brown, D.: Robert Langdon series: Angels & Demons, The Da Vinci Code, The Lost Symbol, Inferno, Origin. Doubleday, New York (2000–2017)

    Google Scholar 

  90. Howard, R. (directed by): The Da Vinci Code (2006). Screenplay by Akiva Goldsman based on the novel by Dan Brown, https://www.imdb.com/title/tt0382625/

  91. Howard, R. (directed by): Angels & Demons (2009). Screenplay by David Koepp and Akiva Goldsman based on the novel by Dan Brown, https://www.imdb.com/title/tt0808151/

  92. Howard, R. (directed by): Inferno (2016). Screenplay by David Koepp based on the novel by Dan Brown, https://www.imdb.com/title/tt3062096/

  93. Ludlum, R.: Bourne series: The Bourne Identity, The Bourne Supremacy, The Bourne Ultimatum. Richard Marek, Randum House, Randum House (1980, 1986, 1990)

    Google Scholar 

  94. Astley, N., Baker, M. (created by): Peppa Pig, Series 3, Episode 38, “The Secret Club” (2010). 7 seasons, 302 episodes. https://www.imdb.com/title/tt0426769/

  95. Woo, J. (directed by): Windtalkers (2002). Screenplay by John Rice and Joe Batteer, https://www.imdb.com/title/tt0245562/

  96. Gordon, S. (directed by): Identity Thief (2013). Screenplay by Craig Mazin, https://www.imdb.com/title/tt2024432/

  97. Woo, J. (directed by): Face/Off (1997). Screenplay by Mike Webb and Michael Colleary, https://www.imdb.com/title/tt0119094/

  98. Viganò, L.: Nicolas Cage is the center of the cybersecurity universe. In: Human-Computer Interaction – INTERACT 2021, pp. 14–33. Springer Nature Switzerland AG (2021). https://doi.org/10.1007/978-3-030-85623-6_3

  99. Loncraine, R. (directed by): Firewall (2006). Screenplay by Joe Forte, https://www.imdb.com/title/tt0408345/

  100. Fedak, C., Schwartz, J. (created by): Chuck (2007–2012). 5 seasons, 91 episodes, https://www.imdb.com/title/tt0934814/

  101. European Central Bank: Final guidelines on the security of Internet payments (2014)

    Google Scholar 

  102. Bird, B. (directed by): Incredibles 2 (2018). Screenplay by Brad Bird, https://www.imdb.com/title/tt3606756/

  103. Letterman, R., Vernon, C. (directed by): Monsters vs. Aliens (2009) . Screenplay by Maya Forbes, Wallace Wolodarsky, Rob Letterman, Jonathan Aibel and Glenn Berger, https://www.imdb.com/title/tt0892782/

  104. Hartman (directed by), D.: Tigger & Pooh and a Musical Too (2009). Screenplay by Nicole Dubuc, Brian Hohlfeld and Dean Stefan, “Password Song” written by Andy Sturmer and Brian Hohlfeld, https://www.imdb.com/title/tt1415904/

  105. Brooks, J.L., Groening, M., Simon, S. (created by): The Simpsons (1989). 32 seasons, 707 episodes, https://www.imdb.com/title/tt0096697/

  106. Cohen, D.X., Groening, M. (created by): Futurama (1999–2013). 10 seasons, 140 episodes, https://www.imdb.com/title/tt0149460/

  107. Singh, S.: The Simpsons and Their Mathematical Secrets. Bloomsbury, London (2013)

    MATH  Google Scholar 

  108. The Pierces: Secret (2007). First track of the album Thirteen Tales of Love and Revenge

    Google Scholar 

  109. Moore, A., Lloyd, D.: V for Vendetta. Vertigo (DC Comics), New York (1982–1989)

    Google Scholar 

  110. McTeigue, J. (directed by): V for Vendetta (2005). Screenplay by Lilly Wachowski and Lana Wachowski based on Moore, A., Lloyd, D.: V for Vendetta. Vertigo (DC Comics), New York (1982–1989). https://www.imdb.com/title/tt0434409/

