Abstract
“Show, don’t tell” has become the literary commandment for any writer. It applies to all forms of fiction, and to non-fiction, including scientific writing, where it lies at the heart of many scientific communication and storytelling approaches. In this chapter, I discuss how “show and tell” is actually often the best approach when one wants to present, teach, or explain complicated ideas such as those underlying notions and results in mathematics and science and in particular in cybersecurity. I discuss how different kinds of artworks can be used to explain cybersecurity, and I illustrate how telling (i.e., explaining notions in a formal technical way) can be paired with showing through visual storytelling or other forms of storytelling. I also discuss four categories of artworks and the explanations they help provide.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
See also Edge.org, the website of the Edge Foundation, Inc., which was launched in 1996 as the online version of “The Reality Club” to display the activities of “The Third Culture.”
- 2.
In 1921, the advertising trade journal “Printer’s Ink” published an article by Frederick R. Barnard titled “One Look is Worth a Thousand Words” in which Barnard claims that the phrase has Japanese origin. But in 1927, “Printer’s Ink” published an advert by Barnard with the phrase “One Picture Worth Ten Thousand Words,” where it is labeled a Chinese proverb. The Japanese and Chinese attributions were meant to give it more credibility, a sense of gravitas and a touch of mystery and philosophy, so much so that the proverb is nowadays commonly, and wrongly, attributed to the Chinese philosopher and politician Confucius.
- 3.
“Show and tell” is also the name of a common classroom activity in elementary schools, especially in English-speaking countries, in which a child brings an item from home and explains to the class why he/she chose that item and other relevant information. This activity is useful also for adults [17], but it is quite different from the show and tell that Roam champions and the one that I discuss here.
- 4.
This is an homage to another great car chase, the one in “To Live and Die in L.A.” [27].
- 5.
This is reminiscent of the way in which a musical score adds an emotional layer to the images of a film, thus contributing in a fundamental way to the storytelling. This has been explained brilliantly by Stewart Copeland in the second episode, aptly titled “Telling Tales,” of the documentary [28], in which Copeland discusses music in films with composer Danny Elfman:
- Copeland::
-
Why do the directors need this? They’re telling a perfectly good story, with a perfectly terrifying antagonist, a handsome protagonist, a beautiful love interest. Why do they need music?
- Elfman::
-
Because music does something they learned very early on, that the pictures couldn’t do.
- Copeland::
-
Take the decidedly lukewarm chills of early horror movies, for example.
- Elfman::
-
In the very first Frankenstein and the first Dracula, no music. All music was, in the first films, was opening and closing, like a play, and then they figured out a few years later, 1933 and 1935, “Why don’t we take it up a level?” If you put this dramatic music, it really raises the stakes.
- Copeland::
-
As shown in in the pioneering movie King Kong.
- Elfman::
-
And if you put something heartbreaking when, you know, your hero or heroine is going to die, it really raises the stakes. […] It goes straight to the heart.
In addition to “Frankenstein” [29], “Dracula,” [30] and “King Kong” [31], Copeland and Elfman then also discuss on how Bernard Herrmann’s score punctuates and amplifies Alfred Hitchcock’s images in the movie “Vertigo.”
- 6.
I have also some experience with this: in the early Noughties, I wrote a play about the French mathematician Évariste Galois, who was killed in a duel at age 20 in 1832 [33,34,35]. The Teatro Stabile di Genova, which produced the play, had the brilliant idea to schedule morning performances for middle and high school students, and I have been told by many of them that they had never thought that mathematics could be thrilling and moving.
- 7.
That quote was inspired by the article “The Conscience of a Hacker” written by the real-life hacker “The Mentor” shortly after his arrest [44]. The article ends with the following words:
This is our world now…the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn’t run by profiteering gluttons, and you call us criminals. We explore…and you call us criminals. We seek after knowledge…and you call us criminals. We exist without skin color, without nationality, without religious bias…and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it’s for our own good, yet we’re the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for.
I am a hacker, and this is my manifesto. You may stop this individual, but you can’t stop us all…after all, we’re all alike.
- 8.
See also the collection of stories of code and ciphers edited by Raymond T. Bond [77].
- 9.
There is no such thing as a professor of symbology in real life, but it is tightly connected to the actual discipline of semiotics, which in turn has been investigated also in the context of cryptography [88].
- 10.
“Con Air,” “National Treasure,” “Windtalkers,” “Face/Off”, …, Nicolas Cage has starred in so many cybersecurity-related movies that he would deserve a dedicated paper, perhaps titled “Explaining Cybersecurity with Nicolas Cage” or even better “Nicolas Cage is the Center of the Cybersecurity Universe.” In fact, since writing the first draft of this chapter, I have published precisely such a paper [98].
- 11.
Multi-factor authentication (MFA) is an authentication solution that aims to augment the security of the basic username–password authentication by exploiting two or more authentication factors. In [101], MFA is for instance defined as:
a procedure based on the use of two or more of the following elements—categorised as knowledge, ownership and inherence: (i) something only the user knows, e.g., static password, code, personal identification number; (ii) something only the user possesses, e.g., token, smart card, mobile phone; (iii) something the user is, e.g. a biometric characteristic, such as a fingerprint. In addition, the elements selected must be mutually independent […] at least one of the elements should be non-reusable and non-replicable.
The underlying idea is that the more factors are used during the authentication process, the more confidence a service has that the user is correctly identified.
- 12.
Collegno is a small town in the North-West of Italy and the case is known in Italy more colloquially as the “Smemorato di Collegno,” i.e., the amnesiac of Collegno.
References
Yarmolinsky, A.: The Unknown Chekhov: Stories and Other Writings Hitherto Untranslated. Noonday Press, New York (1954)
Lubbock, P.: The Craft of Fiction. Jonathan Cape, London (1921)
King, S.: On Writing: A Memoir of the Craft. Scribner’s, New York (2000)
Brockman, J.: The Third Culture: Beyond the Scientific Revolution. Simon & Schuster (1995). See also the website of the Edge Foundation, Inc. at https://www.edge.org
Capozucca, A.: Comunicare la matematica. Egea, Milan (2018)
Erwig, M.: Once Upon an Algorithm: How Stories Explain Computing. MIT Press, Cambridge (2011)
Gouthier, D.: Scrivere di scienza. Codice (2019)
Harding, A.: Storytelling for tertiary mathematics students. In: Invited Lectures from the 13th International Congress on Mathematical Education, pp. 195–207. Springer, Berlin (2018)
Mehlmann, A.: The Game’s Afoot!: Game Theory in Myth and Paradox. American Mathematical Society, Providence (2000)
Haven, K.F.: Super Simple Storytelling: A Can-do Guide for Every Classroom. Teacher Ideas Press, New York (2000)
Zazkis, R., Liljedahl, P.: Teaching Mathematics As Storytelling. Sense Publishers, Rotterdam (2009)
Bella, G., Viganò, L.: Security is beautiful. In: Security Protocols XXIII, Revised Selected Papers, LNCS 9379, pp. 247–250. Springer, Berlin (2015). https://doi.org/10.1007/978-3-319-26096-9_25