  111. Dumas père, A. (avec la collaboration d’Auguste Maquet): Les Trois Mousquetaires. Le Siècle (1844)

    Google Scholar 

  112. Grimm, J., Grimm, W.: Kinder- und Hausmärchen (1812–1858)

    Google Scholar 

  113. Lewis, J.: The Wife Of Martin Guerre. Swallow Press, Athens (1967)

    Google Scholar 

  114. Sciascia, L.: La sentenza memorabile. Sellerio, Palermo (1982)

    Google Scholar 

  115. Vigne, D. (directed by): Le retour de Martin Guerre (1982). Screenplay by Jean-Claude Carrière, Daniel Vigne and Natalie Zemon Davis based on the novel by Lewis, J.: The Wife Of Martin Guerre. Swallow Press, Athens (1967). https://www.imdb.com/title/tt0084589/

  116. Amiel, J. (directed by): Sommersby (1993). Screenplay by Nicholas Meyer and Sarah Kernochan based on the screenplay of [112], https://www.imdb.com/title/tt0108185/

  117. Schönberg, C.-M., Boublil, A. (Book), Boublil, A., Hardy, E., Clark, S. (Lyrics), Schönberg, C.-M. (Music): Martin guerre (a musical love story) (1996)

    Google Scholar 

  118. Davis, N.Z.: The Return of Martin Guerre. Harvard University Press, Cambridge (1983)

    Google Scholar 

  119. Sciascia, L.: Il teatro della memoria. Einaudi, Torino (1981)

    Google Scholar 

  120. Pirandello, L.: Come tu mi vuoi (1929)

    Google Scholar 

  121. Fitzmaurice, G. (directed by): As You Desire Me (1932). Screenplay by Gene Markey based on the play (Pirandello, L.: Come tu mi vuoi), https://www.imdb.com/title/tt0022641/

  122. Festa Campanile, P. (directed by): Uno scandalo perbene (A Proper Scandal) (1984). Screenplay by Suso Cecchi D’Amico and Pasquale Festa Campanile, https://www.imdb.com/title/tt0122241/

  123. Ariemma, T.: La filosofia spiegata con le serie TV. Mondadori, Milan (2017)

    Google Scholar 

  124. Cabrera, J.: Da Aristotele a Spielberg. Capire la filosofia attraverso i film. Bruno Mondadori editore, Rome (2007)

    Google Scholar 

  125. Mordacci, R. (ed.): Come fare filosofia con i film. Carocci editore, Rome (2017)

    Google Scholar 

  126. Marcus, A.S., Metzger, S.A., Paxton, R.J., Stoddard, J.D. (eds.): Teaching History With Film: Strategies for Secondary Social Studies, 2nd edn. Routledge, Milton Park (2018)

    Google Scholar 

  127. Russell III, W.B.: The art of teaching social studies with film. Clearing House J. Edu. Strategies, Issues Ideas 85(4), 157–164 (2012)

    Google Scholar 

  128. Champoux, J.E.: Management: Using Film to Visualize Principles and Practice. South-Western, Hubballi (2000)

    Google Scholar 

  129. Champoux, J.E.: Organizational Behavior: Using Film to Visualize Principles and Practices. South-Western, Hubballi (2000)

    Google Scholar 

  130. Engert, S., Spencer, A.: International relations at the movies: teaching and learning about international politics through film. Perspectives 17(1), 83–104 (2009)

    Google Scholar 

  131. Valeriano, B.: Teaching introduction to international politics with film. J. Polit. Sci. Ed. 9, 52–72 (2013)

    Google Scholar 

  132. Rubin, L.C. (ed.): Mental Illness in Popular Media: Essays on the Representation of Disorders. McFarland & Co, Jefferson (2012)

    Google Scholar 

  133. Blasco, J., Quaglia, E.A.: InfoSec cinema: Using films for information security teaching. In: 2018 USENIX Workshop on Advances in Security Education, ASE 2018. USENIX Association, Berkeley (2018)

    Google Scholar 

Download references

Acknowledgements

This work was supported by the King’s Together Multi and Interdisciplinary Research Scheme, King’s College London, UK. Thanks to Giampaolo Bella, Gabriele Costa, Alistair Gentry, Sally Marlow, Hannah Redler Hawes and Diego Sempreboni for their invaluable contributions and to Michele Emmer, Ashwin Mathew, Alessandra Di Pierro, and Aldo and Claudia Viganò for many useful suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Luca Viganò .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Viganò, L. (2022). Don’t Tell Me the Cybersecurity Moon Is Shining…. In: Emmer, M., Abate, M. (eds) Imagine Math 8. Springer, Cham. https://doi.org/10.1007/978-3-030-92690-8_30

Download citation

Publish with us

Policies and ethics