Bella, G., Renaud, K., Sempreboni, D., Viganò, L.: An investigation into the "Beautification" of security ceremonies. In: Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, ICETE 2019, Vol.2: SECRYPT, 16th International Conference on Security and Cryptography, pp. 125–136. Scitepress Digital Library, Portugal (2019). https://doi.org/10.5220/0007921501250136
Egan, K.: Teaching as Story Telling: An Alternative Approach to Teaching and Curriculum in the Elementary School. University of Chicago Press, Chicago (1986)
Roam, D.: The Back of the Napkin: Solving Problems and Selling Ideas With Pictures. Portfolio Hardcover, London (2008)
Roam, D.: Show and Tell: How Everybody Can Make Remarkable Presentations. Portfolio Hardcover, London (2014)
Nelson, D.H.: D. and E.: Show and Tell, Grown Up. Language Arts 53, 203–205 (1976)
Roam, D.: Authors@Google presents Dan Roam: The Back of the Napkin. https://www.youtube.com/watch?v=kuA_yz7aTo0 (2008). Last Accessed 28 Feb 2021
Viganò, L.: Explaining Cybersecurity with Films and the Arts. In: Emmer, M., Abate, M. (eds.) Imagine Math, vol. 7, pp. 297–309. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-42653-8_18
Viganò, L., Magazzeni, D.: Explainable Security. In: IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops 2020, pp. 293–300. IEEE (2020). https://doi.org/10.1109/EuroSPW51379.2020.00045. A preliminary version appeared as Explainable Security. CoRR (2018). http://arxiv.org/abs/1807.04178
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–88 (1981)
Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE J. Select. Areas Commun. 16(4), 482–494 (1998)
Bleumer, G.: Untraceability. In: Van Tilborg, H.C., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security. Springer, Berlin (2011)
Kubrick, S. (directed by): Spartacus (1960). Screenplay by Dalton Trumbo based on the novel by Howard Fast, https://www.imdb.com/title/tt0054331/
McTiernan, J. (directed by): The Thomas Crown Affair (1999). Screenplay by Leslie Dixon and Kurt Wimmer, story by Alan R. Trustman, https://www.imdb.com/title/tt0155267/
Wright, E. (directed by): Baby Driver (2017). Screenplay by Edgar Wright, https://www.imdb.com/title/tt3890160/
Friedkin, W. (directed by): To Live and Die in L.A. (1985). Screenplay by William Friedkin and Gerald Petievich based on the novel by Gerald Petievich, https://www.imdb.com/title/tt0090180/
Wasserman, N. (directed by): Stewart Copeland’s Adventures in Music — Episode 2: “Telling Tales” (2020). Written by Stewart Copeland, https://www.imdb.com/title/tt11676040/
Whale, J. (directed by): Frankenstein (1931). Screenplay by Garrett Fort and Francis Edward Faragoh, from the play by Peggy Webling and John L. Balderston, based on the novel by Mary Shelley, https://www.imdb.com/title/tt0021884/
Browning, T. (directed by), Freund, K. (uncredited): Dracula (1931). Written by Garrett Fort, from the play by Hamilton Deane and John L. Balderston, based on the novel by Bram Stoker, https://www.imdb.com/title/tt0021814/
Cooper, M.C., Schoedsack, E.B. (directed by): King Kong (1933). Screenplay by James Creelman and Ruth Rose, https://www.imdb.com/title/tt0024216/
Viganò, L.: Il mio Galois. In: Emmer, M. (ed.) Matematica e Cultura 2004, pp. 171–178. Springer, Berlin (2004)
Viganò, L.: Galois. Il Nuovo Melangolo, Genoa (2005)
Viganò, L.: Évariste Galois: Un tragico eroe romantico. In: Manaresi, M. (ed.) Matematica e cultura in Europa, pp. 339–348. Springer, Berlin (2005). Extended version of [32]
Viganò, L.: Évariste Galois: a tragic romantic hero. In: Manaresi, M. (ed.) Mathematics and Culture in Europe, pp. 333–344. Springer, Berlin (2007). English translation of [34] and extended version of [36]
Viganò, L.: My Galois. In: Emmer, M. (ed.) Mathematics and Culture IV, pp. 171–178. Springer, Berlin (2007). English translation of [32]
Hofstadter, D.: Gödel, Escher, Bach: An Eternal Golden Braid. Basic Books, New York (1980)
Softley, I. (directed by): Hackers (1995). Screenplay by Rafael Moreu, https://www.imdb.com/title/tt0113243/
Tyldum, M. (directed by): The Imitation Game (2014). Screenplay by Graham Moore based on the book by Andrew Hodges, https://www.imdb.com/title/tt2084970/
Apted, M. (directed by): Enigma (2001). Screenplay by Tom Stoppard based on the novel by Robert Harris, https://www.imdb.com/title/tt0157583/
Howard, R. (directed by): A Beautiful Mind (2001). Screenplay by Akiva Goldsman based on the book by Sylvia Nasar, https://www.imdb.com/title/tt0268978/
Blair, G. (directed by): Secrets of Scotland Yard (1944). Screenplay by Denison Clift adapted from the novel “Room 40, O.B.”, https://www.imdb.com/title/tt0037255/
Greene, D. (directed by): Sebastian (1968). Screenplay by Gerald Vaughan-Hughes, original story by Leo Marks, https://www.imdb.com/title/tt0063570/
The Mentor: The conscience of a hacker. Phrack Inc., vol. 1, Issue 7, Phile 3 of 10, http://phrack.org/issues/7/3.html (last accessed May 2021) (January 8, 1986)
Robinson, P.A. (directed by): Sneakers (1992). Screenplay by Phil Alden Robinson, Lawrence Lasker and Walter F. Parkes, https://www.imdb.com/title/tt0105435/
Badham, J. (directed by): Wargames (1983). Screenplay by Lawrence Lasker and Walter F. Parkes, https://www.imdb.com/title/tt0086567/
Sena, D. (directed by): Swordfish (2001). Screenplay by Skip Woods, https://www.imdb.com/title/tt0244244/
Winkler (directed by), I.: The Net (1995). Screenplay by John Brancato and Michael Ferris, https://www.imdb.com/title/tt0113957/
Gordon, S. (directed by): Fortress (1992). Screenplay by Troy Neighbors, Steven Feinberg, David Venable and Terry Curtis Fox, https://www.imdb.com/title/tt0106950/
Wiseman, L. (directed by): Live Free or Die Hard (2007). Screenplay by Mark Bomback based on a story by Mark Bomback and David Marconi, on an article by John Carlin and on characters by Roderick Thorp, https://www.imdb.com/title/tt0337978/
Esmail, S. (created by): Mr. Robot (2015–2019). 4 seasons, 45 episodes, https://www.imdb.com/title/tt4158110/
Burt, G. (created by): The Bletchley Circle (2012–2014). 2 seasons, 7 episodes, https://www.imdb.com/title/tt2275990/
Good, L. (created by): The Bletchley Circle: San Francisco (2018). 1 season, 8 episodes, https://www.imdb.com/title/tt7978912/
Donahue, A., Mendelsohn, C., Zuiker, A.E. (created by): CSI: Cyber (2015–2016). 2 seasons, 31 episodes, https://www.imdb.com/title/tt3560060/
Mann, M. (directed by): Blackhat (2015). Screenplay by Morgan Davis Foehl, https://www.imdb.com/title/tt2717822/
Stone, O. (directed by): Snowden (2016). Screenplay by Kieran Fitzgerald and Oliver Stone based on the book by Luke Harding and Anatoly Kucherena, https://www.imdb.com/title/tt3774114/
Price, T.: Teh Internet Is Serious Business. Bloomsbury Methuen Drama, London (2014)
Eisenberg, M.: Hackers. Samuel French, New York (1999)
Haley, J.: The Nether. Faber & Faber (2014)
Gibson, W.: Sprawl trilogy: Neuromancer, Count Zero, Mona Lisa Overdrive. Victor Gollancz Ltd (1984–1988)
Stephenson, N.: Snow Crash. Bantam Books, New York (1992)
Stephenson, N.: Cryptonomicon. Avon, New York (1999)
Brown, D.: Digital Fortress. St. Martin’s Press, New York (1998)
Larsson, S.: Millennium Trilogy: The Girl with the Dragon Tattoo, The Girl Who Played with Fire, The Girl Who Kicked the Hornet’s Nest. Knopf, New York (2008)
Oplev, N.A. (directed by): The Girl with the Dragon Tattoo (2009). Screenplay by Nikolaj Arcel and Rasmus Heisterberg based on the novel by Stieg Larsson, https://www.imdb.com/title/tt1132620/
Alfredson, D. (directed by): The Girl Who Played with Fire (2009). Screenplay by Jonas Frykberg based on the novel by Stieg Larsson, https://www.imdb.com/title/tt1216487/
Alfredson, D. (directed by): The Girl Who Kicked the Hornet’s Nest (2009). Screenplay by Jonas Frykberg based on the novel by Stieg Larsson, https://www.imdb.com/title/tt1343097/
Fincher, D. (directed by): The Girl with the Dragon Tattoo (2011). Screenplay by Steven Zaillian based on the novel by Stieg Larsson, https://www.imdb.com/title/tt1568346/
Lagercrantz, D.: The Girl in the Spider’s Web. MacLehose Press, London (2015)
Alvarez, F. (directed by): The Girl in the Spider’s Web (2018). Screenplay by Jay Basu, Fede Alvarez and Steven Knight based on the novel by David Lagercrantz, with characters introduced in the Millenium series by Stieg Larsson, https://www.imdb.com/title/tt1568346/
Poe, E.: The Gold Bug. The Dollar (1843)
Fincher, D. (directed by): Zodiac (2007). Screenplay by James Vanderbilt from the book by Robert Graysmith, https://www.imdb.com/title/tt0443706/
West, S. (directed by): Con Air (1997). Screenplay by Scott Rosenberg, https://www.imdb.com/title/tt0118880/
Falacci, N., Heuton, C. (created by): NUMB3RS (2005–2010). 6 seasons, 119 episodes, https://www.imdb.com/title/tt0433309/
Dooley, J.F.: Codes and ciphers in fiction: an overview. Cryptologia 29, 290–328 (2005)
Dooley, J.F.: Codes and villains and mystery: the best stories with codes and ciphers 1843–1920. CreateSpace Independent Publishing Platform (2016). See also the “Cryptology in Fiction” document at https://www.johnfdooley.com
Bond, R.T. (ed.): Famous Stories of Code and Cipher. Rinehart (1947)
Poe, E.: A Few Words on Secret Writing (1841). Graham’s Magazine, 19
Doyle, A.C.: The Adventure of the Dancing Men. The Strand Magazine (1903)
Doyle, A.C.: The Valley of Fear. The Strand Magazine (1914–1915)
Springer, N.: The Enola Holmes Mysteries. Penguin Young Readers, London (2006–2010)
Fisher, T. (directed by): Sherlock Holmes and the Deadly Necklace (1962). Screenplay by Curt Siodmak based on the novel [78] by Arthur Conan Doyle, https://www.imdb.com/title/tt0056480/
Bradbeer, H. (directed by): Enola Holmes (2020). Screenplay by Jack Thorne based on the novel “The Case of the Missing Marquess: An Enola Holmes Mystery” by Nancy Springer, https://www.imdb.com/title/tt7846844/
Thompson, S. (episode written by), Gatiss and Steven Moffat, M. (“Sherlock” series created by): The Blind Banker (2015–2019). https://www.imdb.com/title/tt1664529/
Sayers, D.L.: Have His Carcase. Victor Gollancz, London (1932)
Turteltaub, J. (directed by): National Treasure (2004). Screenplay by Jim Kouf, Cormac Wibberley and Marianne Wibberley, https://www.imdb.com/title/tt0368891/
Turteltaub, J. (directed by): National Treasure: Book of Secrets (2007). Screenplay by Marianne Wibberley and Cormac Wibberley, https://www.imdb.com/title/tt0465234/
Marrone, C.: I Segni Dell’Inganno – Semiotica della Crittografia. Stampa Alternativa, Rome (2010)
Brown, D.: Robert Langdon series: Angels & Demons, The Da Vinci Code, The Lost Symbol, Inferno, Origin. Doubleday, New York (2000–2017)
Howard, R. (directed by): The Da Vinci Code (2006). Screenplay by Akiva Goldsman based on the novel by Dan Brown, https://www.imdb.com/title/tt0382625/
Howard, R. (directed by): Angels & Demons (2009). Screenplay by David Koepp and Akiva Goldsman based on the novel by Dan Brown, https://www.imdb.com/title/tt0808151/
Howard, R. (directed by): Inferno (2016). Screenplay by David Koepp based on the novel by Dan Brown, https://www.imdb.com/title/tt3062096/
Ludlum, R.: Bourne series: The Bourne Identity, The Bourne Supremacy, The Bourne Ultimatum. Richard Marek, Randum House, Randum House (1980, 1986, 1990)
Astley, N., Baker, M. (created by): Peppa Pig, Series 3, Episode 38, “The Secret Club” (2010). 7 seasons, 302 episodes. https://www.imdb.com/title/tt0426769/
Woo, J. (directed by): Windtalkers (2002). Screenplay by John Rice and Joe Batteer, https://www.imdb.com/title/tt0245562/
Gordon, S. (directed by): Identity Thief (2013). Screenplay by Craig Mazin, https://www.imdb.com/title/tt2024432/
Woo, J. (directed by): Face/Off (1997). Screenplay by Mike Webb and Michael Colleary, https://www.imdb.com/title/tt0119094/
Viganò, L.: Nicolas Cage is the center of the cybersecurity universe. In: Human-Computer Interaction – INTERACT 2021, pp. 14–33. Springer Nature Switzerland AG (2021). https://doi.org/10.1007/978-3-030-85623-6_3
Loncraine, R. (directed by): Firewall (2006). Screenplay by Joe Forte, https://www.imdb.com/title/tt0408345/
Fedak, C., Schwartz, J. (created by): Chuck (2007–2012). 5 seasons, 91 episodes, https://www.imdb.com/title/tt0934814/
European Central Bank: Final guidelines on the security of Internet payments (2014)
Bird, B. (directed by): Incredibles 2 (2018). Screenplay by Brad Bird, https://www.imdb.com/title/tt3606756/
Letterman, R., Vernon, C. (directed by): Monsters vs. Aliens (2009) . Screenplay by Maya Forbes, Wallace Wolodarsky, Rob Letterman, Jonathan Aibel and Glenn Berger, https://www.imdb.com/title/tt0892782/
Hartman (directed by), D.: Tigger & Pooh and a Musical Too (2009). Screenplay by Nicole Dubuc, Brian Hohlfeld and Dean Stefan, “Password Song” written by Andy Sturmer and Brian Hohlfeld, https://www.imdb.com/title/tt1415904/
Brooks, J.L., Groening, M., Simon, S. (created by): The Simpsons (1989). 32 seasons, 707 episodes, https://www.imdb.com/title/tt0096697/
Cohen, D.X., Groening, M. (created by): Futurama (1999–2013). 10 seasons, 140 episodes, https://www.imdb.com/title/tt0149460/
Singh, S.: The Simpsons and Their Mathematical Secrets. Bloomsbury, London (2013)
The Pierces: Secret (2007). First track of the album Thirteen Tales of Love and Revenge
Moore, A., Lloyd, D.: V for Vendetta. Vertigo (DC Comics), New York (1982–1989)
McTeigue, J. (directed by): V for Vendetta (2005). Screenplay by Lilly Wachowski and Lana Wachowski based on Moore, A., Lloyd, D.: V for Vendetta. Vertigo (DC Comics), New York (1982–1989). https://www.imdb.com/title/tt0434409/
Dumas père, A. (avec la collaboration d’Auguste Maquet): Les Trois Mousquetaires. Le Siècle (1844)
Grimm, J., Grimm, W.: Kinder- und Hausmärchen (1812–1858)
Lewis, J.: The Wife Of Martin Guerre. Swallow Press, Athens (1967)
Sciascia, L.: La sentenza memorabile. Sellerio, Palermo (1982)
Vigne, D. (directed by): Le retour de Martin Guerre (1982). Screenplay by Jean-Claude Carrière, Daniel Vigne and Natalie Zemon Davis based on the novel by Lewis, J.: The Wife Of Martin Guerre. Swallow Press, Athens (1967). https://www.imdb.com/title/tt0084589/
Amiel, J. (directed by): Sommersby (1993). Screenplay by Nicholas Meyer and Sarah Kernochan based on the screenplay of [112], https://www.imdb.com/title/tt0108185/
Schönberg, C.-M., Boublil, A. (Book), Boublil, A., Hardy, E., Clark, S. (Lyrics), Schönberg, C.-M. (Music): Martin guerre (a musical love story) (1996)
Davis, N.Z.: The Return of Martin Guerre. Harvard University Press, Cambridge (1983)
Sciascia, L.: Il teatro della memoria. Einaudi, Torino (1981)
Pirandello, L.: Come tu mi vuoi (1929)
Fitzmaurice, G. (directed by): As You Desire Me (1932). Screenplay by Gene Markey based on the play (Pirandello, L.: Come tu mi vuoi), https://www.imdb.com/title/tt0022641/
Festa Campanile, P. (directed by): Uno scandalo perbene (A Proper Scandal) (1984). Screenplay by Suso Cecchi D’Amico and Pasquale Festa Campanile, https://www.imdb.com/title/tt0122241/
Ariemma, T.: La filosofia spiegata con le serie TV. Mondadori, Milan (2017)
Cabrera, J.: Da Aristotele a Spielberg. Capire la filosofia attraverso i film. Bruno Mondadori editore, Rome (2007)
Mordacci, R. (ed.): Come fare filosofia con i film. Carocci editore, Rome (2017)
Marcus, A.S., Metzger, S.A., Paxton, R.J., Stoddard, J.D. (eds.): Teaching History With Film: Strategies for Secondary Social Studies, 2nd edn. Routledge, Milton Park (2018)
Russell III, W.B.: The art of teaching social studies with film. Clearing House J. Edu. Strategies, Issues Ideas 85(4), 157–164 (2012)
Champoux, J.E.: Management: Using Film to Visualize Principles and Practice. South-Western, Hubballi (2000)
Champoux, J.E.: Organizational Behavior: Using Film to Visualize Principles and Practices. South-Western, Hubballi (2000)
Engert, S., Spencer, A.: International relations at the movies: teaching and learning about international politics through film. Perspectives 17(1), 83–104 (2009)
Valeriano, B.: Teaching introduction to international politics with film. J. Polit. Sci. Ed. 9, 52–72 (2013)
Rubin, L.C. (ed.): Mental Illness in Popular Media: Essays on the Representation of Disorders. McFarland & Co, Jefferson (2012)
Blasco, J., Quaglia, E.A.: InfoSec cinema: Using films for information security teaching. In: 2018 USENIX Workshop on Advances in Security Education, ASE 2018. USENIX Association, Berkeley (2018)
Acknowledgements
This work was supported by the King’s Together Multi and Interdisciplinary Research Scheme, King’s College London, UK. Thanks to Giampaolo Bella, Gabriele Costa, Alistair Gentry, Sally Marlow, Hannah Redler Hawes and Diego Sempreboni for their invaluable contributions and to Michele Emmer, Ashwin Mathew, Alessandra Di Pierro, and Aldo and Claudia Viganò for many useful suggestions.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Viganò, L. (2022). Don’t Tell Me the Cybersecurity Moon Is Shining…. In: Emmer, M., Abate, M. (eds) Imagine Math 8. Springer, Cham. https://doi.org/10.1007/978-3-030-92690-8_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-92690-8_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-92689-2
Online ISBN: 978-3-030-92690-8
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)